Java Doc for X509Certificate.java in  » 6.0-JDK-Modules » j2me » java » security » cert » Java Source Code / Java DocumentationJava Source Code and Java Documentation

Java Source Code / Java Documentation
1. 6.0 JDK Core
2. 6.0 JDK Modules
3. 6.0 JDK Modules com.sun
4. 6.0 JDK Modules com.sun.java
5. 6.0 JDK Modules sun
6. 6.0 JDK Platform
7. Ajax
8. Apache Harmony Java SE
9. Aspect oriented
10. Authentication Authorization
11. Blogger System
12. Build
13. Byte Code
14. Cache
15. Chart
16. Chat
17. Code Analyzer
18. Collaboration
19. Content Management System
20. Database Client
21. Database DBMS
22. Database JDBC Connection Pool
23. Database ORM
24. Development
25. EJB Server geronimo
26. EJB Server GlassFish
27. EJB Server JBoss 4.2.1
28. EJB Server resin 3.1.5
29. ERP CRM Financial
30. ESB
31. Forum
32. GIS
33. Graphic Library
34. Groupware
35. HTML Parser
36. IDE
37. IDE Eclipse
38. IDE Netbeans
39. Installer
40. Internationalization Localization
41. Inversion of Control
42. Issue Tracking
43. J2EE
44. JBoss
45. JMS
46. JMX
47. Library
48. Mail Clients
49. Net
50. Parser
51. PDF
52. Portal
53. Profiler
54. Project Management
55. Report
56. RSS RDF
57. Rule Engine
58. Science
59. Scripting
60. Search Engine
61. Security
62. Sevlet Container
63. Source Control
64. Swing Library
65. Template Engine
66. Test Coverage
67. Testing
68. UML
69. Web Crawler
70. Web Framework
71. Web Mail
72. Web Server
73. Web Services
74. Web Services apache cxf 2.0.1
75. Web Services AXIS2
76. Wiki Engine
77. Workflow Engines
78. XML
79. XML UI
Java
Java Tutorial
Java Open Source
Jar File Download
Java Articles
Java Products
Java by API
Photoshop Tutorials
Maya Tutorials
Flash Tutorials
3ds-Max Tutorials
Illustrator Tutorials
GIMP Tutorials
C# / C Sharp
C# / CSharp Tutorial
C# / CSharp Open Source
ASP.Net
ASP.NET Tutorial
JavaScript DHTML
JavaScript Tutorial
JavaScript Reference
HTML / CSS
HTML CSS Reference
C / ANSI-C
C Tutorial
C++
C++ Tutorial
Ruby
PHP
Python
Python Tutorial
Python Open Source
SQL Server / T-SQL
SQL Server / T-SQL Tutorial
Oracle PL / SQL
Oracle PL/SQL Tutorial
PostgreSQL
SQL / MySQL
MySQL Tutorial
VB.Net
VB.Net Tutorial
Flash / Flex / ActionScript
VBA / Excel / Access / Word
XML
XML Tutorial
Microsoft Office PowerPoint 2007 Tutorial
Microsoft Office Excel 2007 Tutorial
Microsoft Office Word 2007 Tutorial
Java Source Code / Java Documentation » 6.0 JDK Modules » j2me » java.security.cert 
Source Cross Reference  Class Diagram Java Document (Java Doc) 


java.lang.Object
   java.security.cert.Certificate
      java.security.cert.X509Certificate

All known Subclasses:   sun.security.x509.X509CertImpl,
X509Certificate
abstract public class X509Certificate extends Certificate implements X509Extension(Code)

Abstract class for X.509 certificates. This provides a standard way to access all the attributes of an X.509 certificate.

In June of 1996, the basic X.509 v3 format was completed by ISO/IEC and ANSI X9, which is described below in ASN.1:

 Certificate  ::=  SEQUENCE  {
 tbsCertificate       TBSCertificate,
 signatureAlgorithm   AlgorithmIdentifier,
 signature            BIT STRING  }
 

These certificates are widely used to support authentication and other functionality in Internet security systems. Common applications include Privacy Enhanced Mail (PEM), Transport Layer Security (SSL), code signing for trusted software distribution, and Secure Electronic Transactions (SET).

