/openjdk10/jdk/src/java.base/share/classes/com/sun/net/ssl/ |
H A D | X509TrustManager.java | 47 * Given the partial or complete certificate chain 52 * @param chain the peer certificate chain 54 public boolean isClientTrusted(X509Certificate[] chain); argument 57 * Given the partial or complete certificate chain 62 * @param chain the peer certificate chain 64 public boolean isServerTrusted(X509Certificate[] chain); argument
|
/openjdk10/jdk/test/lib/testlibrary/bootlib/java.base/java/util/stream/ |
H A D | IntermediateTestOp.java | 31 public static<T> AbstractPipeline chain(AbstractPipeline upstream, method in interface:IntermediateTestOp 34 return StatelessTestOp.chain(upstream, (StatelessTestOp) op); 37 return StatefulTestOp.chain(upstream, (StatefulTestOp) op);
|
/openjdk10/jdk/src/java.base/share/classes/javax/net/ssl/ |
H A D | X509ExtendedTrustManager.java | 42 * JDK, the certificate chain checks were done at the SSL/TLS/DTLS layer, 58 * Given the partial or complete certificate chain provided by the 81 * @param chain the peer certificate chain 87 * in for the {@code chain} parameter or if null or zero-length 89 * @throws CertificateException if the certificate chain is not trusted 97 public abstract void checkClientTrusted(X509Certificate[] chain, argument 101 * Given the partial or complete certificate chain provided by the 129 * @param chain the peer certificate chain 145 checkServerTrusted(X509Certificate[] chain, String authType, Socket socket) argument 186 checkClientTrusted(X509Certificate[] chain, String authType, SSLEngine engine) argument 232 checkServerTrusted(X509Certificate[] chain, String authType, SSLEngine engine) argument [all...] |
H A D | X509TrustManager.java | 41 * Given the partial or complete certificate chain provided by the 50 * @param chain the peer certificate chain 52 * @throws IllegalArgumentException if null or zero-length chain 53 * is passed in for the chain parameter or if null or zero-length 55 * @throws CertificateException if the certificate chain is not trusted 58 public void checkClientTrusted(X509Certificate[] chain, String authType) argument 62 * Given the partial or complete certificate chain provided by the 76 * @param chain the peer certificate chain 84 checkServerTrusted(X509Certificate[] chain, String authType) argument [all...] |
/openjdk10/jdk/src/java.base/share/classes/sun/security/validator/ |
H A D | Validator.java | 78 * validator.validate(chain); // throws CertificateException if failed 203 * Validate the given certificate chain. 205 public final X509Certificate[] validate(X509Certificate[] chain) argument 207 return validate(chain, null, null); 211 * Validate the given certificate chain. If otherCerts is non-null, it is 215 public final X509Certificate[] validate(X509Certificate[] chain, argument 217 return validate(chain, otherCerts, null); 221 * Validate the given certificate chain. If otherCerts is non-null, it is 225 * @return a non-empty chain that was used to validate the path. The 228 public final X509Certificate[] validate(X509Certificate[] chain, argument 259 validate(X509Certificate[] chain, Collection<X509Certificate> otherCerts, List<byte[]> responseList, AlgorithmConstraints constraints, Object parameter) argument 284 engineValidate(X509Certificate[] chain, Collection<X509Certificate> otherCerts, List<byte[]> responseList, AlgorithmConstraints constraints, Object parameter) argument [all...] |
H A D | PKIXValidator.java | 188 X509Certificate[] engineValidate(X509Certificate[] chain, argument 193 if ((chain == null) || (chain.length == 0)) { 195 ("null or zero-length certificate chain"); 218 addResponses(pkixParameters, chain, responseList); 221 // check that chain is in correct order and check if chain contains 224 for (int i = 0; i < chain.length; i++) { 225 X509Certificate cert = chain[i]; 228 // chain i 335 doValidate(X509Certificate[] chain, PKIXBuilderParameters params) argument 354 doBuild(X509Certificate[] chain, Collection<X509Certificate> otherCerts, PKIXBuilderParameters params) argument 401 addResponses(PKIXBuilderParameters pkixParams, X509Certificate[] chain, List<byte[]> responseList) argument [all...] |
H A D | SimpleValidator.java | 120 * Perform simple validation of chain. The arguments otherCerts and 124 X509Certificate[] engineValidate(X509Certificate[] chain, argument 129 if ((chain == null) || (chain.length == 0)) { 131 ("null or zero-length certificate chain"); 134 // make sure chain includes a trusted cert 135 chain = buildTrustedChain(chain); 147 X509Certificate anchorCert = chain[chain 371 buildTrustedChain(X509Certificate[] chain) argument [all...] |
/openjdk10/jdk/test/java/util/HashMap/ |
