From 7c7b9d023cd466c1771068badc020dab36beb553 Mon Sep 17 00:00:00 2001 From: Endi Sukma Dewata Date: Thu, 5 Apr 2012 14:49:11 -0500 Subject: Removed whitespaces from Java code. Whitespaces in Java code have been removed with the following command: find . -not -path .git -name *.java -exec sed -i 's/[[:blank:]]\+$//' {} \; Ticket #134 --- base/ca/src/com/netscape/ca/CAPolicy.java | 4 +- base/ca/src/com/netscape/ca/CAService.java | 76 +++++++++++----------- base/ca/src/com/netscape/ca/CMSCRLExtensions.java | 4 +- base/ca/src/com/netscape/ca/CRLIssuingPoint.java | 62 +++++++++--------- .../src/com/netscape/ca/CRLWithExpiredCerts.java | 4 +- .../src/com/netscape/ca/CertificateAuthority.java | 44 ++++++------- base/ca/src/com/netscape/ca/SigningUnit.java | 8 +-- 7 files changed, 101 insertions(+), 101 deletions(-) (limited to 'base/ca/src/com/netscape') diff --git a/base/ca/src/com/netscape/ca/CAPolicy.java b/base/ca/src/com/netscape/ca/CAPolicy.java index 4df28d344..fa41a961a 100644 --- a/base/ca/src/com/netscape/ca/CAPolicy.java +++ b/base/ca/src/com/netscape/ca/CAPolicy.java @@ -38,7 +38,7 @@ import com.netscape.cmscore.util.Debug; * connectors. * XXX2 moved to just implement IPolicy since GenericPolicyProcessor is * unuseable for CA. - * + * * @deprecated * @version $Revision$, $Date$ */ @@ -90,7 +90,7 @@ public class CAPolicy implements IPolicy { return true; } - /** + /** */ public PolicyResult apply(IRequest r) { if (r == null) { diff --git a/base/ca/src/com/netscape/ca/CAService.java b/base/ca/src/com/netscape/ca/CAService.java index 62bae3b5f..919f01e96 100644 --- a/base/ca/src/com/netscape/ca/CAService.java +++ b/base/ca/src/com/netscape/ca/CAService.java @@ -119,7 +119,7 @@ public class CAService implements ICAService, IService { public CAService(ICertificateAuthority ca) { mCA = ca; - // init services. + // init services. mServants.put( IRequest.ENROLLMENT_REQUEST, new serviceIssue(this)); @@ -170,11 +170,11 @@ public class CAService implements ICAService, IService { try { // MOVED TO com.netscape.certsrv.apps.CMS // java.security.Security.addProvider(new netscape.security.provider.CMS()); - // java.security.Provider pr = java.security.Security.getProvider("CMS"); + // java.security.Provider pr = java.security.Security.getProvider("CMS"); // if (pr != null) { // ; - // } - // else + // } + // else // Debug.trace("Something is wrong in CMS install !"); java.security.cert.CertificateFactory cf = java.security.cert.CertificateFactory.getInstance("X.509"); @@ -282,20 +282,20 @@ public class CAService implements ICAService, IService { RemoteAuthority remauthority = new RemoteAuthority(host, port, uri, timeout); - // Change end + // Change end if (nickname == null) nickname = mCA.getNickname(); // Changed by beomsuk - //connector = + //connector = // new HttpConnector(mCA, nickname, remauthority, resendInterval); if (timeout == 0) connector = new HttpConnector((IAuthority) mCA, nickname, remauthority, resendInterval, config); else connector = new HttpConnector((IAuthority) mCA, nickname, remauthority, resendInterval, config, timeout); - // Change end + // Change end - // log(ILogger.LL_INFO, "remote authority "+ + // log(ILogger.LL_INFO, "remote authority "+ // host+":"+port+" "+uri+" inited"); } return connector; @@ -346,19 +346,19 @@ public class CAService implements ICAService, IService { // This function is called only from ConnectorServlet - // serialize to request queue + // serialize to request queue } /** * method interface for IService *

