diff options
author | Endi Sukma Dewata <edewata@redhat.com> | 2012-01-12 18:53:36 -0600 |
---|---|---|
committer | Endi Sukma Dewata <edewata@redhat.com> | 2012-01-18 12:55:59 -0600 |
commit | 2a535f04f7b7bf670b19b95801e25178af5c91f9 (patch) | |
tree | 5e8356739fecf71d6b132e026d95ffb52bf2cdbf /pki/base/common/src/com/netscape/cms/servlet/cert | |
parent | 9115902d5d3ffa4ac905f5d1f9fbd18a8e99622c (diff) | |
download | pki-2a535f04f7b7bf670b19b95801e25178af5c91f9.tar.gz pki-2a535f04f7b7bf670b19b95801e25178af5c91f9.tar.xz pki-2a535f04f7b7bf670b19b95801e25178af5c91f9.zip |
Added generics (part 1).
This patch is based on Adam's patch. It brings down the warnings
from 6139 to 4648.
Ticket #2
Diffstat (limited to 'pki/base/common/src/com/netscape/cms/servlet/cert')
13 files changed, 139 insertions, 129 deletions
diff --git a/pki/base/common/src/com/netscape/cms/servlet/cert/CMCRevReqServlet.java b/pki/base/common/src/com/netscape/cms/servlet/cert/CMCRevReqServlet.java index 0d7da7fa8..461fa0b94 100644 --- a/pki/base/common/src/com/netscape/cms/servlet/cert/CMCRevReqServlet.java +++ b/pki/base/common/src/com/netscape/cms/servlet/cert/CMCRevReqServlet.java @@ -236,8 +236,9 @@ public class CMCRevReqServlet extends CMSServlet { certs = new X509CertImpl[serialNoArray.length]; for (int i = 0; i < serialNoArray.length; i++) { - certs[i] = ((ICertificateAuthority) mAuthority).getCertificateRepository().getX509Certificate( - serialNoArray[i]); + certs[i] = + ((ICertificateAuthority) mAuthority).getCertificateRepository().getX509Certificate( + serialNoArray[i]); } } else if (mAuthority instanceof IRegistrationAuthority) { @@ -379,8 +380,8 @@ public class CMCRevReqServlet extends CMSServlet { try { int count = 0; - Vector oldCertsV = new Vector(); - Vector revCertImplsV = new Vector(); + Vector<X509CertImpl> oldCertsV = new Vector<X509CertImpl>(); + Vector<RevokedCertImpl> revCertImplsV = new Vector<RevokedCertImpl>(); // Construct a CRL reason code extension. RevocationReason revReason = RevocationReason.fromInt(reason); @@ -406,7 +407,7 @@ public class CMCRevReqServlet extends CMSServlet { if (mAuthority instanceof ICertificateAuthority) { ICertRecordList list = (ICertRecordList) mCertDB.findCertRecordsInList( revokeAll, null, totalRecordCount); - Enumeration e = list.getCertRecords(0, totalRecordCount - 1); + Enumeration<ICertRecord> e = list.getCertRecords(0, totalRecordCount - 1); while (e != null && e.hasMoreElements()) { ICertRecord rec = (ICertRecord) e.nextElement(); @@ -439,11 +440,11 @@ public class CMCRevReqServlet extends CMSServlet { if (mRequestID != null && mRequestID.length() > 0) reqIdStr = mRequestID; - Vector serialNumbers = new Vector(); + Vector<String> serialNumbers = new Vector<String>(); if (revokeAll != null && revokeAll.length() > 0) { - for (int i = revokeAll.indexOf('='); i < revokeAll.length() && i > -1; i = revokeAll - .indexOf('=', i)) { + for (int i = revokeAll.indexOf('='); i < revokeAll.length() && i > -1; i = + revokeAll.indexOf('=', i)) { if (i > -1) { i++; while (i < revokeAll.length() && revokeAll.charAt(i) == ' ') { @@ -654,7 +655,7 @@ public class CMCRevReqServlet extends CMSServlet { } if (mAuthority instanceof ICertificateAuthority) { // let known update and publish status of all crls. - Enumeration otherCRLs = + Enumeration<ICRLIssuingPoint> otherCRLs = ((ICertificateAuthority) mAuthority).getCRLIssuingPoints(); while (otherCRLs.hasMoreElements()) { @@ -761,7 +762,7 @@ public class CMCRevReqServlet extends CMSServlet { } } else { - Vector errors = revReq.getExtDataInStringVector(IRequest.ERRORS); + Vector<String> errors = revReq.getExtDataInStringVector(IRequest.ERRORS); StringBuffer errorStr = new StringBuffer(); if (errors != null && errors.size() > 0) { diff --git a/pki/base/common/src/com/netscape/cms/servlet/cert/ChallengeRevocationServlet1.java b/pki/base/common/src/com/netscape/cms/servlet/cert/ChallengeRevocationServlet1.java index 14f28bce9..8ca35484b 100644 --- a/pki/base/common/src/com/netscape/cms/servlet/cert/ChallengeRevocationServlet1.java +++ b/pki/base/common/src/com/netscape/cms/servlet/cert/ChallengeRevocationServlet1.java @@ -213,8 +213,9 @@ public class ChallengeRevocationServlet1 extends CMSServlet { certs = new X509CertImpl[serialNoArray.length]; for (int i = 0; i < serialNoArray.length; i++) { - certs[i] = ((ICertificateAuthority) mAuthority).getCertificateRepository().getX509Certificate( - serialNoArray[i]); + certs[i] = + ((ICertificateAuthority) mAuthority).getCertificateRepository().getX509Certificate( + serialNoArray[i]); } } else if (mAuthority instanceof IRegistrationAuthority) { @@ -308,8 +309,8 @@ public class