These certificates are managed and vouched for by Certificate Authorities (CAs). CAs are services which create certificates by placing data in the X.509 standard format and then digitally signing that data. CAs act as trusted third parties, making introductions between principals who have no direct knowledge of each other. CA certificates are either signed by themselves, or by some other CA such as a "root" CA.

More information can be found in RFC 2459, "Internet X.509 Public Key Infrastructure Certificate and CRL Profile" at http://www.ietf.org/rfc/rfc2459.txt .

The ASN.1 definition of tbsCertificate is:

 TBSCertificate  ::=  SEQUENCE  {
 version         [0]  EXPLICIT Version DEFAULT v1,
 serialNumber         CertificateSerialNumber,
 signature            AlgorithmIdentifier,
 issuer               Name,
 validity             Validity,
 subject              Name,
 subjectPublicKeyInfo SubjectPublicKeyInfo,
 issuerUniqueID  [1]  IMPLICIT UniqueIdentifier OPTIONAL,
 -- If present, version must be v2 or v3
 subjectUniqueID [2]  IMPLICIT UniqueIdentifier OPTIONAL,
 -- If present, version must be v2 or v3
 extensions      [3]  EXPLICIT Extensions OPTIONAL
 -- If present, version must be v3
 }
 

Certificates are instantiated using a certificate factory. The following is an example of how to instantiate an X.509 certificate:

 
 InputStream inStream = new FileInputStream("fileName-of-cert");
 CertificateFactory cf = CertificateFactory.getInstance("X.509");
 X509Certificate cert = (X509Certificate)cf.generateCertificate(inStream);
 inStream.close();
 

author:
   Hemma Prafullchandra
version:
   1.27
See Also:   Certificate
See Also:   CertificateFactory
See Also:   X509Extension



Constructor Summary
protected  X509Certificate()
     Constructor for X.509 certificates.

Method Summary
abstract public  voidcheckValidity()
     Checks that the certificate is currently valid.
abstract public  voidcheckValidity(Date date)
     Checks that the given date is within the certificate's validity period.
abstract public  intgetBasicConstraints()
     Gets the certificate constraints path length from the critical BasicConstraints extension, (OID = 2.5.29.19).

The basic constraints extension identifies whether the subject of the certificate is a Certificate Authority (CA) and how deep a certification path may exist through that CA.

public  ListgetExtendedKeyUsage()
     Gets an unmodifiable list of Strings representing the OBJECT IDENTIFIERs of the ExtKeyUsageSyntax field of the extended key usage extension, (OID = 2.5.29.37).
public  CollectiongetIssuerAlternativeNames()
     Gets an immutable collection of issuer alternative names from the IssuerAltName extension, (OID = 2.5.29.18).

The ASN.1 definition of the IssuerAltName extension is:

 IssuerAltName ::= GeneralNames
 
The ASN.1 definition of GeneralNames is defined in X509Certificate.getSubjectAlternativeNames getSubjectAlternativeNames .

If this certificate does not contain an IssuerAltName extension, null is returned.

abstract public  PrincipalgetIssuerDN()
     Gets the issuer (issuer distinguished name) value from the certificate.
abstract public  boolean[]getIssuerUniqueID()
     Gets the issuerUniqueID value from the certificate.
public  X500PrincipalgetIssuerX500Principal()
     Returns the issuer (issuer distinguished name) value from the certificate as an X500Principal.
abstract public  boolean[]getKeyUsage()
     Gets a boolean array representing bits of the KeyUsage extension, (OID = 2.5.29.15). The key usage extension defines the purpose (e.g., encipherment, signature, certificate signing) of the key contained in the certificate. The ASN.1 definition for this is:
 KeyUsage ::= BIT STRING {
 digitalSignature        (0),
 nonRepudiation          (1),
 keyEncipherment         (2),
 dataEncipherment        (3),
 keyAgreement            (4),
 keyCertSign             (5),
 cRLSign                 (6),
 encipherOnly            (7),
 decipherOnly            (8) }
 