- * + * *

- * + * * @param request a certificate enrollment request from an RA or CA * @return true or false */ @@ -635,7 +635,7 @@ public class CAService implements ICAService, IService { certi.get(X509CertInfo.KEY) == null) { mCA.log(ILogger.LL_FAILURE, CMS.getLogMessage("CMSCORE_CA_MISSING_ATTR")); - // XXX how do you reject a request in the service object ? + // XXX how do you reject a request in the service object ? throw new ECAException( CMS.getUserMessage("CMS_CA_MISSING_REQD_FIELDS_IN_CERTISSUE")); } @@ -647,8 +647,8 @@ public class CAService implements ICAService, IService { } // set default validity if not set. - // validity would normally be set by policies or by - // agent or by authentication module. + // validity would normally be set by policies or by + // agent or by authentication module. CertificateValidity validity = (CertificateValidity) certi.get(X509CertInfo.VALIDITY); Date begin = null, end = null; @@ -673,7 +673,7 @@ public class CAService implements ICAService, IService { /* * For non-CA certs, check if validity exceeds CA time. - * If so, set to CA's not after if default validity + * If so, set to CA's not after if default validity * exceeds ca's not after. */ @@ -787,12 +787,12 @@ public class CAService implements ICAService, IService { CMS.getUserMessage("CMS_CA_MISSING_INFO_IN_RENEWREQ")); } } catch (CertificateException e) { - // not possible + // not possible mCA.log(ILogger.LL_FAILURE, CMS.getLogMessage("CMSCORE_CA_NO_ORG_SERIAL", e.getMessage())); throw new ECAException( CMS.getUserMessage("CMS_CA_MISSING_INFO_IN_RENEWREQ")); } catch (IOException e) { - // not possible. + // not possible. mCA.log(ILogger.LL_FAILURE, CMS.getLogMessage("CMSCORE_CA_NO_ORG_SERIAL", e.getMessage())); throw new ECAException( CMS.getUserMessage("CMS_CA_MISSING_INFO_IN_RENEWREQ")); @@ -868,8 +868,8 @@ public class CAService implements ICAService, IService { boolean renewal, BigInteger oldSerialNo, String crmfReqId, String challengePassword, String profileId) throws EBaseException { // now store in repository. - // if renewal, set the old serial number in the new cert, - // set the new serial number in the old cert. + // if renewal, set the old serial number in the new cert, + // set the new serial number in the old cert. CMS.debug("In storeX509Cert"); try { @@ -1131,10 +1131,10 @@ public class CAService implements ICAService, IService { /** * Signed Audit Log - * + * * This method is called to store messages to the signed audit log. *

- * + * * @param msg signed audit log message */ private void audit(String msg) { @@ -1154,11 +1154,11 @@ public class CAService implements ICAService, IService { /** * Signed Audit Log Subject ID - * + * * This method is called to obtain the "SubjectID" for * a signed audit log message. *

- * + * * @return id string containing the signed audit log message SubjectID */ private String auditSubjectID() { @@ -1190,11 +1190,11 @@ public class CAService implements ICAService, IService { /** * Signed Audit Log Requester ID - * + * * This method is called to obtain the "RequesterID" for * a signed audit log message. *