H A D | HashMapCloneLeak.java | 56 Object[] chain = null; 60 allocate[0] = chain; 61 chain = allocate; 63 chain = null;
|
/openjdk10/langtools/test/tools/javac/lambda/lambdaExecution/ |
H A D | TBlock.java | 56 public default TBlock<T> chain(TBlock<? super T> other) { method in interface:TBlock
|
/openjdk10/jaxp/src/java.xml/share/classes/com/sun/org/apache/xalan/internal/utils/ |
H A D | ObjectFactory.java | 70 ClassLoader chain = system; 72 if (context == chain) { 74 // or any Context ClassLoader in chain of system classloader 83 chain = system; 85 if (current == chain) { 86 // Assert: Current ClassLoader in chain of 90 if (chain == null) { 93 chain = SecuritySupport.getParentClassLoader(chain); 96 // Assert: Current ClassLoader not in chain o [all...] |
/openjdk10/jaxp/src/java.xml/share/classes/com/sun/org/apache/xerces/internal/utils/ |
H A D | ObjectFactory.java | 88 ClassLoader chain = system; 90 if (context == chain) { 92 // or any Context ClassLoader in chain of system classloader 101 chain = system; 103 if (current == chain) { 104 // Assert: Current ClassLoader in chain of 108 if (chain == null) { 111 chain = SecuritySupport.getParentClassLoader(chain); 114 // Assert: Current ClassLoader not in chain o [all...] |
/openjdk10/jdk/src/java.sql.rowset/share/classes/javax/sql/rowset/serial/ |
H A D | SerialJavaObject.java | 168 Vector<RowSetWarning> chain; field in class:SerialJavaObject 214 if (chain != null) 215 sjo.chain = new Vector<>(chain); 227 if (chain == null) { 228 chain = new Vector<>(); 230 chain.add(e); 242 Vector<RowSetWarning> tmp = (Vector<RowSetWarning>)fields1.get("chain", null); 244 chain = new Vector<>(tmp); 266 fields.put("chain", chai [all...] |
/openjdk10/jdk/test/sun/security/ssl/X509TrustManagerImpl/ |
H A D | ComodoHacker.java | 223 X509Certificate[] chain = getFraudulentChain(); 227 tm.checkClientTrusted(chain, "RSA"); 238 tm.checkServerTrusted(chain, "RSA"); 281 X509Certificate[] chain = new X509Certificate[4]; 284 chain[0] = (X509Certificate)cf.generateCertificate(is); 289 chain[1] = (X509Certificate)cf.generateCertificate(is); 294 chain[2] = (X509Certificate)cf.generateCertificate(is); 299 chain[3] = (X509Certificate)cf.generateCertificate(is); 302 return chain;
|
/openjdk10/jdk/test/sun/security/tools/keytool/ |
H A D | DupImport.java | 53 // Create chain: root -> int -> me 106 Certificate[] chain = ks.getCertificateChain("me"); 107 if (chain.length != 3) { 108 throw new Exception("Length is " + chain.length); 111 checkName(chain[0], "CN=Me"); 112 checkName(chain[1], "CN=Int"); 113 checkName(chain[2], "CN=Root");
|
/openjdk10/jdk/src/java.base/share/classes/com/sun/net/ssl/internal/ssl/ |
H A D | X509ExtendedTrustManager.java | 67 * Given the partial or complete certificate chain provided by the 81 * @param chain the peer certificate chain 85 * @throws IllegalArgumentException if null or zero-length chain 86 * is passed in for the chain parameter or if null or zero-length 88 * @throws CertificateException if the certificate chain is not trusted 91 public abstract void checkClientTrusted(X509Certificate[] chain, argument 96 * Given the partial or complete certificate chain provided by the 110 * @param chain the peer certificate chain 120 checkServerTrusted(X509Certificate[] chain, String authType, String hostname, String algorithm) argument [all...] |
/openjdk10/jdk/test/sun/security/mscapi/ |
H A D | AccessKeyStore.java | 112 Certificate[] chain = keyStore.getCertificateChain(alias); 113 if (chain != null) { 114 System.out.println(" Certificate chain: "); 115 for (int i = 0; i < chain.length; i ++) { 117 displayCert(chain[i], " "); 124 Certificate[] chain = keyStore.getCertificateChain(alias); 125 if (chain != null) { 126 System.out.println(" Certificate chain: "); 127 for (int i = 0; i < chain.length; i ++) { 129 displayCert(chain[ [all...] |
/openjdk10/jdk/test/java/security/KeyStore/ |
H A D | DefaultEntryType.java | 146 Certificate[] chain = new Certificate[0]; 148 (null, chain); 155 // TEST null chain 165 // TEST empty chain 167 Certificate[] chain = new Certificate[0]; 169 (new PrivKey1(), chain); 176 // TEST non-homogenous chain 178 Certificate[] chain = new Certificate[2]; 179 chain[0] = new Cert(); 180 chain[ [all...] |
/openjdk10/jaxws/src/java.xml.ws/share/classes/javax/xml/ws/ |
H A D | Binding.java | 37 * Gets a copy of the handler chain for a protocol binding instance. 38 * If the returned chain is modified a call to {@code setHandlerChain} 39 * is required to configure the binding instance with the new chain. 41 * @return {@code java.util.List<Handler>} Handler chain 46 * Sets the handler chain for the protocol binding instance. 48 * @param chain A List of handler configuration entries 50 * the handler chain 54 * chain. 56 public void setHandlerChain(java.util.List<javax.xml.ws.handler.Handler> chain); argument