ChallengeRevocationServlet1 extends CMSServlet { throws EBaseException { try { int count = 0; - Vector oldCertsV = new Vector(); - Vector revCertImplsV = new Vector(); + Vector<X509CertImpl> oldCertsV = new Vector<X509CertImpl>(); + Vector<RevokedCertImpl> revCertImplsV = new Vector<RevokedCertImpl>(); // Construct a CRL reason code extension. RevocationReason revReason = RevocationReason.fromInt(reason); @@ -335,7 +336,7 @@ public class ChallengeRevocationServlet1 extends CMSServlet { if (mAuthority instanceof ICertificateAuthority) { ICertRecordList list = (ICertRecordList) mCertDB.findCertRecordsInList( revokeAll, null, totalRecordCount); - Enumeration e = list.getCertRecords(0, totalRecordCount - 1); + Enumeration<ICertRecord> e = list.getCertRecords(0, totalRecordCount - 1); while (e != null && e.hasMoreElements()) { ICertRecord rec = (ICertRecord) e.nextElement(); @@ -368,7 +369,7 @@ public class ChallengeRevocationServlet1 extends CMSServlet { if (mRequestID != null && mRequestID.length() > 0) reqIdStr = mRequestID; - Vector serialNumbers = new Vector(); + Vector<String> serialNumbers = new Vector<String>(); if (revokeAll != null && revokeAll.length() > 0) { for (int i = revokeAll.indexOf('='); i < revokeAll.length() && i > -1; @@ -563,7 +564,7 @@ public class ChallengeRevocationServlet1 extends CMSServlet { } if (mAuthority instanceof ICertificateAuthority) { // let known update and publish status of all crls. - Enumeration otherCRLs = + Enumeration<ICRLIssuingPoint> otherCRLs = ((ICertificateAuthority) mAuthority).getCRLIssuingPoints(); while (otherCRLs.hasMoreElements()) { @@ -672,7 +673,7 @@ public class ChallengeRevocationServlet1 extends CMSServlet { } } else { - Vector errors = revReq.getExtDataInStringVector(IRequest.ERRORS); + Vector<String> errors = revReq.getExtDataInStringVector(IRequest.ERRORS); StringBuffer errorStr = new StringBuffer(); if (errors != null && errors.size() > 0) { diff --git a/pki/base/common/src/com/netscape/cms/servlet/cert/DisplayBySerial.java b/pki/base/common/src/com/netscape/cms/servlet/cert/DisplayBySerial.java index 1c9838f83..36746106a 100644 --- a/pki/base/common/src/com/netscape/cms/servlet/cert/DisplayBySerial.java +++ b/pki/base/common/src/com/netscape/cms/servlet/cert/DisplayBySerial.java @@ -309,8 +309,8 @@ public class DisplayBySerial extends CMSServlet { String rid = (String) metaInfo.get(ICertRecord.META_REQUEST_ID); if (rid != null && mAuthority instanceof ICertificateAuthority) { - IRequest r = ((ICertificateAuthority) mAuthority).getRequestQueue().findRequest( - new RequestId(rid)); + IRequest r = + ((ICertificateAuthority) mAuthority).getRequestQueue().findRequest(new RequestId(rid)); String certType = r.getExtDataInString(IRequest.HTTP_PARAMS, IRequest.CERT_TYPE); if (certType != null && certType.equals(IRequest.CLIENT_CERT)) { @@ -331,7 +331,7 @@ public class DisplayBySerial extends CMSServlet { CRLExtensions crlExts = revocationInfo.getCRLEntryExtensions(); if (crlExts != null) { - Enumeration enumx = crlExts.getElements(); + Enumeration<Extension> enumx = crlExts.getElements(); int reason = 0; while (enumx.hasMoreElements()) { diff --git a/pki/base/common/src/com/netscape/cms/servlet/cert/DoRevoke.java b/pki/base/common/src/com/netscape/cms/servlet/cert/DoRevoke.java index 97a70fac3..b84f5ace1 100644 --- a/pki/base/common/src/com/netscape/cms/servlet/cert/DoRevoke.java +++ b/pki/base/common/src/com/netscape/cms/servlet/cert/DoRevoke.java @@ -439,8 +439,8 @@ public class DoRevoke extends CMSServlet { try { int count = 0; - Vector oldCertsV = new Vector(); - Vector revCertImplsV = new Vector(); + Vector<X509CertImpl> oldCertsV = new Vector<X509CertImpl>(); + Vector<RevokedCertImpl> revCertImplsV = new Vector<RevokedCertImpl>(); // Construct a CRL reason code extension. RevocationReason revReason = RevocationReason.fromInt(reason); @@ -465,11 +465,11 @@ public class DoRevoke extends CMSServlet { if (mAuthority instanceof ICertificateAuthority) { - Enumeration e = mCertDB.searchCertificates(revokeAll, + Enumeration<ICertRecord> e = mCertDB.searchCertificates(revokeAll, totalRecordCount, mTimeLimits); while (e != null && e.hasMoreElements()) { - ICertRecord rec = (ICertRecord) e.nextElement(); + ICertRecord rec = e.nextElement(); if (rec == null) continue; @@ -532,7 +532,7 @@ public class DoRevoke extends CMSServlet { } else if (mAuthority instanceof IRegistrationAuthority) { String reqIdStr = req.getParameter("requestId"); - Vector serialNumbers = new Vector(); + Vector<String> serialNumbers = new Vector<String>(); if (revokeAll != null && revokeAll.length() > 0) { for (int i = revokeAll.indexOf('='); i < revokeAll.length() && i > -1; @@ -787,8 +787,8 @@ public class DoRevoke extends CMSServlet { "completed", cert.getSubjectDN(), cert.getSerialNumber().toString(16), - RevocationReason.fromInt(reason).toString() + " time: " - + (endTime - startTime) } + RevocationReason.fromInt(reason).toString() + + " time: " + (endTime - startTime) } ); } } @@ -833,7 +833,7 @@ public class DoRevoke extends CMSServlet { if (mAuthority instanceof ICertificateAuthority) { // let known update and publish status of all crls. - Enumeration otherCRLs = + Enumeration<ICRLIssuingPoint> otherCRLs = ((ICertificateAuthority) mAuthority).getCRLIssuingPoints(); while (otherCRLs.hasMoreElements()) { @@ -925,7 +925,7 @@ public class DoRevoke extends CMSServlet { } else { header.addStringValue("revoked", "no"); } - Vector errors = revReq.getExtDataInStringVector(IRequest.ERRORS); + Vector<String> errors = revReq.getExtDataInStringVector(IRequest.ERRORS); if (errors != null) { StringBuffer errInfo = new StringBuffer(); for (int i = 0; i < errors.size(); i++) { diff --git a/pki/base/common/src/com/netscape/cms/servlet/cert/DoRevokeTPS.java b/pki/base/common/src/com/netscape/cms/servlet/cert/DoRevokeTPS.java index 075f3218b..00cca204a 100644 --- a/pki/base/common/src/com/netscape/cms/servlet/cert/DoRevokeTPS.java +++ b/pki/base/common/src/com/netscape/cms/servlet/cert/DoRevokeTPS.java @@ -353,8 +353,8 @@ public class DoRevokeTPS extends CMSServlet { try { int count = 0; - Vector oldCertsV = new Vector(); - Vector revCertImplsV = new Vector(); + Vector<X509CertImpl> oldCertsV = new Vector<X509CertImpl>(); + Vector<RevokedCertImpl> revCertImplsV = new Vector<RevokedCertImpl>(); // Construct a CRL reason code extension. RevocationReason revReason = RevocationReason.fromInt(reason); @@ -377,7 +377,7 @@ public class DoRevokeTPS extends CMSServlet { entryExtn.set(invalidityDateExtn.getName(), invalidityDateExtn); } - Enumeration e = mCertDB.searchCertificates(revokeAll, + Enumeration<ICertRecord> e = mCertDB.searchCertificates(revokeAll, totalRecordCount, mTimeLimits); boolean alreadyRevokedCertFound = false; @@ -593,8 +593,8 @@ public class DoRevokeTPS extends CMSServlet { "completed", cert.getSubjectDN(), cert.getSerialNumber().toString(16), - RevocationReason.fromInt(reason).toString() + " time: " - + (endTime - startTime) } + RevocationReason.fromInt(reason).toString() + + " time: " + (endTime - startTime) } ); } } @@ -633,7 +633,7 @@ public class DoRevokeTPS extends CMSServlet { if (mAuthority instanceof ICertificateAuthority) { // let known update and publish status of all crls. - Enumeration otherCRLs = + Enumeration<ICRLIssuingPoint> otherCRLs = ((ICertificateAuthority) mAuthority).getCRLIssuingPoints(); while (otherCRLs.hasMoreElements()) { @@ -718,7 +718,7 @@ public class DoRevokeTPS extends CMSServlet { o_status = "status=2"; errorString = "error=Undefined request status"; } - Vector errors = revReq.getExtDataInStringVector(IRequest.ERRORS); + Vector<String> errors = revReq.getExtDataInStringVector(IRequest.ERRORS); if (errors != null) { StringBuffer errInfo = new StringBuffer(); diff --git a/pki/base/common/src/com/netscape/cms/servlet/cert/EnrollServlet.java b/pki/base/common/src/com/netscape/cms/servlet/cert/EnrollServlet.java index 0c7b73780..7b3fb2f74 100644 --- a/pki/base/common/src/com/netscape/cms/servlet/cert/EnrollServlet.java +++ b/pki/base/common/src/com/netscape/cms/servlet/cert/EnrollServlet.java @@ -465,12 +465,13 @@ public class EnrollServlet extends CMSServlet { } String filter = - "(&(x509cert.subject=" + certBasedOldSubjectDN + ")(!(x509cert.serialNumber=" + certBasedOldSerialNum + "(&(x509cert.subject=" + + certBasedOldSubjectDN + ")(!(x509cert.serialNumber=" + certBasedOldSerialNum + "))(certStatus=VALID))"; ICertRecordList list = (ICertRecordList) mCa.getCertificateRepository().findCertRecordsInList(filter, null, 10); int size = list.getSize(); - Enumeration en = list.getCertRecords(0, size - 1); + Enumeration<ICertRecord> en = list.getCertRecords(0, size - 1); boolean gotEncCert = false; CMS.debug("EnrollServlet: signing cert filter " + filter); @@ -572,10 +573,10 @@ public class EnrollServlet extends CMSServlet { // audit log the status try { if (status == RequestStatus.REJECTED) { - Vector messages = req.getExtDataInStringVector(IRequest.ERRORS); + Vector<String> messages = req.getExtDataInStringVector(IRequest.ERRORS); if (messages != null) { - Enumeration msgs = messages.elements(); + Enumeration<String> msgs = messages.elements(); StringBuffer wholeMsg = new StringBuffer(); while (msgs.hasMoreElements()) { diff --git a/pki/base/common/src/com/netscape/cms/servlet/cert/HashEnrollServlet.java b/pki/base/common/src/com/netscape/cms/servlet/cert/HashEnrollServlet.java index e42150f87..4d5b711c0 100644 --- a/pki/base/common/src/com/netscape/cms/servlet/cert/HashEnrollServlet.java +++ b/pki/base/common/src/com/netscape/cms/servlet/cert/HashEnrollServlet.java @@ -487,13 +487,14 @@ public class HashEnrollServlet extends CMSServlet { } String filter = - "(&(x509cert.subject=" + certBasedOldSubjectDN + ")(!