@@ -545,9 +545,9 @@ public FidoMetadataDownloaderBuilder clock(@NonNull Clock clock) {
545
545
/**
546
546
* Use the provided CRLs.
547
547
*
548
- * <p>CRLs will also be downloaded from distribution points if the <code>
549
- * com.sun.security.enableCRLDP</code> system property is set to <code>true</code> (assuming the
550
- * use of the {@link CertPathValidator} implementation from the SUN provider) .
548
+ * <p>CRLs will also be downloaded from distribution points for any certificates with a
549
+ * CRLDistributionPoints extension, if the extension can be successfully interpreted. A warning
550
+ * message will be logged CRLDistributionPoints parsing fails .
551
551
*
552
552
* @throws InvalidAlgorithmParameterException if {@link CertStore#getInstance(String,
553
553
* CertStoreParameters)} does.
@@ -563,9 +563,9 @@ public FidoMetadataDownloaderBuilder useCrls(@NonNull Collection<CRL> crls)
563
563
/**
564
564
* Use CRLs in the provided {@link CertStore}.
565
565
*
566
- * <p>CRLs will also be downloaded from distribution points if the <code>
567
- * com.sun.security.enableCRLDP</code> system property is set to <code>true</code> (assuming the
568
- * use of the {@link CertPathValidator} implementation from the SUN provider) .
566
+ * <p>CRLs will also be downloaded from distribution points for any certificates with a
567
+ * CRLDistributionPoints extension, if the extension can be successfully interpreted. A warning
568
+ * message will be logged CRLDistributionPoints parsing fails .
569
569
*
570
570
* @see #useCrls(Collection)
571
571
*/
@@ -693,7 +693,7 @@ public FidoMetadataDownloaderBuilder verifyDownloadsOnly(final boolean verifyDow
693
693
* @throws InvalidAlgorithmParameterException if certificate path validation fails.
694
694
* @throws InvalidKeyException if signature verification fails.
695
695
* @throws NoSuchAlgorithmException if signature verification fails, or if the SHA-256 algorithm
696
- * is not available.
696
+ * or the <code>"Collection"</code> type {@link CertStore} is not available.
697
697
* @throws SignatureException if signature verification fails.
698
698
* @throws UnexpectedLegalHeader if the downloaded BLOB (if any) contains a <code>"legalHeader"
699
699
* </code> value not configured in {@link
@@ -796,7 +796,7 @@ public MetadataBLOB loadCachedBlob()
796
796
* @throws InvalidAlgorithmParameterException if certificate path validation fails.
797
797
* @throws InvalidKeyException if signature verification fails.
798
798
* @throws NoSuchAlgorithmException if signature verification fails, or if the SHA-256 algorithm
799
- * is not available.
799
+ * or the <code>"Collection"</code> type {@link CertStore} is not available.
800
800
* @throws SignatureException if signature verification fails.
801
801
* @throws UnexpectedLegalHeader if the downloaded BLOB (if any) contains a <code>"legalHeader"
802
802
* </code> value not configured in {@link
@@ -968,7 +968,8 @@ private X509Certificate retrieveTrustRootCert()
968
968
* @throws IOException on failure to parse the BLOB contents.
969
969
* @throws InvalidAlgorithmParameterException if certificate path validation fails.
970
970
* @throws InvalidKeyException if signature verification fails.
971
- * @throws NoSuchAlgorithmException if signature verification fails.
971
+ * @throws NoSuchAlgorithmException if signature verification fails, or if the SHA-256 algorithm
972
+ * or the <code>"Collection"</code> type {@link CertStore} is not available.
972
973
* @throws SignatureException if signature verification fails.
973
974
* @throws FidoMetadataDownloaderException if the explicitly configured BLOB (if any) has a bad
974
975
* signature.
0 commit comments