- * + * * @return id string containing the signed audit log message RequesterID */ private String auditRequesterID() { @@ -1244,7 +1244,7 @@ class serviceIssue implements IServant { public boolean service(IRequest request) throws EBaseException { - // XXX This is ugly. should associate attributes with + // XXX This is ugly. should associate attributes with // request types, not policy. // XXX how do we know what to look for in request ? @@ -1256,7 +1256,7 @@ class serviceIssue implements IServant { public boolean serviceX509(IRequest request) throws EBaseException { - // XXX This is ugly. should associate attributes with + // XXX This is ugly. should associate attributes with // request types, not policy. // XXX how do we know what to look for in request ? X509CertInfo certinfos[] = @@ -1293,14 +1293,14 @@ class serviceIssue implements IServant { e.printStackTrace(); mCA.log(ILogger.LL_FAILURE, CMS.getLogMessage("CMSCORE_CA_STORE_ERROR", Integer.toString(i), rid, e.toString())); - ex = e; // save to throw later. + ex = e; // save to throw later. break; } } if (ex != null) { for (int j = 0; j < i; j++) { - // delete the stored cert records from the database. - // we issue all or nothing. + // delete the stored cert records from the database. + // we issue all or nothing. BigInteger serialNo = ((X509Certificate) certs[i]).getSerialNumber(); @@ -1400,7 +1400,7 @@ class serviceRenewal implements IServant { continue; } - // check if cert has been revoked. + // check if cert has been revoked. String certStatus = certRecord.getStatus(); if (certStatus.equals(ICertRecord.STATUS_REVOKED) || @@ -1425,7 +1425,7 @@ class serviceRenewal implements IServant { mCA.getCertificateRepository().getX509Certificate(serial); if (cert == null) { - // something wrong + // something wrong mCA.log(ILogger.LL_FAILURE, CMS.getLogMessage("CMSCORE_CA_MISSING_RENEWED", serial.toString())); svcerrors[i] = new ECAException( @@ -1571,8 +1571,8 @@ class serviceCheckChallenge implements IServant { public boolean service(IRequest request) throws EBaseException { - // note: some request attributes used below are set in - // authentication/ChallengePhraseAuthentication.java :( + // note: some request attributes used below are set in + // authentication/ChallengePhraseAuthentication.java :( BigInteger serialno = request.getExtDataInBigInteger("serialNumber"); String pwd = request.getExtDataInString( CAService.CHALLENGE_PHRASE); @@ -1681,14 +1681,14 @@ class serviceRevoke implements IServant { throws EBaseException { boolean sendStatus = true; // XXX Need to think passing as array. - // XXX every implemented according to servlet. + // XXX every implemented according to servlet. RevokedCertImpl crlentries[] = request.getExtDataInRevokedCertArray(IRequest.CERT_INFO); if (crlentries == null || crlentries.length == 0 || crlentries[0] == null) { - // XXX should this be an error ? + // XXX should this be an error ? mCA.log(ILogger.LL_FAILURE, CMS.getLogMessage("CMSCORE_CA_CRL_NOT_FOUND", request.getRequestId().toString())); throw new ECAException(CMS.getUserMessage("CMS_CA_MISSING_INFO_IN_REVREQ")); @@ -1992,7 +1992,7 @@ class serviceCert4Crl implements IServant { public boolean service(IRequest request) throws EBaseException { // XXX Need to think passing as array. - // XXX every implemented according to servlet. + // XXX every implemented according to servlet. BigInteger revokedCertIds[] = request.getExtDataInBigIntegerArray( IRequest.REVOKED_CERT_RECORDS); if (revokedCertIds == null || @@ -2012,7 +2012,7 @@ class serviceCert4Crl implements IServant { if (revokedCertRecs == null || revokedCertRecs.length == 0 || revokedCertRecs[0] == null) { - // XXX should this be an error ? + // XXX should this be an error ? mCA.log(ILogger.LL_FAILURE, CMS.getLogMessage("CMSCORE_CA_CERT4CRL_NO_ENTRY", request.getRequestId().toString())); throw new ECAException(CMS.getUserMessage("CMS_CA_MISSING_INFO_IN_CLAREQ")); diff --git a/base/ca/src/com/netscape/ca/CMSCRLExtensions.java b/base/ca/src/com/netscape/ca/CMSCRLExtensions.java index 94693d69a..bbb4e5f19 100644 --- a/base/ca/src/com/netscape/ca/CMSCRLExtensions.java +++ b/base/ca/src/com/netscape/ca/CMSCRLExtensions.java @@ -431,7 +431,7 @@ public class CMSCRLExtensions implements ICMSCRLExtensions { } public boolean isCRLExtensionEnabled(String extName) { - return ((mCRLExtensionNames.contains(extName) || mCRLEntryExtensionNames.contains(extName)) && + return ((mCRLExtensionNames.contains(extName) || mCRLEntryExtensionNames.contains(extName)) && mEnabledCRLExtensions.contains(extName)); } @@ -610,7 +610,7 @@ public class CMSCRLExtensions implements ICMSCRLExtensions { mCriticalCRLExtensions.remove(id); } } - //Sync the onlyContainsCACerts with similar property in CRLIssuingPoint + //Sync the onlyContainsCACerts with similar property in CRLIssuingPoint //called caCertsOnly. if (name.equals(CMSIssuingDistributionPointExtension.PROP_CACERTS)) { NameValuePairs crlIssuingPointPairs = null; diff --git a/base/ca/src/com/netscape/ca/CRLIssuingPoint.java b/base/ca/src/com/netscape/ca/CRLIssuingPoint.java index d4b747b32..e55c95cfd 100644 --- a/base/ca/src/com/netscape/ca/CRLIssuingPoint.java +++ b/base/ca/src/com/netscape/ca/CRLIssuingPoint.java @@ -92,7 +92,7 @@ import com.netscape.cmscore.util.Debug; * parameter minUpdateInterval can be used to prevent CRL * from being updated too often *