RFC 2459 recommends that when used, this be marked as a critical extension. the KeyUsage extension of this certificate, represented asan array of booleans.
abstract public  DategetNotAfter()
     Gets the notAfter date from the validity period of the certificate.
abstract public  DategetNotBefore()
     Gets the notBefore date from the validity period of the certificate.
abstract public  BigIntegergetSerialNumber()
     Gets the serialNumber value from the certificate. The serial number is an integer assigned by the certification authority to each certificate.
abstract public  StringgetSigAlgName()
     Gets the signature algorithm name for the certificate signature algorithm.
abstract public  StringgetSigAlgOID()
     Gets the signature algorithm OID string from the certificate.
abstract public  byte[]getSigAlgParams()
     Gets the DER-encoded signature algorithm parameters from this certificate's signature algorithm.
abstract public  byte[]getSignature()
     Gets the signature value (the raw signature bits) from the certificate.
public  CollectiongetSubjectAlternativeNames()
     Gets an immutable collection of subject alternative names from the SubjectAltName extension, (OID = 2.5.29.17).

The ASN.1 definition of the SubjectAltName extension is:

 SubjectAltName ::= GeneralNames
 GeneralNames :: = SEQUENCE SIZE (1..MAX) OF GeneralName
 GeneralName ::= CHOICE {
 otherName                       [0]     OtherName,
 rfc822Name                      [1]     IA5String,
 dNSName                         [2]     IA5String,
 x400Address                     [3]     ORAddress,
 directoryName                   [4]     Name,
 ediPartyName                    [5]     EDIPartyName,
 uniformResourceIdentifier       [6]     IA5String,
 iPAddress                       [7]     OCTET STRING,
 registeredID                    [8]     OBJECT IDENTIFIER}
 

If this certificate does not contain a SubjectAltName extension, null is returned.

abstract public  PrincipalgetSubjectDN()
     Gets the subject (subject distinguished name) value from the certificate.
abstract public  boolean[]getSubjectUniqueID()
     Gets the subjectUniqueID value from the certificate.
public  X500PrincipalgetSubjectX500Principal()
     Returns the subject (subject distinguished name) value from the certificate as an X500Principal.
abstract public  byte[]getTBSCertificate()
     Gets the DER-encoded certificate information, the tbsCertificate from this certificate.
abstract public  intgetVersion()
     Gets the version (version number) value from the certificate. The ASN.1 definition for this is:
 version  [0] EXPLICIT Version DEFAULT v1

Version ::= INTEGER { v1(0), v2(1), v3(2) }

the version number, i.e.


Constructor Detail
X509Certificate
protected X509Certificate()(Code)
Constructor for X.509 certificates.




Method Detail
checkValidity
abstract public void checkValidity() throws CertificateExpiredException, CertificateNotYetValidException(Code)
Checks that the certificate is currently valid. It is if the current date and time are within the validity period given in the certificate.

The validity period consists of two date/time values: the first and last dates (and times) on which the certificate is valid. It is defined in ASN.1 as:

 validity             Validity

Validity ::= SEQUENCE { notBefore CertificateValidityDate, notAfter CertificateValidityDate }

CertificateValidityDate ::= CHOICE { utcTime UTCTime, generalTime GeneralizedTime }


exception:
  CertificateExpiredException - if the certificate has expired.
exception:
  CertificateNotYetValidException - if the certificate is notyet valid.



checkValidity
abstract public void checkValidity(Date date) throws CertificateExpiredException, CertificateNotYetValidException(Code)
Checks that the given date is within the certificate's validity period. In other words, this determines whether the certificate would be valid at the given date/time.
Parameters:
  date - the Date to check against to see if this certificateis valid at that date/time.
exception:
  CertificateExpiredException - if the certificate has expiredwith respect to the date supplied.
exception:
  CertificateNotYetValidException - if the certificate is notyet valid with respect to the date supplied.
See Also:   X509Certificate.checkValidity()



getBasicConstraints
abstract public int getBasicConstraints()(Code)
Gets the certificate constraints path length from the critical BasicConstraints extension, (OID = 2.5.29.19).

The basic constraints extension identifies whether the subject of the certificate is a Certificate Authority (CA) and how deep a certification path may exist through that CA. The pathLenConstraint field (see below) is meaningful only if cA is set to TRUE. In this case, it gives the maximum number of CA certificates that may follow this certificate in a certification path. A value of zero indicates that only an end-entity certificate may follow in the path.

