/openjdk7/jdk/src/share/classes/java/security/cert/ |
H A D | X509CertSelector.java | 26 package java.security.cert; 170 * @param cert the <code>X509Certificate</code> to match (or 174 public void setCertificate(X509Certificate cert) { argument 175 x509Cert = cert; 1937 * @param cert a <code>X509Certificate</code> 1951 private static Extension getExtensionObject(X509Certificate cert, int extId) argument 1953 if (cert instanceof X509CertImpl) { 1954 X509CertImpl impl = (X509CertImpl)cert; 1970 byte[] rawExtVal = cert.getExtensionValue(EXTENSION_OIDS[extId]); 1999 * @param cert th 2003 match(Certificate cert) argument [all...] |
/openjdk7/jdk/src/share/classes/java/security/ |
H A D | KeyStore.java | 29 import java.security.cert.Certificate; 30 import java.security.cert.X509Certificate; 31 import java.security.cert.CertificateException; 183 * @see java.security.cert.Certificate 472 for (Certificate cert : chain) { 473 sb.append(cert); 532 private final Certificate cert; field in class:KeyStore.TrustedCertificateEntry 547 this.cert = trustedCert; 556 return cert; 564 return "Trusted certificate entry:\r\n" + cert 964 setCertificateEntry(String alias, Certificate cert) argument 1115 getCertificateAlias(Certificate cert) argument [all...] |
/openjdk7/jdk/src/share/classes/com/sun/org/apache/xml/internal/security/signature/ |
H A D | XMLSignature.java | 29 import java.security.cert.X509Certificate; 588 * @param cert Certificate that contains the public key part of the keypair that was used to sign. 592 public boolean checkSignatureValue(X509Certificate cert) argument 595 // see if cert is null 596 if (cert != null) { 598 //check the values with the public key from the cert 599 return this.checkSignatureValue(cert.getPublicKey()); 732 * Add an X509 Certificate to the KeyInfo. This will include the whole cert 735 * @param cert Certificate to be included. This should be the certificate of the key that was used to sign. 738 public void addKeyInfo(X509Certificate cert) throw argument [all...] |
/openjdk7/jdk/src/macosx/classes/apple/security/ |
H A D | KeychainStore.java | 30 import java.security.cert.*; 31 import java.security.cert.Certificate; 69 Certificate cert; field in class:KeychainStore.TrustedCertEntry 274 return ((TrustedCertEntry)entry).cert; 447 * @param cert the certificate 453 public void engineSetCertificateEntry(String alias, Certificate cert) argument 466 // This will be slow, but necessary. Enumerate the values and then see if the cert matches the one in the trusted cert entry. 473 if (tce.cert.equals(cert)) { 591 engineGetCertificateAlias(Certificate cert) argument 688 addCertificateToKeychain(String alias, Certificate cert) argument 869 CertKeychainItemPair(long inCertRef, Certificate cert) argument [all...] |
/openjdk7/jdk/src/windows/classes/sun/security/mscapi/ |
H A D | KeyStore.java | 40 import java.security.cert.X509Certificate; 41 import java.security.cert.Certificate; 42 import java.security.cert.CertificateException; 43 import java.security.cert.CertificateEncodingException; 44 import java.security.cert.CertificateFactory; 111 // TODO - set friendly name prop in cert store 466 * @param cert the certificate 472 public void engineSetCertificateEntry(String alias, Certificate cert) argument 479 if (cert instanceof X509Certificate) { 483 new X509Certificate[]{ (X509Certificate) cert }; 670 engineGetCertificateAlias(Certificate cert) argument [all...] |
/openjdk7/jdk/src/share/classes/sun/security/pkcs12/ |
H A D | PKCS12KeyStore.java | 38 import java.security.cert.Certificate; 39 import java.security.cert.CertificateFactory; 40 import java.security.cert.X509Certificate; 41 import java.security.cert.CertificateException; 152 // in pkcs12 with one private key entry and associated cert-chain 185 final X509Certificate cert; field in class:PKCS12KeyStore.CertEntry 188 CertEntry(X509Certificate cert, byte[] keyId, String alias) { argument 189 this.cert = cert; 419 // validate cert 647 engineSetCertificateEntry(String alias, Certificate cert) argument 743 engineGetCertificateAlias(Certificate cert) argument [all...] |
/openjdk7/jdk/src/share/classes/sun/security/ssl/ |
H A D | X509KeyManagerImpl.java | 36 import java.security.cert.*; 37 import java.security.cert.Certificate; 291 // if possible, check the public key in the issuer cert 322 * (i.e. a match with a cert that has appropriate key usage 505 CheckResult check(X509Certificate cert, Date date) { argument 513 List<String> certEku = cert.getExtendedKeyUsage(); 522 boolean[] ku = cert.getKeyUsage(); 524 String algorithm = cert.getPublicKey().getAlgorithm(); 566 cert.checkValidity(date); 579 EXPIRED, // extensions valid but cert expire [all...] |
/openjdk7/jdk/src/share/classes/sun/security/x509/ |
H A D | X509CertInfo.java | 31 import java.security.cert.*; 143 * @param cert the encoded bytes, with no trailing data. 146 public X509CertInfo(byte[] cert) throws CertificateParsingException { argument 148 DerValue in = new DerValue(cert); 164 * @param derVal the der value containing the encoded cert. 301 throw new NullPointerException("X.509 cert is incomplete"); 834 // Wrap the data; encoding of the "raw" cert is now complete.