(x509cert.serialNumber=" - + certBasedOldSerialNum + "))(certStatus=VALID))"; + "(&(x509cert.subject=" + + certBasedOldSubjectDN + ")(!(x509cert.serialNumber=" + certBasedOldSerialNum + + "))(certStatus=VALID))"; ICertRecordList list = (ICertRecordList) mCa.getCertificateRepository().findCertRecordsInList(filter, null, 10); int size = list.getSize(); - Enumeration en = list.getCertRecords(0, size - 1); + Enumeration<ICertRecord> en = list.getCertRecords(0, size - 1); boolean gotEncCert = false; if (!en.hasMoreElements()) { @@ -656,10 +657,10 @@ public class HashEnrollServlet extends CMSServlet { // audit log the status try { if (status == RequestStatus.REJECTED) { - Vector messages = req.getExtDataInStringVector(IRequest.ERRORS); + Vector<String> messages = req.getExtDataInStringVector(IRequest.ERRORS); if (messages != null) { - Enumeration msgs = messages.elements(); + Enumeration<String> msgs = messages.elements(); StringBuffer wholeMsg = new StringBuffer(); while (msgs.hasMoreElements()) { @@ -947,8 +948,8 @@ public class HashEnrollServlet extends CMSServlet { // field suggested notBefore and notAfter in CRMF // Tech Support #383184 if (certTemplate.getNotBefore() != null || certTemplate.getNotAfter() != null) { - CertificateValidity certValidity = new CertificateValidity(certTemplate.getNotBefore(), - certTemplate.getNotAfter()); + CertificateValidity certValidity = + new CertificateValidity(certTemplate.getNotBefore(), certTemplate.getNotAfter()); certInfo.set(X509CertInfo.VALIDITY, certValidity); } diff --git a/pki/base/common/src/com/netscape/cms/servlet/cert/ListCerts.java b/pki/base/common/src/com/netscape/cms/servlet/cert/ListCerts.java index c12c8193d..8a818f5e8 100644 --- a/pki/base/common/src/com/netscape/cms/servlet/cert/ListCerts.java +++ b/pki/base/common/src/com/netscape/cms/servlet/cert/ListCerts.java @@ -68,10 +68,8 @@ public class ListCerts extends CMSServlet { */ private static final long serialVersionUID = -3568155814023099576L; private final static String TPL_FILE = "queryCert.template"; - private final static String INFO = "ListCerts"; private final static BigInteger MINUS_ONE = new BigInteger("-1"); - private final static String CURRENT_TIME = "currentTime"; private final static String USE_CLIENT_FILTER = "useClientFilter"; private final static String ALLOWED_CLIENT_FILTERS = "allowedClientFilters"; @@ -82,7 +80,7 @@ public class ListCerts extends CMSServlet { private boolean mHardJumpTo = false; //jump to the end private String mDirection = null; private boolean mUseClientFilter = false; - private Vector mAllowedClientFilters = new Vector(); + private Vector<String> mAllowedClientFilters = new Vector<String>(); private int mMaxReturns = 2000; /** @@ -149,18 +147,18 @@ public class ListCerts extends CMSServlet { if (mUseClientFilter) { com.netscape.certsrv.apps.CMS.debug("useClientFilter=true"); - Enumeration filters = mAllowedClientFilters.elements(); + Enumeration<String> filters = mAllowedClientFilters.elements(); // check to see if the filter is allowed while (filters.hasMoreElements()) { String filter = (String) filters.nextElement(); - com.netscape.certsrv.apps.CMS.debug("Comparing filter=" + filter + " queryCertFilter=" - + queryCertFilter); + com.netscape.certsrv.apps.CMS.debug("Comparing filter=" + + filter + " queryCertFilter=" + queryCertFilter); if (filter.equals(queryCertFilter)) { return queryCertFilter; } } - com.netscape.certsrv.apps.CMS.debug("Requested filter '" + queryCertFilter - + "' is not allowed. Please check the " + ALLOWED_CLIENT_FILTERS + "parameter"); + com.netscape.certsrv.apps.CMS.debug("Requested filter '" + + queryCertFilter + "' is not allowed. Please check the " + ALLOWED_CLIENT_FILTERS + "parameter"); return null; } else { com.netscape.certsrv.apps.CMS.debug("useClientFilter=false"); @@ -320,8 +318,9 @@ public class ListCerts extends CMSServlet { } catch (NumberFormatException e) { log(ILogger.LL_FAILURE, com.netscape.certsrv.apps.CMS.getLogMessage("BASE_INVALID_NUMBER_FORMAT")); - error = new EBaseException(com.netscape.certsrv.apps.CMS.getUserMessage(getLocale(req), - "CMS_BASE_INVALID_NUMBER_FORMAT")); + error = + new EBaseException(com.netscape.certsrv.apps.CMS.getUserMessage(getLocale(req), + "CMS_BASE_INVALID_NUMBER_FORMAT")); } catch (EBaseException e) { error = e; } @@ -395,7 +394,7 @@ public class ListCerts extends CMSServlet { pSize); // retrive maxCount + 1 entries - Enumeration e = list.getCertRecords(0, maxCount); + Enumeration<ICertRecord> e = list.getCertRecords(0, maxCount); ICertRecordList tolist = null; int toCurIndex = 0; @@ -407,7 +406,7 @@ public class ListCerts extends CMSServlet { filter, (String[]) null, serialTo, "serialno", maxCount); - Enumeration en = tolist.getCertRecords(0, 0); + Enumeration<ICertRecord> en = tolist.getCertRecords(0, 0); if (en == null || (!en.hasMoreElements())) { toCurIndex = list.getSize() - 1; @@ -654,7 +653,7 @@ public class ListCerts extends CMSServlet { CRLExtensions crlExts = revocationInfo.getCRLEntryExtensions(); if (crlExts != null) { - Enumeration enum1 = crlExts.getElements(); + Enumeration<Extension> enum1 = crlExts.getElements(); int reason = 0; while (enum1.hasMoreElements()) { diff --git a/pki/base/common/src/com/netscape/cms/servlet/cert/SrchCerts.java b/pki/base/common/src/com/netscape/cms/servlet/cert/SrchCerts.java index bbe8a479e..8e6d58216 100644 --- a/pki/base/common/src/com/netscape/cms/servlet/cert/SrchCerts.java +++ b/pki/base/common/src/com/netscape/cms/servlet/cert/SrchCerts.java @@ -608,14 +608,14 @@ public class SrchCerts extends CMSServlet { CMS.debug("Resetting timelimit from " + timeLimit + " to " + mTimeLimits); timeLimit = mTimeLimits; } - CMS.debug("Start searching ... " + "filter=" + filter + " maxreturns=" + maxResults + " timelimit=" - + timeLimit); - Enumeration e = mCertDB.searchCertificates(filter, maxResults, timeLimit); + CMS.debug("Start searching ... " + + "filter=" + filter + " maxreturns=" + maxResults + " timelimit=" + timeLimit); + Enumeration<ICertRecord> e = mCertDB.searchCertificates(filter, maxResults, timeLimit); int count = 0; while (e != null && e.hasMoreElements()) { - ICertRecord rec = (ICertRecord) e.nextElement(); + ICertRecord rec = e.nextElement(); if (rec != null) { count++; @@ -744,11 +744,11 @@ public class SrchCerts extends CMSServlet { CRLExtensions crlExts = revocationInfo.getCRLEntryExtensions(); if (crlExts != null) { - Enumeration enum1 = crlExts.getElements(); + Enumeration<Extension> enum1 = crlExts.getElements(); int reason = 0; while (enum1.hasMoreElements()) { - Extension ext = (Extension) enum1.nextElement(); + Extension ext = enum1.nextElement(); if (ext instanceof CRLReasonExtension) { reason = ((CRLReasonExtension) ext).getReason().toInt(); diff --git a/pki/base/common/src/com/netscape/cms/servlet/cert/UpdateCRL.java b/pki/base/common/src/com/netscape/cms/servlet/cert/UpdateCRL.java index 9d3e633d2..680886b95 100644 --- a/pki/base/common/src/com/netscape/cms/servlet/cert/UpdateCRL.java +++ b/pki/base/common/src/com/netscape/cms/servlet/cert/UpdateCRL.java @@ -50,6 +50,7 @@ import com.netscape.certsrv.ca.ICertificateAuthority; import com.netscape.certsrv.ldap.ELdapException; import com.netscape.certsrv.logging.AuditFormat; import com.netscape.certsrv.logging.ILogger; +import com.netscape.certsrv.publish.ILdapRule; import com.netscape.certsrv.publish.IPublisherProcessor; import com.netscape.certsrv.util.IStatsSubsystem; import com.netscape.cms.servlet.base.CMSServlet; @@ -72,7 +73,7 @@ public class UpdateCRL extends CMSServlet { private final static String INFO = "UpdateCRL"; private final static String TPL_FILE = "updateCRL.template"; - private static Vector mTesting = new Vector(); + private static Vector<String> mTesting = new Vector<String>(); private String mFormPath = null; private ICertificateAuthority mCA = null; @@ -278,7 +279,7 @@ public class UpdateCRL extends CMSServlet { rarg.addStringValue("crlSizes", crlSizes); StringBuffer crlSplits = new StringBuffer(); - Vector splits = crlIssuingPoint.getSplitTimes(); + Vector<Long> splits = crlIssuingPoint.getSplitTimes(); for (int i = 0; i < splits.size(); i++) { crlSplits.append(splits.elementAt(i)); if (i + 1 < splits.size()) @@ -311,10 +312,10 @@ public class UpdateCRL extends CMSServlet { String results = req.getParameter("results"); if (crlIssuingPointId != null) { - Enumeration ips = mCA.getCRLIssuingPoints(); + Enumeration<ICRLIssuingPoint> ips = mCA.getCRLIssuingPoints(); while (ips.hasMoreElements()) { - ICRLIssuingPoint ip = (ICRLIssuingPoint) ips.nextElement(); + ICRLIssuingPoint ip = ips.nextElement(); if (crlIssuingPointId.equals(ip.getId())) { break; @@ -447,7 +448,7 @@ public class UpdateCRL extends CMSServlet { } if (lpm != null && lpm.enabled()) { - Enumeration rules = lpm.getRules(IPublisherProcessor.PROP_LOCAL_CRL); + Enumeration<ILdapRule> rules = lpm.getRules(IPublisherProcessor.PROP_LOCAL_CRL); if (rules != null && rules.hasMoreElements()) { if (publishError != null) { header.addStringValue("crlPublished", "Failure"); @@ -481,8 +482,8 @@ public class UpdateCRL extends CMSServlet { crlIssuingPoint.getCRLNumber(), crlIssuingPoint.getLastUpdate(), crlIssuingPoint.getNextUpdate(), - Long.toString(crlIssuingPoint.getCRLSize()) + " time: " - + (endTime - startTime) } + Long.toString(crlIssuingPoint.getCRLSize()) + + " time: " + (endTime - startTime) } ); } else { mLogger.log(ILogger.EV_AUDIT, ILogger.S_OTHER, @@ -496,8 +497,8 @@ public class UpdateCRL extends CMSServlet { crlIssuingPoint.getCRLNumber(), crlIssuingPoint.getLastUpdate(), "not set", - Long.toString(crlIssuingPoint.getCRLSize()) + " time: " - + (endTime - startTime) } + Long.toString(crlIssuingPoint.getCRLSize()) + + " time: " + (endTime - startTime) } ); } } catch (EBaseException e) { diff --git a/pki/base/common/src/com/netscape/cms/servlet/cert/scep/CRSEnrollment.java b/pki/base/common/src/com/netscape/cms/servlet/cert/scep/CRSEnrollment.java index 75ec99e13..23793b3f9 100644 --- a/pki/base/common/src/com/netscape/cms/servlet/cert/scep/CRSEnrollment.java +++ b/pki/base/common/src/com/netscape/cms/servlet/cert/scep/CRSEnrollment.java @@ -206,9 +206,10 @@ public class CRSEnrollment extends HttpServlet { public CRSEnrollment() { } - public static Hashtable toHashtable(HttpServletRequest req) { - Hashtable httpReqHash = new Hashtable(); - Enumeration names = req.getParameterNames(); + public static Hashtable<String, String> toHashtable(HttpServletRequest req) { + Hashtable<String, String> httpReqHash = new Hashtable<String, String>(); + @SuppressWarnings("unchecked") + Enumeration<String> names = req.getParameterNames(); while (names.hasMoreElements()) { String name = (String) names.nextElement(); httpReqHash.put(name, req.getParameter(name)); @@ -416,7 +417,7 @@ public class CRSEnrollment extends HttpServlet { HttpServletRequest request) throws EBaseException { // build credential - Enumeration authNames = authenticator.getValueNames(); + Enumeration<String> authNames = authenticator.getValueNames(); if (authNames != null) { while (authNames.hasMoreElements()) { @@ -536,7 +537,7 @@ public class CRSEnrollment extends HttpServlet { public String getPasswordFromP10(PKCS10 p10) { PKCS10Attributes p10atts = p10.getAttributes(); - Enumeration e = p10atts.getElements(); + Enumeration<PKCS10Attribute> e = p10atts.getElements(); try { while (e.hasMoreElements()) { @@ -688,7 +689,7 @@ public class CRSEnrollment extends HttpServlet { String pkcs10Attr = ""; PKCS10Attributes p10atts = p10.getAttributes(); - Enumeration e = p10atts.getElements(); + Enumeration<PKCS10Attribute> e = p10atts.getElements(); while (e.hasMoreElements()) { PKCS10Attribute p10a = (PKCS10Attribute) e.nextElement(); @@ -696,18 +697,21 @@ public class CRSEnrollment extends HttpServlet { if (attr.getName().equals(ChallengePassword.NAME)) { if (attr.get(ChallengePassword.PASSWORD) != null) { - pkcs10Attr = pkcs10Attr + + pkcs10Attr = + pkcs10Attr + + "<ChallengePassword><Password>" - + (String) attr.get(ChallengePassword.PASSWORD) + "</Password></ChallengePassword>"; + + (String) attr.get(ChallengePassword.PASSWORD) + + "</Password></ChallengePassword>"; } } String extensionsStr = ""; if (attr.getName().equals(ExtensionsRequested.NAME)) { - Enumeration exts = ((ExtensionsRequested) attr).getExtensions().elements(); + Enumeration<Extension> exts = ((ExtensionsRequested) attr).getExtensions().elements(); while (exts.hasMoreElements()) { - Extension ext = (Extension) exts.nextElement(); + Extension ext = exts.nextElement(); if (ext.getExtensionId().equals( OIDMap.getOID(SubjectAlternativeNameExtension.IDENT))) { @@ -716,14 +720,16 @@ public class CRSEnrollment extends HttpServlet { Boolean.valueOf(false), // noncritical ext.getExtensionValue()); - Vector v = - (Vector) sane.get(SubjectAlternativeNameExtension.SUBJECT_NAME); + @SuppressWarnings("unchecked") + Vector<GeneralNameInterface> v = + (Vector<GeneralNameInterface>) sane + .get(SubjectAlternativeNameExtension.SUBJECT_NAME); - Enumeration gne = v.elements(); + Enumeration<GeneralNameInterface> gne = v.elements(); StringBuffer subjAltNameStr = new StringBuffer(); while (gne.hasMoreElements()) { - GeneralNameInterface gni = (GeneralNameInterface) gne.nextElement(); + GeneralNameInterface gni = gne.nextElement(); if (gni instanceof GeneralName) { GeneralName genName = (GeneralName) gni; @@ -974,14 +980,14 @@ public class CRSEnrollment extends HttpServlet { IRequestQueue rq = ca.getRequestQueue(); IRequest foundRequest = null; - Enumeration rids = rq.findRequestsBySourceId(txid); + Enumeration<RequestId> rids = rq.findRequestsBySourceId(txid); if (rids == null) { return null; } int count = 0; while (rids.hasMoreElements()) { - RequestId rid = (RequestId) rids.nextElement(); + RequestId rid = rids.nextElement(); if (rid == null) { continue; } @@ -1151,12 +1157,11 @@ public class CRSEnrollment extends HttpServlet { IRequest issueReq = null; X509CertImpl issuedCert = null; - Vector extensionsRequested = null; SubjectAlternativeNameExtension sane = null; CertAttrSet requested_ext = null; try { - PKCS10 p10 = (PKCS10) req.getP10(); + PKCS10 p10 = req.getP10(); if (p10 == null) { crsResp.setFailInfo(CRSPKIMessage.mFailInfo_badMessageCheck); @@ -1185,10 +1190,10 @@ public class CRSEnrollment extends HttpServlet { // one RDN, with many AVA's to // many RDN's with one AVA in each. - Enumeration rdne = p10subject.getRDNs(); - Vector rdnv = new Vector(); + Enumeration<RDN> rdne = p10subject.getRDNs(); + Vector<RDN> rdnv = new Vector<RDN>(); - Hashtable sanehash = new Hashtable(); + Hashtable<String, String> sanehash = new Hashtable<String, String>(); X500NameAttrMap xnap = X500NameAttrMap.getDefault(); while (rdne.hasMoreElements()) { @@ -1228,7 +1233,7 @@ public class CRSEnrollment extends HttpServlet { kue.set(KeyUsageExtension.KEY_ENCIPHERMENT, Boolean.valueOf(true)); PKCS10Attributes p10atts = p10.getAttributes(); - Enumeration e = p10atts.getElements(); + Enumeration<PKCS10Attribute> e = p10atts.getElements(); while (e.hasMoreElements()) { PKCS10Attribute p10a = (PKCS10Attribute) e.nextElement(); @@ -1246,9 +1251,9 @@ public class CRSEnrollment extends HttpServlet { if (attr.getName().equals(ExtensionsRequested.NAME)) { - Enumeration exts = ((ExtensionsRequested) attr).getExtensions().elements(); + Enumeration<Extension> exts = ((ExtensionsRequested) attr).getExtensions().elements(); while (exts.hasMoreElements()) { - Extension ext = (Extension) exts.nextElement(); + Extension ext = exts.nextElement(); if (ext.getExtensionId().equals( OIDMap.getOID(KeyUsageExtension.IDENT))) { @@ -1265,10 +1270,12 @@ public class CRSEnrollment extends HttpServlet { new Boolean(false), // noncritical ext.getExtensionValue()); - Vector v = - (Vector) sane.get(SubjectAlternativeNameExtension.SUBJECT_NAME); + @SuppressWarnings("unchecked") + Vector<GeneralNameInterface> v = + (Vector<GeneralNameInterface>) sane + .get(SubjectAlternativeNameExtension.SUBJECT_NAME); - Enumeration gne = v.elements(); + Enumeration<GeneralNameInterface> gne = v.elements(); while (gne.hasMoreElements()) { GeneralNameInterface gni = (GeneralNameInterface) gne.nextElement(); @@ -1308,8 +1315,8 @@ public class CRSEnrollment extends HttpServlet { } catch (Exception sne) { log(ILogger.LL_INFO, - "Unable to use appendDN parameter: " + mAppendDN + ". Error is " + sne.getMessage() - + " Using unmodified subjectname"); + "Unable to use appendDN parameter: " + + mAppendDN + ". Error is " + sne.getMessage() + " Using unmodified subjectname"); } if (subject != null) @@ -1350,7 +1357,7 @@ public class CRSEnrollment extends HttpServlet { } // NEED TO FIX } - private SubjectAlternativeNameExtension makeDefaultSubjectAltName(Hashtable ht) { + private SubjectAlternativeNameExtension makeDefaultSubjectAltName(Hashtable<String, String> ht) { // if no subjectaltname extension was requested, we try to make it up // from some of the elements of the subject name @@ -1359,7 +1366,7 @@ public class CRSEnrollment extends HttpServlet { GeneralNameInterface[] gn = new GeneralNameInterface[ht.size()]; itemCount = 0; - Enumeration en = ht.keys(); + Enumeration<String> en = ht.keys(); while (en.hasMoreElements()) { String key = (String) en.nextElement(); if (key.equals(SANE_DNSNAME)) { @@ -1445,15 +1452,15 @@ public class CRSEnrollment extends HttpServlet { return authenticationFailed; } - private boolean areFingerprintsEqual(IRequest req, Hashtable fingerprints) { + private boolean areFingerprintsEqual(IRequest req, Hashtable<String, byte[]> fingerprints) { - Hashtable old_fprints = req.getExtDataInHashtable(IRequest.FINGERPRINTS); + Hashtable<String, String> old_fprints = req.getExtDataInHashtable(IRequest.FINGERPRINTS); if (old_fprints == null) { return false; } - byte[] old_md5 = CMS.AtoB((String) old_fprints.get("MD5")); - byte[] new_md5 = (byte[]) fingerprints.get("MD5"); + byte[] old_md5 = CMS.AtoB(old_fprints.get("MD5")); + byte[] new_md5 = fingerprints.get("MD5"); if (old_md5.length != new_md5.length) return false; @@ -1474,7 +1481,7 @@ public class CRSEnrollment extends HttpServlet { try { unwrapPKCS10(req, cx); - Hashtable fingerprints = makeFingerPrints(req); + Hashtable<String, byte[]> fingerprints = makeFingerPrints(req); if (cmsRequest != null) { if (areFingerprintsEqual(cmsRequest, fingerprints)) { @@ -1562,7 +1569,7 @@ public class CRSEnrollment extends HttpServlet { // use profile framework to handle SCEP if (mProfileId != null) { - PKCS10 pkcs10data = (PKCS10) req.getP10(); + PKCS10 pkcs10data = req.getP10(); String pkcs10blob = CMS.BtoA(pkcs10data.toByteArray()); // XXX authentication handling @@ -1673,10 +1680,10 @@ public class CRSEnrollment extends HttpServlet { } catch (Exception pwex) { } - Hashtable fingerprints = (Hashtable) req.get(IRequest.FINGERPRINTS); + Hashtable<?, ?