/libcore/ojluni/src/main/java/sun/nio/ch/ |
H A D | SocketChannelImpl.java | 368 // above happens just between our last isOpen() check and the 424 assert IOStatus.check(n); 468 assert IOStatus.check(n); 504 assert IOStatus.check(n); 541 assert IOStatus.check(n); 571 assert IOStatus.check(n); 681 assert IOStatus.check(n); 779 assert IOStatus.check(n);
|
H A D | DatagramChannelImpl.java | 392 assert IOStatus.check(n); 491 assert IOStatus.check(n); 572 assert IOStatus.check(n); 601 assert IOStatus.check(n); 628 assert IOStatus.check(n); 657 assert IOStatus.check(n);
|
H A D | ServerSocketChannelImpl.java | 249 assert IOStatus.check(n);
|
/libcore/ojluni/src/main/java/sun/security/validator/ |
H A D | SimpleValidator.java | 161 // check untrusted certificate 165 untrustedChecker.check(cert, Collections.<String>emptySet()); 172 // check certificate algorithm 176 defaultAlgChecker.check(cert, Collections.<String>emptySet()); 178 appAlgChecker.check(cert, Collections.<String>emptySet()); 185 // no validity check for code signing certs 191 // check name chaining 198 // check signature 206 // check extensions for CA certs 229 // check Netscap [all...] |
H A D | Validator.java | 227 * could be used to pass in a PKCS#7 object for code signing to check time 252 * code signing to check time stamps. 262 // omit EE extension check if EE cert is also trust anchor 264 endEntityChecker.check(chain[0], parameter);
|
H A D | EndEntityChecker.java | 35 * Class to check if an end entity cert is suitable for use in some 135 void check(X509Certificate cert, Object parameter) method in class:EndEntityChecker 180 // We do not check the validity of the critical extension, just mark 285 // check for equivalent but now obsolete Server-Gated-Cryptography 330 // do not check Netscape cert type for JCE code signing checks
|
/libcore/jsr166-tests/src/test/java/jsr166/ |
H A D | ConcurrentSkipListSetTest.java | 676 check(set, 0, setSize - 1, true, bs); 677 check(set.descendingSet(), 0, setSize - 1, false, bs); 680 check(set, 0, setSize - 1, true, bs); 681 check(set.descendingSet(), 0, setSize - 1, false, bs); 782 check(set, min, max, ascending, bs); 783 check(set.descendingSet(), min, max, !ascending, bs); 786 check(set, min, max, ascending, bs); 787 check(set.descendingSet(), min, max, !ascending, bs); 861 void check(NavigableSet<Integer> set, method in class:ConcurrentSkipListSetTest
|
H A D | TreeSetTest.java | 680 check(set, 0, setSize - 1, true); 681 check(set.descendingSet(), 0, setSize - 1, false); 684 check(set, 0, setSize - 1, true); 685 check(set.descendingSet(), 0, setSize - 1, false); 784 check(set, min, max, ascending); 785 check(set.descendingSet(), min, max, !ascending); 788 check(set, min, max, ascending); 789 check(set.descendingSet(), min, max, !ascending); 863 void check(NavigableSet<Integer> set, method in class:TreeSetTest
|
H A D | ConcurrentSkipListMapTest.java | 992 check(map, 0, mapSize - 1, true); 993 check(map.descendingMap(), 0, mapSize - 1, false); 996 check(map, 0, mapSize - 1, true); 997 check(map.descendingMap(), 0, mapSize - 1, false); 1086 check(map, min, max, ascending); 1087 check(map.descendingMap(), min, max, !ascending); 1090 check(map, min, max, ascending); 1091 check(map.descendingMap(), min, max, !ascending); 1165 void check(NavigableMap<Integer, Integer> map, method in class:ConcurrentSkipListMapTest
|
H A D | TreeMapTest.java | 797 check(map, 0, mapSize - 1, true); 798 check(map.descendingMap(), 0, mapSize - 1, false); 801 check(map, 0, mapSize - 1, true); 802 check(map.descendingMap(), 0, mapSize - 1, false); 891 check(map, min, max, ascending); 892 check(map.descendingMap(), min, max, !ascending); 895 check(map, min, max, ascending); 896 check(map.descendingMap(), min, max, !ascending); 970 void check(NavigableMap<Integer, Integer> map, method in class:TreeMapTest
|
/libcore/ojluni/src/main/java/java/security/ |
H A D | Provider.java | 214 check("clearProviderProperties."+name); 230 check("putProviderProperty."+name); 247 check("putProviderProperty."+name); 332 check("putProviderProperty."+name); 368 check("removeProviderProperty."+name); 414 private void check(String directive) { method in class:Provider 469 * Internal method to be called AFTER the security check has been 793 check("putProviderProperty." + name); 827 // use super() to avoid permission check and other processing 848 // use super() to avoid permission check an [all...] |
H A D | Security.java | 251 check("insertProvider." + providerName); 336 check("removeProvider." + name); 685 check("setProperty."+key); 745 private static void check(String directive) { method in class:Security 835 // there is no need to check the value.
