| checkRevocationUsingOCSP(X509Certificate[]) |  | 0% |  | 0% | 14 | 14 | 39 | 39 | 1 | 1 |
| verifyCertificateTrust(X509Certificate[], Set, Set) |  | 0% |  | 0% | 4 | 4 | 20 | 20 | 1 | 1 |
| validateKeyUsage(X509Certificate[], int) |  | 0% |  | 0% | 10 | 10 | 23 | 23 | 1 | 1 |
| validateTimestamps() |  | 0% |  | 0% | 5 | 5 | 15 | 15 | 1 | 1 |
| validatePolicy(X509Certificate[], List, String) |  | 0% |  | 0% | 7 | 7 | 18 | 18 | 1 | 1 |
| validateExtendedKeyUsage(X509Certificate[], List) |  | 0% |  | 0% | 8 | 8 | 21 | 21 | 1 | 1 |
| validateTrust() |  | 0% |  | 0% | 4 | 4 | 10 | 10 | 1 | 1 |
| CertificateValidator(X509Certificate[], int, List, List, String, boolean, boolean, CertificateValidator.CRLLoaderImpl, boolean, boolean, CertificateValidator.OCSPChecker, KeycloakSession, boolean, boolean) |  | 0% |  | 0% | 2 | 2 | 18 | 18 | 1 | 1 |
| checkRevocationStatusUsingCRLDistributionPoints(X509Certificate[], KeycloakSession) |  | 0% |  | 0% | 4 | 4 | 8 | 8 | 1 | 1 |
| checkRevocationStatus() |  | 0% |  | 0% | 6 | 6 | 9 | 9 | 1 | 1 |
| findCAInTruststore(X500Principal) |  | 0% |  | 0% | 5 | 5 | 10 | 10 | 1 | 1 |
| checkRevocationStatusUsingCRL(X509Certificate[], CertificateValidator.CRLLoaderImpl, KeycloakSession) |  | 0% |  | 0% | 4 | 4 | 6 | 6 | 1 | 1 |
| getCRLDistributionPoints(X509Certificate) |  | 0% | | n/a | 1 | 1 | 4 | 4 | 1 | 1 |
| validatePolicy() |  | 0% | | n/a | 1 | 1 | 2 | 2 | 1 | 1 |
| validateKeyUsage() |  | 0% | | n/a | 1 | 1 | 2 | 2 | 1 | 1 |
| validateExtendedKeyUsage() |  | 0% | | n/a | 1 | 1 | 2 | 2 | 1 | 1 |
| lambda$validateExtendedKeyUsage$0(List, String) |  | 0% | | n/a | 1 | 1 | 1 | 1 | 1 | 1 |
| lambda$validatePolicy$1(List, String) |  | 0% | | n/a | 1 | 1 | 1 | 1 | 1 | 1 |
| lambda$validateTrust$3(Map.Entry) |  | 0% | | n/a | 1 | 1 | 1 | 1 | 1 | 1 |
| lambda$validateTrust$2(Map.Entry) |  | 0% | | n/a | 1 | 1 | 1 | 1 | 1 | 1 |
| CertificateValidator() |  | 0% | | n/a | 1 | 1 | 2 | 2 | 1 | 1 |
| static {...} |  | 0% | | n/a | 1 | 1 | 1 | 1 | 1 | 1 |