checkRevocationUsingOCSP(X509Certificate[]) |  | 0% |  | 0% | 14 | 14 | 39 | 39 | 1 | 1 |
verifyCertificateTrust(X509Certificate[], Set, Set) |  | 0% |  | 0% | 4 | 4 | 20 | 20 | 1 | 1 |
validateKeyUsage(X509Certificate[], int) |  | 0% |  | 0% | 10 | 10 | 23 | 23 | 1 | 1 |
validateTimestamps() |  | 0% |  | 0% | 5 | 5 | 15 | 15 | 1 | 1 |
validatePolicy(X509Certificate[], List, String) |  | 0% |  | 0% | 7 | 7 | 18 | 18 | 1 | 1 |
validateExtendedKeyUsage(X509Certificate[], List) |  | 0% |  | 0% | 8 | 8 | 21 | 21 | 1 | 1 |
validateTrust() |  | 0% |  | 0% | 4 | 4 | 10 | 10 | 1 | 1 |
CertificateValidator(X509Certificate[], int, List, List, String, boolean, boolean, CertificateValidator.CRLLoaderImpl, boolean, boolean, CertificateValidator.OCSPChecker, KeycloakSession, boolean, boolean) |  | 0% |  | 0% | 2 | 2 | 18 | 18 | 1 | 1 |
checkRevocationStatusUsingCRLDistributionPoints(X509Certificate[], KeycloakSession) |  | 0% |  | 0% | 4 | 4 | 8 | 8 | 1 | 1 |
checkRevocationStatus() |  | 0% |  | 0% | 6 | 6 | 9 | 9 | 1 | 1 |
findCAInTruststore(X500Principal) |  | 0% |  | 0% | 5 | 5 | 10 | 10 | 1 | 1 |
checkRevocationStatusUsingCRL(X509Certificate[], CertificateValidator.CRLLoaderImpl, KeycloakSession) |  | 0% |  | 0% | 4 | 4 | 6 | 6 | 1 | 1 |
getCRLDistributionPoints(X509Certificate) |  | 0% | | n/a | 1 | 1 | 4 | 4 | 1 | 1 |
validatePolicy() |  | 0% | | n/a | 1 | 1 | 2 | 2 | 1 | 1 |
validateKeyUsage() |  | 0% | | n/a | 1 | 1 | 2 | 2 | 1 | 1 |
validateExtendedKeyUsage() |  | 0% | | n/a | 1 | 1 | 2 | 2 | 1 | 1 |
lambda$validateExtendedKeyUsage$0(List, String) |  | 0% | | n/a | 1 | 1 | 1 | 1 | 1 | 1 |
lambda$validatePolicy$1(List, String) |  | 0% | | n/a | 1 | 1 | 1 | 1 | 1 | 1 |
lambda$validateTrust$3(Map.Entry) |  | 0% | | n/a | 1 | 1 | 1 | 1 | 1 | 1 |
lambda$validateTrust$2(Map.Entry) |  | 0% | | n/a | 1 | 1 | 1 | 1 | 1 | 1 |
CertificateValidator() |  | 0% | | n/a | 1 | 1 | 2 | 2 | 1 | 1 |
static {...} |  | 0% | | n/a | 1 | 1 | 1 | 1 | 1 | 1 |