|
/libcore/ojluni/src/main/java/sun/security/util/ |
H A D | ObjectIdentifier.java | 140 * Validity check included. 213 * Validity check included. 227 * Validity check NOT included. 247 * Then get and check the length of the ID's encoding. We set 248 * up so that we can use in.available() to check for the end of 260 check(encoding); 266 * Validity check NOT included. 273 check(encoding); 297 * does the check and conversion. All around the JDK, the method is called 590 * Private methods to check validit 601 private static void check(byte[] encoding) throws IOException { method in class:ObjectIdentifier [all...] |
/libcore/ojluni/src/main/java/sun/security/provider/certpath/ |
H A D | ConstraintsChecker.java | 111 * does not pass the check 114 public void check(Certificate cert, Collection<String> unresCritExts) method in class:ConstraintsChecker 120 // MUST run NC check second, since it depends on BC check to 132 * Internal method to check the name constraints against a cert 142 // check name constraints only if there is a previous name constraint 154 throw new CertPathValidatorException(msg + " check failed", 220 * Internal method to check that a given cert meets basic constraints. 232 /* check if intermediate cert */ 260 (msg + " check faile [all...] |
H A D | BasicChecker.java | 138 public void check(Certificate cert, Collection<String> unresolvedCritExts) method in class:BasicChecker 173 (msg + " check failed", e, null, -1, 176 throw new CertPathValidatorException(msg + " check failed", e); 197 (msg + " check failed", e, null, -1, BasicReason.EXPIRED); 200 (msg + " check failed", e, null, -1, BasicReason.NOT_YET_VALID); 208 * Internal method to check that cert has a valid DN to be next in a chain 224 (msg + " check failed: " + 231 (msg + " check failed", null, null, -1,
|
H A D | RevocationChecker.java | 267 // first check TrustAnchors 277 // now check CertStores 334 public void check(Certificate cert, Collection<String> unresolvedCritExts) method in class:RevocationChecker 337 check((X509Certificate)cert, unresolvedCritExts, 341 private void check(X509Certificate xcert, method in class:RevocationChecker 349 debug.println("Skipping revocation check, not end " + 382 debug.println("RevocationChecker.check() " + e.getMessage()); 383 debug.println("RevocationChecker.check() preparing to failover"); 397 debug.println("RevocationChecker.check() failover failed"); 398 debug.println("RevocationChecker.check() " [all...] |
H A D | ForwardBuilder.java | 220 * Since we don't check the validity period of trusted 240 * Since we don't check the validity period of trusted 275 * check the validity period 284 * For compatibility, conservatively, we don't check the path 334 // check for AuthorityInformationAccess extension 670 currState.untrustedChecker.check(cert, Collections.<String>emptySet()); 673 * check for looping - abort a loop if we encounter the same 687 /* check if trusted cert */ 695 * ones we know how to check. 702 checker.check(cer [all...] |
H A D | OCSPResponse.java | 155 * to be used for the OCSP check. 519 algChecker.check(signerCert, Collections.<String>emptySet()); 521 // check the validity 534 // check for revocation 577 AlgorithmChecker.check(signerCert.getPublicKey(), sigAlgId);
|
H A D | DistributionPointFetcher.java | 152 // check for full name 155 // check for relative name 208 // we check the issuer in verifyCRLs method 658 // check the crl signature algorithm 660 AlgorithmChecker.check(prevKey, crl); 663 debug.println("CRL signature algorithm check failed: " + cpve); 734 // check certificate's key usage 741 // check certificate's subject
|
/libcore/ojluni/src/main/java/java/net/ |
H A D | InetAddress.java | 273 * Utility routine to check if the InetAddress is an 284 * Utility routine to check if the InetAddress in a wildcard address. 294 * Utility routine to check if the InetAddress is a loopback address. 305 * Utility routine to check if the InetAddress is an link local address. 316 * Utility routine to check if the InetAddress is a site local address. 327 * Utility routine to check if the multicast address has global scope. 339 * Utility routine to check if the multicast address has node scope. 351 * Utility routine to check if the multicast address has link scope. 363 * Utility routine to check if the multicast address has site scope. 375 * Utility routine to check i 977 getAllByName0(String authHost, boolean check) argument 982 getHostName(boolean check) argument [all...] |
/libcore/ojluni/src/main/java/sun/security/ssl/ |
H A D | X509KeyManagerImpl.java | 268 // than rsa_sign, dss_sign and ecdsa_sign, we don't have to check the 291 // if possible, check the public key in the issuer cert 440 // and includes the result of the certificate check 471 // enum for the type of certificate check we want to perform 473 // also includes the check code itself 476 // enum constant for "no check" (currently not used) 479 // enum constant for "tls client" check 484 // enum constant for "tls server" check 501 // check if this certificate is appropriate for this type of use 502 // first check extension 505 CheckResult check(X509Certificate cert, Date date) { method in class:X509KeyManagerImpl.CheckType [all...] |
/libcore/harmony-tests/src/test/java/org/apache/harmony/tests/java/lang/reflect/ |
H A D | ConstructorTest.java | 82 public int check() { method in class:ConstructorTest.ConstructorTestHelper 386 assertEquals("improper instance created", 99, test.check());
|
/libcore/support/src/test/java/org/apache/harmony/security/tests/support/cert/ |
H A D | TestUtils.java | 209 public void check(Certificate arg0, Collection arg1) 223 // just to check this checker state
|
/libcore/ |
H A D | NativeCode.mk | 24 # These two definitions are used to help sanity check what's put in
|
/libcore/ojluni/src/test/java/util/stream/test/org/openjdk/tests/java/util/stream/ |
H A D | TabulatorsTest.java | 283 R check = streamReduction.apply(data.stream()); 284 withData(data).terminal(s -> s.collect(collector)).expectedResult(check).exercise();
|