|
/openjdk10/jdk/test/sun/security/validator/ |
H A D | CertReplace.java | 41 * @param args {cacerts keystore, cert chain} 49 X509Certificate[] chain = createPath(args[1]); 51 for (X509Certificate c: v.validate(chain)) { 57 public static X509Certificate[] createPath(String chain) throws Exception { argument 61 new FileInputStream(chain))) {
|
H A D | EndEntityExtensionCheck.java | 103 X509Certificate[] chain = createChain(); 112 ks.setCertificateEntry("testca", chain[chain.length - 1]); 118 v.validate(chain); 130 * each cert in the chain, including EE certs. 133 * the EE cert, chain validation will fail. 135 TrustAnchor ta = new TrustAnchor(chain[chain.length - 1], null); 146 v.validate(chain); 156 * Check that PKIXValidator will successfully validate a chain [all...] |
/openjdk10/jdk/src/java.desktop/share/native/libfontmanager/layout/ |
H A D | MorphTables.cpp | 52 le_uint32 chain; local 54 for (chain = 0; LE_SUCCESS(success) && (chain < chainCount); chain += 1) { 55 if (chain > 0) {
|
/openjdk10/jdk/src/java.base/share/classes/sun/security/ssl/ |
H A D | X509TrustManagerImpl.java | 106 public void checkClientTrusted(X509Certificate[] chain, String authType) argument 108 checkTrusted(chain, authType, (Socket)null, true); 112 public void checkServerTrusted(X509Certificate[] chain, String authType) argument 114 checkTrusted(chain, authType, (Socket)null, false); 125 public void checkClientTrusted(X509Certificate[] chain, String authType, argument 127 checkTrusted(chain, authType, socket, true); 131 public void checkServerTrusted(X509Certificate[] chain, String authType, argument 133 checkTrusted(chain, authType, socket, false); 137 public void checkClientTrusted(X509Certificate[] chain, String authType, argument 139 checkTrusted(chain, authTyp 143 checkServerTrusted(X509Certificate[] chain, String authType, SSLEngine engine) argument 148 checkTrustedInit(X509Certificate[] chain, String authType, boolean isClient) argument 190 checkTrusted(X509Certificate[] chain, String authType, Socket socket, boolean isClient) argument 251 checkTrusted(X509Certificate[] chain, String authType, SSLEngine engine, boolean isClient) argument 337 validate(Validator v, X509Certificate[] chain, List<byte[]> responseList, AlgorithmConstraints constraints, String authType) argument [all...] |
/openjdk10/jaxws/src/java.xml.ws/share/classes/com/sun/xml/internal/ws/client/ |
H A D | HandlerConfigurator.java | 109 * must match when getting a handler chain from the map. 113 * a handler chain and then it sets the chains on this class and they 131 HandlerAnnotationInfo chain = chainMap.get(port); 133 if(chain==null) { 136 chain = handlerModel.getHandlersForPortInfo(port); 137 chainMap.put(port,chain); 141 ((SOAPBinding) binding).setRoles(chain.getRoles()); 144 logSetChain(port,chain); 145 binding.setHandlerChain(chain.getHandlers()); 157 private void logSetChain(WSPortInfo info, HandlerAnnotationInfo chain) { argument [all...] |
/openjdk10/jdk/test/sun/security/ssl/SSLContextImpl/ |
H A D | TrustTrustedCert.java | 211 // generate certificate chain 216 X509Certificate[] chain = new X509Certificate[2]; 217 chain[0] = keyCert; 218 chain[1] = trusedCert; 220 // import the key entry and the chain 221 ks.setKeyEntry("TheKey", priKey, passphrase, chain); 231 new NoneExtendedX509KM("TheKey", chain, priKey); 250 public void checkClientTrusted(X509Certificate chain[], String authType) argument 252 tm.checkClientTrusted(chain, authType); 255 public void checkServerTrusted(X509Certificate chain[], Strin argument 267 private X509Certificate[] chain; field in class:TrustTrustedCert.NoneExtendedX509KM 270 NoneExtendedX509KM(String keyAlias, X509Certificate[] chain, PrivateKey privateKey) argument [all...] |
/openjdk10/jdk/src/java.base/share/classes/sun/security/provider/ |
H A D | JavaKeyStore.java | 85 Certificate[] chain; field in class:JavaKeyStore.KeyEntry 151 * Returns the certificate chain associated with the given alias. 155 * @return the certificate chain (ordered with the user's certificate first 157 * does not exist or does not contain a certificate chain (i.e., the given 159 * <i>key entry</i> without a certificate chain). 165 if (((KeyEntry)entry).chain == null) { 168 return ((KeyEntry)entry).chain.clone(); 181 * <i>key entry</i>, the first element of the certificate chain of that 183 * chain. 197 if (((KeyEntry)entry).chain 252 engineSetKeyEntry(String alias, Key key, char[] password, Certificate[] chain) argument 310 engineSetKeyEntry(String alias, byte[] key, Certificate[] chain) argument [all...] |