Class RootStoreVerifier
java.lang.Object
com.itextpdf.signatures.CertificateVerifier
com.itextpdf.signatures.RootStoreVerifier
- Direct Known Subclasses:
CRLVerifier, LtvVerifier, OCSPVerifier
Deprecated.
Verifies a certificate against a
KeyStore
containing trusted anchors.-
Field Summary
FieldsModifier and TypeFieldDescriptionprotected KeyStoreDeprecated.A key store against which certificates can be verified.Fields inherited from class CertificateVerifier
onlineCheckingAllowed, verifier -
Constructor Summary
ConstructorsConstructorDescriptionRootStoreVerifier(CertificateVerifier verifier) Deprecated.Creates a RootStoreVerifier in a chain of verifiers. -
Method Summary
Modifier and TypeMethodDescriptionvoidsetRootStore(KeyStore keyStore) Deprecated.Sets the Key Store against which a certificate can be checked.verify(X509Certificate signCert, X509Certificate issuerCert, Date signDate) Deprecated.Verifies a single certificate against a key store (if present).Methods inherited from class CertificateVerifier
setOnlineCheckingAllowed
-
Field Details
-
rootStore
-
-
Constructor Details
-
RootStoreVerifier
Deprecated.Creates a RootStoreVerifier in a chain of verifiers.- Parameters:
verifier- the next verifier in the chain
-
-
Method Details
-
setRootStore
Deprecated.Sets the Key Store against which a certificate can be checked.- Parameters:
keyStore- a root store
-
verify
public List<VerificationOK> verify(X509Certificate signCert, X509Certificate issuerCert, Date signDate) throws GeneralSecurityException Deprecated.Verifies a single certificate against a key store (if present).- Overrides:
verifyin classCertificateVerifier- Parameters:
signCert- the certificate to verifyissuerCert- the issuer certificatesignDate- the date the certificate needs to be valid- Returns:
- a list of
VerificationOKobjects. The list will be empty if the certificate couldn't be verified. - Throws:
GeneralSecurityException- thrown if the certificate has expired, isn't valid yet, or if an exception has been thrown inCertificate#verify.
-
CertificateChainValidatorshould be used instead.