- * + * * @author awnuk * @author lhsiao * @author galperin @@ -415,7 +415,7 @@ public class CRLIssuingPoint implements ICRLIssuingPoint, Runnable { /** * Initializes a CRL issuing point config. *

- * + * * @param ca reference to CertificateAuthority instance which * owns this issuing point. * @param id string id of this CRL issuing point. @@ -697,10 +697,10 @@ public class CRLIssuingPoint implements ICRLIssuingPoint, Runnable { mAutoUpdateInterval < mMinUpdateInterval) mAutoUpdateInterval = mMinUpdateInterval; - // get next update grace period + // get next update grace period mNextUpdateGracePeriod = MINUTE * config.getInteger(Constants.PR_GRACE_PERIOD, 0); - // Get V2 or V1 CRL + // Get V2 or V1 CRL mAllowExtensions = config.getBoolean(Constants.PR_EXTENSIONS, false); mIncludeExpiredCerts = config.getBoolean(Constants.PR_INCLUDE_EXPIREDCERTS, false); @@ -718,13 +718,13 @@ public class CRLIssuingPoint implements ICRLIssuingPoint, Runnable { String algorithm = config.getString(Constants.PR_SIGNING_ALGORITHM, null); if (algorithm != null) { - // make sure this algorithm is acceptable to CA. + // make sure this algorithm is acceptable to CA. mCA.getCRLSigningUnit().checkSigningAlgorithmFromName(algorithm); mSigningAlgorithm = algorithm; } mPublishOnStart = config.getBoolean(PROP_PUBLISH_ON_START, false); - // if publish dn is null then certificate will be published to + // if publish dn is null then certificate will be published to // CA's entry in the directory. mPublishDN = config.getString(PROP_PUBLISH_DN, null); @@ -771,7 +771,7 @@ public class CRLIssuingPoint implements ICRLIssuingPoint, Runnable { return; } catch (EBaseException e) { // CRL was never set. - // fall to the following.. + // fall to the following.. } if (crlRecord != null) { @@ -892,7 +892,7 @@ public class CRLIssuingPoint implements ICRLIssuingPoint, Runnable { } if (crlRecord == null) { - // no crl was ever created, or crl in db is corrupted. + // no crl was ever created, or crl in db is corrupted. // create new one. try { crlRecord = new CRLIssuingPointRecord(mId, BigInteger.ZERO, Long.valueOf(-1), @@ -1248,7 +1248,7 @@ public class CRLIssuingPoint implements ICRLIssuingPoint, Runnable { /** * Returns internal id of this CRL issuing point. *

- * + * * @return internal id of this CRL issuing point */ public String getId() { @@ -1258,7 +1258,7 @@ public class CRLIssuingPoint implements ICRLIssuingPoint, Runnable { /** * Returns internal description of this CRL issuing point. *

- * + * * @return internal description of this CRL issuing point */ public String getDescription() { @@ -1267,7 +1267,7 @@ public class CRLIssuingPoint implements ICRLIssuingPoint, Runnable { /** * Sets internal description of this CRL issuing point. - * + * * @param description description for this CRL issuing point. */ public void setDescription(String description) { @@ -1278,7 +1278,7 @@ public class CRLIssuingPoint implements ICRLIssuingPoint, Runnable { * Returns DN of the directory entry where CRLs.from this issuing point * are published. *

- * + * * @return DN of the directory entry where CRLs are published. */ public String getPublishDN() { @@ -1288,7 +1288,7 @@ public class CRLIssuingPoint implements ICRLIssuingPoint, Runnable { /** * Returns signing algorithm. *

- * + * * @return SigningAlgorithm. */ public String getSigningAlgorithm() { @@ -1302,7 +1302,7 @@ public class CRLIssuingPoint implements ICRLIssuingPoint, Runnable { /** * Returns current CRL generation schema for this CRL issuing point. *