|
H A D | X509CRLImpl.java | 41 import java.security.cert.Certificate; 42 import java.security.cert.X509CRL; 43 import java.security.cert.X509Certificate; 44 import java.security.cert.X509CRLEntry; 45 import java.security.cert.CRLException; 543 * @param cert the certificate to check for. 547 public boolean isRevoked(Certificate cert) { argument 548 if (revokedMap.isEmpty() || (!(cert instanceof X509Certificate))) { 551 X509Certificate xcert = (X509Certificate) cert; 646 // assume this is a direct CRL entry (cert an 655 getRevokedCertificate(X509Certificate cert) argument 1234 X509IssuerSerial(X509Certificate cert) argument [all...] |
H A D | X509CertImpl.java | 37 import java.security.cert.*; 38 import java.security.cert.Certificate; 312 * @param derVal the der value containing the encoded cert. 767 // the strongly typed gets, as per java.security.cert.X509Certificate 1474 public static List<String> getExtendedKeyUsage(X509Certificate cert) argument 1477 byte[] ext = cert.getExtensionValue(EXTENDED_KEY_USAGE_OID); 1552 // IPAddressName in cert is bogus 1567 // from cert (this would indicate a bug in our code) 1644 public static Collection<List<?>> getSubjectAlternativeNames(X509Certificate cert) argument 1647 byte[] ext = cert 1707 getIssuerAlternativeNames(X509Certificate cert) argument 1805 getX500Principal(X509Certificate cert, boolean getIssuer) argument 1832 getSubjectX500Principal(X509Certificate cert) argument 1844 getIssuerX500Principal(X509Certificate cert) argument 1858 getEncodedInternal(Certificate cert) argument 1872 toImpl(X509Certificate cert) argument 1885 isSelfIssued(X509Certificate cert) argument 1897 isSelfSigned(X509Certificate cert, String sigProvider) argument [all...] |
/openjdk7/jdk/src/share/classes/sun/security/pkcs11/ |
H A D | Secmod.java | 33 import java.security.cert.X509Certificate; 246 private static byte[] getDigest(X509Certificate cert, String algorithm) { argument 249 return md.digest(cert.getEncoded()); 255 boolean isTrusted(X509Certificate cert, TrustType trustType) { argument 256 Bytes bytes = new Bytes(getDigest(cert, "SHA-1")); 507 synchronized void setTrust(Token token, X509Certificate cert) { argument 508 Bytes bytes = new Bytes(getDigest(cert, "SHA-1")); 511 attr = new TrustAttributes(token, cert, bytes, CKT_NETSCAPE_TRUSTED_DELEGATOR); 614 TrustAttributes(Token token, X509Certificate cert, Bytes bytes, long trustValue) { argument 628 new CK_ATTRIBUTE(CKA_NETSCAPE_CERT_MD5_HASH, getDigest(cert, "MD [all...] |
H A D | P11KeyStore.java | 51 import java.security.cert.CertPath; 52 import java.security.cert.Certificate; 53 import java.security.cert.X509Certificate; 54 import java.security.cert.CertificateFactory; 55 import java.security.cert.CertificateException; 139 * same "personality" (for example, a signing cert and encryption cert), 161 // CKA_LABEL of cert and secret key 164 // CKA_ID of the private key/cert pair 167 // CKA_TRUSTED - true if cert i 171 private X509Certificate cert = null; field in class:P11KeyStore.AliasInfo 186 AliasInfo(String label, byte[] id, boolean trusted, X509Certificate cert) argument 513 engineSetCertificateEntry(String alias, Certificate cert) argument 679 engineGetCertificateAlias(Certificate cert) argument 1550 storeCert(String alias, X509Certificate cert) argument 2140 getID(String alias, X509Certificate cert) argument [all...] |
/openjdk7/jdk/src/share/classes/sun/security/provider/ |
H A D | PolicyFile.java | 47 import java.security.cert.Certificate; 48 import java.security.cert.X509Certificate; 1067 Certificate cert = null; 1068 // See if this alias's cert has already been cached 1070 cert = (Certificate)newInfo.aliasMapping.get(alias); 1072 if (cert == null && keyStore != null) { 1075 cert = keyStore.getCertificate(alias); 1080 if (cert != null) { 1081 newInfo.aliasMapping.put(alias, cert); 1082 newInfo.aliasMapping.put(cert, alia 2039 checkForTrustedIdentity(final Certificate cert, PolicyInfo myInfo) argument [all...] |
/openjdk7/jdk/src/share/classes/sun/security/provider/certpath/ldap/ |
H A D | LDAPCertStore.java | 44 import java.security.cert.Certificate; 45 import java.security.cert.*; 100 * @see java.security.cert.CertStore 440 Certificate cert = cf.generateCertificate(bais); 441 if (sel.match(cert)) { 442 certs.add((X509Certificate)cert); 447 + "exception while parsing cert, skipping the bad data: "); 470 /* fetch the encoded cert pairs from storage */ 485 /* decode each cert pair and add it to the Collection */ 495 + "while parsing cert, skippin 996 match(Certificate cert) argument [all...] |
/openjdk7/jdk/src/share/classes/sun/security/tools/ |
H A D | KeyTool.java | 43 import java.security.cert.Certificate; 44 import java.security.cert.CertificateFactory; 45 import java.security.cert.CRL; 46 import java.security.cert.X509Certificate; 47 import java.security.cert.CertificateException; 59 import java.security.cert.CertStore; 61 import java.security.cert.X509CRL; 62 import java.security.cert.X509CRLEntry; 63 import java.security.cert.X509CRLSelector; 268 ID("id", "<id:reason>", "Serial.ID.of.cert 2093 readCRLsFromCert(X509Certificate cert) argument 2830 printX509Cert(X509Certificate cert, PrintStream out) argument 2908 isSelfSigned(X509Certificate cert) argument 2933 getTrustedSigner(Certificate cert, KeyStore ks) argument 3031 dumpCert(Certificate cert, PrintStream out) argument 3198 getCertFingerPrint(String mdAlg, Certificate cert) argument [all...] |