Home | History | Annotate | Download | only in certpath

Lines Matching refs:cert

30 import java.security.cert.CertificateException;
31 import java.security.cert.CertificateParsingException;
32 import java.security.cert.CertPathValidatorException;
33 import java.security.cert.CertPathValidatorException.BasicReason;
34 import java.security.cert.CRLReason;
35 import java.security.cert.TrustAnchor;
36 import java.security.cert.X509Certificate;
373 X509CertImpl cert =
375 certs.add(cert);
378 debug.println("OCSP response cert #" + (i + 1) + ": " +
379 cert.getSubjectX500Principal());
426 // Locate the signer cert
428 // Add the Issuing CA cert and/or Trusted Responder cert to the list
441 for (X509CertImpl cert : certs) {
442 if (cert.getSubjectX500Principal().equals(responderName)) {
443 signerCert = cert;
448 for (X509CertImpl cert : certs) {
449 // Match responder's key identifier against the cert's SKID
452 KeyIdentifier certKeyId = cert.getSubjectKeyId();
454 signerCert = cert;
461 // cert's public key using the 160-bit SHA-1 method.
463 certKeyId = new KeyIdentifier(cert.getPublicKey());
468 signerCert = cert;
476 // Check whether the signer cert returned by the responder is trusted
484 // cert is trusted, now verify the signed response
492 // cert is trusted, now verify the signed response
508 // assume cert is not valid for signing
560 // cert is trusted, now verify the signed response
573 // key from the trusted responder cert
584 // Need responder's cert in order to verify the signature
636 private boolean verifySignature(X509Certificate cert)
641 respSignature.initVerify(cert.getPublicKey());
689 private final Map<String, java.security.cert.Extension> singleExtensions;
765 new HashMap<String, java.security.cert.Extension>
810 public Map<String, java.security.cert.Extension> getSingleExtensions() {