- * + * * @return current CRL generation schema for this CRL issuing point */ public int getCRLSchema() { @@ -1312,7 +1312,7 @@ public class CRLIssuingPoint implements ICRLIssuingPoint, Runnable { /** * Returns current CRL number of this CRL issuing point. *

- * + * * @return current CRL number of this CRL issuing point */ public BigInteger getCRLNumber() { @@ -1322,7 +1322,7 @@ public class CRLIssuingPoint implements ICRLIssuingPoint, Runnable { /** * Returns current delta CRL number of this CRL issuing point. *

- * + * * @return current delta CRL number of this CRL issuing point */ public BigInteger getDeltaCRLNumber() { @@ -1332,7 +1332,7 @@ public class CRLIssuingPoint implements ICRLIssuingPoint, Runnable { /** * Returns next CRL number of this CRL issuing point. *

- * + * * @return next CRL number of this CRL issuing point */ public BigInteger getNextCRLNumber() { @@ -1342,7 +1342,7 @@ public class CRLIssuingPoint implements ICRLIssuingPoint, Runnable { /** * Returns number of entries in the CRL *

- * + * * @return number of entries in the CRL */ public long getCRLSize() { @@ -1352,7 +1352,7 @@ public class CRLIssuingPoint implements ICRLIssuingPoint, Runnable { /** * Returns number of entries in delta CRL *

- * + * * @return number of entries in delta CRL */ public long getDeltaCRLSize() { @@ -1362,7 +1362,7 @@ public class CRLIssuingPoint implements ICRLIssuingPoint, Runnable { /** * Returns last update time *

- * + * * @return last CRL update time */ public Date getLastUpdate() { @@ -1372,7 +1372,7 @@ public class CRLIssuingPoint implements ICRLIssuingPoint, Runnable { /** * Returns next update time *

- * + * * @return next CRL update time */ public Date getNextUpdate() { @@ -1382,7 +1382,7 @@ public class CRLIssuingPoint implements ICRLIssuingPoint, Runnable { /** * Returns next update time *

- * + * * @return next CRL update time */ public Date getNextDeltaUpdate() { @@ -1392,7 +1392,7 @@ public class CRLIssuingPoint implements ICRLIssuingPoint, Runnable { /** * Returns all the revoked certificates from the CRL cache. *

- * + * * @return set of all the revoked certificates or null if there are none. */ public Set getRevokedCertificates(int start, int end) { @@ -1407,7 +1407,7 @@ public class CRLIssuingPoint implements ICRLIssuingPoint, Runnable { /** * Returns certificate authority. *

- * + * * @return certificate authority */ public ISubsystem getCertificateAuthority() { @@ -1488,7 +1488,7 @@ public class CRLIssuingPoint implements ICRLIssuingPoint, Runnable { /** * Finds next update time expressed as delay or time of the next update. - * + * * @param fromLastUpdate if true, function returns delay to the next update time * otherwise returns the next update time. * @param delta if true, function returns the next update time for delta CRL, @@ -1756,7 +1756,7 @@ public class CRLIssuingPoint implements ICRLIssuingPoint, Runnable { Debug.printStackTrace(e); } } - // put this here to prevent continuous loop if internal + // put this here to prevent continuous loop if internal // db is down. if (mDoLastAutoUpdate) mDoLastAutoUpdate = false; @@ -1784,8 +1784,8 @@ public class CRLIssuingPoint implements ICRLIssuingPoint, Runnable { */ private void updateCRL() throws EBaseException { /* - if (mEnableUpdateFreq && mAutoUpdateInterval > 0 && - (System.currentTimeMillis() - mLastUpdate.getTime() < + if (mEnableUpdateFreq && mAutoUpdateInterval > 0 && + (System.currentTimeMillis() - mLastUpdate.getTime() < mMinUpdateInterval)) { // log or alternatively throw an Exception return; @@ -1852,7 +1852,7 @@ public class CRLIssuingPoint implements ICRLIssuingPoint, Runnable { * This does not include expired certs. * Override this method to make a CRL other than the * full/complete CRL. - * + * * @return Enumeration of CertRecords to put into CRL. * @exception EBaseException if an error occured in the database. */ @@ -2793,8 +2793,8 @@ public class CRLIssuingPoint implements ICRLIssuingPoint, Runnable { /* * The Session Context is a Hashtable, but without type information. - * Suppress the warnings generated by adding to the session context - * + * Suppress the warnings generated by adding to the session context + * */ protected void publishCRL(X509CRLImpl x509crl, boolean isDeltaCRL) throws EBaseException { diff --git a/base/ca/src/com/netscape/ca/CRLWithExpiredCerts.java b/base/ca/src/com/netscape/ca/CRLWithExpiredCerts.java index 9ad619ff8..0fa835051 100644 --- a/base/ca/src/com/netscape/ca/CRLWithExpiredCerts.java +++ b/base/ca/src/com/netscape/ca/CRLWithExpiredCerts.java @@ -31,9 +31,9 @@ public class CRLWithExpiredCerts extends CRLIssuingPoint { /** * overrides getRevokedCerts in CRLIssuingPoint to include * all revoked certs, including once that have expired. - * + * * @param thisUpdate parameter is ignored. - * + * * @exception EBaseException if an exception occured getting revoked * certificates from the database. */ diff --git a/base/ca/src/com/netscape/ca/CertificateAuthority.java b/base/ca/src/com/netscape/ca/CertificateAuthority.java index c8783f566..592f1557b 100644 --- a/base/ca/src/com/netscape/ca/CertificateAuthority.java +++ b/base/ca/src/com/netscape/ca/CertificateAuthority.java @@ -119,7 +119,7 @@ import com.netscape.cmsutil.ocsp.UnknownInfo; * A class represents a Certificate Authority that is * responsible for certificate specific operations. *