> fingerprints = (Hashtable<?, ?>) req.get(IRequest.FINGERPRINTS); if (fingerprints.size() > 0) { - Hashtable encodedPrints = new Hashtable(fingerprints.size()); - Enumeration e = fingerprints.keys(); + Hashtable<String, String> encodedPrints = new Hashtable<String, String>(fingerprints.size()); + Enumeration<?> e = fingerprints.keys(); while (e.hasMoreElements()) { String key = (String) e.nextElement(); byte[] value = (byte[]) fingerprints.get(key); @@ -1706,8 +1713,8 @@ public class CRSEnrollment extends HttpServlet { return pkiReq; } - public Hashtable makeFingerPrints(CRSPKIMessage req) { - Hashtable fingerprints = new Hashtable(); + public Hashtable<String, byte[]> makeFingerPrints(CRSPKIMessage req) { + Hashtable<String, byte[]> fingerprints = new Hashtable<String, byte[]>(); MessageDigest md; String[] hashes = new String[] { "MD2", "MD5", "SHA1", "SHA256", "SHA512" }; @@ -1936,7 +1943,7 @@ public class CRSEnrollment extends HttpServlet { private CryptoToken keyStorageToken; private CryptoToken internalKeyStorageToken; private KeyGenerator DESkg; - private Enumeration externalTokens = null; + private Enumeration<?> externalTokens = null; private org.mozilla.jss.crypto.X509Certificate signingCert; private org.mozilla.jss.crypto.PrivateKey signingCertPrivKey; private int signingCertKeySize = 0; @@ -2033,11 +2040,11 @@ public class CRSEnrollment extends HttpServlet { return internalToken; } - public void setExternalTokens(Enumeration tokens) { + public void setExternalTokens(Enumeration<?> tokens) { externalTokens = tokens; } - public Enumeration getExternalTokens() { + public Enumeration<?> getExternalTokens() { return externalTokens; } diff --git a/pki/base/common/src/com/netscape/cms/servlet/cert/scep/ChallengePassword.java b/pki/base/common/src/com/netscape/cms/servlet/cert/scep/ChallengePassword.java index 8a3ddb5d9..ff55dc9ce 100644 --- a/pki/base/common/src/com/netscape/cms/servlet/cert/scep/ChallengePassword.java +++ b/pki/base/common/src/com/netscape/cms/servlet/cert/scep/ChallengePassword.java @@ -23,7 +23,7 @@ import java.io.InputStream; import java.io.OutputStream; import java.security.cert.CertificateException; import java.util.Enumeration; -import java.util.Hashtable; +import java.util.Vector; import netscape.security.util.DerValue; import netscape.security.x509.CertAttrSet; @@ -127,8 +127,8 @@ public class ChallengePassword implements CertAttrSet { /** * @return an empty set of elements */ - public Enumeration getElements() { - return (new Hashtable()).elements(); + public Enumeration<String> getAttributeNames() { + return (new Vector<String>()).elements(); } /** diff --git a/pki/base/common/src/com/netscape/cms/servlet/cert/scep/ExtensionsRequested.java b/pki/base/common/src/com/netscape/cms/servlet/cert/scep/ExtensionsRequested.java index 33c28447f..b3a0f5651 100644 --- a/pki/base/common/src/com/netscape/cms/servlet/cert/scep/ExtensionsRequested.java +++ b/pki/base/common/src/com/netscape/cms/servlet/cert/scep/ExtensionsRequested.java @@ -23,7 +23,6 @@ import java.io.InputStream; import java.io.OutputStream; import java.security.cert.CertificateException; import java.util.Enumeration; -import java.util.Hashtable; import java.util.Vector; import netscape.security.util.DerInputStream; @@ -41,7 +40,7 @@ public class ExtensionsRequested implements CertAttrSet { private String kue_digital_signature = "false"; private String kue_key_encipherment = "false"; - private Vector exts = new Vector(); + private Vector<Extension> exts = new Vector<Extension>(); public ExtensionsRequested(Object stuff) throws IOException { ByteArrayInputStream is = new ByteArrayInputStream((byte[]) stuff); @@ -85,8 +84,8 @@ public class ExtensionsRequested implements CertAttrSet { throws CertificateException, IOException { } - public Enumeration getElements() { - return (new Hashtable()).elements(); + public Enumeration<String> getAttributeNames() { + return (new Vector<String>()).elements(); } public String getName() { @@ -171,7 +170,7 @@ public class ExtensionsRequested implements CertAttrSet { } - public Vector getExtensions() { + public Vector<Extension> getExtensions() { return exts; } |