- * + * * @author lhsiao * @version $Revision$, $Date$ */ @@ -132,7 +132,7 @@ public class CertificateAuthority implements ICertificateAuthority, ICertAuthori protected IConfigStore mConfig = null; protected ILogger mLogger = CMS.getLogger(); protected Hashtable mCRLIssuePoints = new Hashtable(); - protected CRLIssuingPoint mMasterCRLIssuePoint = null; // the complete crl. + protected CRLIssuingPoint mMasterCRLIssuePoint = null; // the complete crl. protected SigningUnit mSigningUnit; protected SigningUnit mOCSPSigningUnit; protected SigningUnit mCRLSigningUnit; @@ -286,7 +286,7 @@ public class CertificateAuthority implements ICertificateAuthority, ICertAuthori /** * Initializes this CA subsystem. *

- * + * * @param owner owner of this subsystem * @param config configuration of this subsystem * @exception EBaseException failed to initialize this CA @@ -299,7 +299,7 @@ public class CertificateAuthority implements ICertificateAuthority, ICertAuthori mOwner = owner; mConfig = config; - // init cert & crl database. + // init cert & crl database. initCaDatabases(); // init signing unit & CA cert. @@ -374,8 +374,8 @@ public class CertificateAuthority implements ICertificateAuthority, ICertAuthori // rely on this subsystem, so it has to be initialized) initPublish(); - // Initialize CRL issuing points. - // note CRL framework depends on DBS, CRYPTO and PUBLISHING + // Initialize CRL issuing points. + // note CRL framework depends on DBS, CRYPTO and PUBLISHING // being functional. initCRL(); @@ -624,7 +624,7 @@ public class CertificateAuthority implements ICertificateAuthority, ICertAuthori /** * Retrieves certificate repository. *

- * + * * @return certificate repository */ public ICertificateRepository getCertificateRepository() { @@ -634,7 +634,7 @@ public class CertificateAuthority implements ICertificateAuthority, ICertAuthori /** * Retrieves replica repository. *

- * + * * @return replica repository */ public IReplicaIDRepository getReplicaRepository() { @@ -655,7 +655,7 @@ public class CertificateAuthority implements ICertificateAuthority, ICertAuthori /** * Retrieves the CRL issuing point by id. *

- * + * * @param id string id of the CRL issuing point * @return CRL issuing point */ @@ -666,7 +666,7 @@ public class CertificateAuthority implements ICertificateAuthority, ICertAuthori /** * Enumerates CRL issuing points *

- * + * * @return security service */ public Enumeration getCRLIssuingPoints() { @@ -855,7 +855,7 @@ public class CertificateAuthority implements ICertificateAuthority, ICertAuthori /** * Returns X500 name of the Certificate Authority *

- * + * * @return CA name */ public X500Name getX500Name() { @@ -873,7 +873,7 @@ public class CertificateAuthority implements ICertificateAuthority, ICertAuthori /** * Returns nickname of CA's signing cert. *

- * + * * @return CA signing cert nickname. */ public String getNickname() { @@ -883,7 +883,7 @@ public class CertificateAuthority implements ICertificateAuthority, ICertAuthori /** * Returns nickname of OCSP's signing cert. *

- * + * * @return OCSP signing cert nickname. */ public String getOCSPNickname() { @@ -893,7 +893,7 @@ public class CertificateAuthority implements ICertificateAuthority, ICertAuthori /** * Returns default signing unit used by this CA *

- * + * * @return request identifier */ public ISigningUnit getSigningUnit() { @@ -917,12 +917,12 @@ public class CertificateAuthority implements ICertificateAuthority, ICertAuthori * If no algorithm is specified the CA's default signing algorithm * is used. *

- * + * * @param crl the CRL to be signed. * @param algname the algorithm name to use. This is a JCA name such * as MD5withRSA, etc. If set to null the default signing algorithm * is used. - * + * * @return the signed CRL */ public X509CRLImpl sign(X509CRLImpl crl, String algname) @@ -991,7 +991,7 @@ public class CertificateAuthority implements ICertificateAuthority, ICertAuthori * Signs the given certificate info using specified signing algorithm * If no algorithm is specified the CA's default algorithm is used. *

- * + * * @param certInfo the certificate info to be signed. * @param algname the signing algorithm to use. These are names defined * in JCA, such as MD5withRSA, etc. If null the CA's default @@ -1078,7 +1078,7 @@ public class CertificateAuthority implements ICertificateAuthority, ICertAuthori * Sign a byte array using the specified algorithm. * If algorithm is null the CA's default algorithm is used. *

- * + * * @param data the data to be signed in a byte array. * @param algname the algorithm to use. * @return the signature in a byte array. @@ -1090,7 +1090,7 @@ public class CertificateAuthority implements ICertificateAuthority, ICertAuthori /** * logs a message in the CA area. - * + * * @param level the debug level. * @param msg the message to debug. */ @@ -1101,7 +1101,7 @@ public class CertificateAuthority implements ICertificateAuthority, ICertAuthori /** * Retrieves certificate chains of this CA. - * + * * @return this CA's cert chain. */ public CertificateChain getCACertChain() { @@ -1161,7 +1161,7 @@ public class CertificateAuthority implements ICertificateAuthority, ICertAuthori } ////////// - // Initialization routines. + // Initialization routines. // /** @@ -1351,7 +1351,7 @@ public class CertificateAuthority implements ICertificateAuthority, ICertAuthori try { mDefaultCertVersion = new CertificateVersion(version - 1); } catch (IOException e) { - // should never occur. + // should never occur. } int validity_in_days = mConfig.getInteger(PROP_DEF_VALIDITY, 2 * 365); diff --git a/base/ca/src/com/netscape/ca/SigningUnit.java b/base/ca/src/com/netscape/ca/SigningUnit.java index 85e3621d7..85ee1d482 100644 --- a/base/ca/src/com/netscape/ca/SigningUnit.java +++ b/base/ca/src/com/netscape/ca/SigningUnit.java @@ -51,7 +51,7 @@ import com.netscape.cmsutil.util.Cert; /** * CA signing unit based on JSS. - * + * * $Revision$ $Date$ */ @@ -209,10 +209,10 @@ public final class SigningUnit implements ISigningUnit { /** * Check if the signing algorithm name is supported and valid for this * signing unit's token and key. - * + * * @param algname a signing algorithm name from JCA. * @return the mapped JSS signature algorithm object. - * + * * @exception EBaseException if signing algorithm is not supported. */ public SignatureAlgorithm checkSigningAlgorithmFromName(String algname) @@ -263,7 +263,7 @@ public final class SigningUnit implements ISigningUnit { signAlg = checkSigningAlgorithmFromName(algname); } - // XXX use a pool of signers based on alg ? + // XXX use a pool of signers based on alg ? // XXX Map algor. name to id. hack: use hardcoded define for now. CMS.debug( "Getting algorithm context for " + algname + " " + signAlg); -- cgit