Note that for RFC 2459 this extension is always marked critical if cA is TRUE, meaning this certificate belongs to a Certificate Authority.

The ASN.1 definition for this is:

 BasicConstraints ::= SEQUENCE {
 cA                  BOOLEAN DEFAULT FALSE,
 pathLenConstraint   INTEGER (0..MAX) OPTIONAL }
 
the value of pathLenConstraint if theBasicConstraints extension is present in the certificate and thesubject of the certificate is a CA, otherwise -1.If the subject of the certificate is a CA andpathLenConstraint does not appear,Integer.MAX_VALUE is returned to indicate that there is nolimit to the allowed length of the certification path.



getExtendedKeyUsage
public List getExtendedKeyUsage() throws CertificateParsingException(Code)
Gets an unmodifiable list of Strings representing the OBJECT IDENTIFIERs of the ExtKeyUsageSyntax field of the extended key usage extension, (OID = 2.5.29.37). It indicates one or more purposes for which the certified public key may be used, in addition to or in place of the basic purposes indicated in the key usage extension field. The ASN.1 definition for this is:
 ExtKeyUsageSyntax ::= SEQUENCE SIZE (1..MAX) OF KeyPurposeId

KeyPurposeId ::= OBJECT IDENTIFIER

Key purposes may be defined by any organization with a need. Object identifiers used to identify key purposes shall be assigned in accordance with IANA or ITU-T Rec. X.660 | ISO/IEC/ITU 9834-1.

This method was added to version 1.4 of the Java 2 Platform Standard Edition. In order to maintain backwards compatibility with existing service providers, this method is not abstract and it provides a default implementation. Subclasses should override this method with a correct implementation. the ExtendedKeyUsage extension of this certificate,as an unmodifiable list of object identifiers representedas Strings. Returns null if this certificate does notcontain an ExtendedKeyUsage extension.
throws:
  CertificateParsingException - if the extension cannot be decoded
since:
   1.4




getIssuerAlternativeNames
public Collection getIssuerAlternativeNames() throws CertificateParsingException(Code)
Gets an immutable collection of issuer alternative names from the IssuerAltName extension, (OID = 2.5.29.18).

The ASN.1 definition of the IssuerAltName extension is:

 IssuerAltName ::= GeneralNames
 
The ASN.1 definition of GeneralNames is defined in X509Certificate.getSubjectAlternativeNames getSubjectAlternativeNames .

If this certificate does not contain an IssuerAltName extension, null is returned. Otherwise, a Collection is returned with an entry representing each GeneralName included in the extension. Each entry is a List whose first entry is an Integer (the name type, 0-8) and whose second entry is a String or a byte array (the name, in string or ASN.1 DER encoded form, respectively). For more details about the formats used for each name type, see the getSubjectAlternativeNames method.

Note that the Collection returned may contain more than one name of the same type. Also, note that the returned Collection is immutable and any entries containing byte arrays are cloned to protect against subsequent modifications.

This method was added to version 1.4 of the Java 2 Platform Standard Edition. In order to maintain backwards compatibility with existing service providers, this method is not abstract and it provides a default implementation. Subclasses should override this method with a correct implementation. an immutable Collection of issuer alternative names (or null)
throws:
  CertificateParsingException - if the extension cannot be decoded
since:
   1.4




getIssuerDN
abstract public Principal getIssuerDN()(Code)
Gets the issuer (issuer distinguished name) value from the certificate. The issuer name identifies the entity that signed (and issued) the certificate.

The issuer name field contains an X.500 distinguished name (DN). The ASN.1 definition for this is:

 issuer    Name

Name ::= CHOICE { RDNSequence } RDNSequence ::= SEQUENCE OF RelativeDistinguishedName RelativeDistinguishedName ::= SET OF AttributeValueAssertion AttributeValueAssertion ::= SEQUENCE { AttributeType, AttributeValue } AttributeType ::= OBJECT IDENTIFIER AttributeValue ::= ANY

The Name describes a hierarchical name composed of attributes, such as country name, and corresponding values, such as US. The type of the AttributeValue component is determined by the AttributeType; in general it will be a directoryString. A directoryString is usually one of PrintableString, TeletexString or UniversalString. a Principal whose name is the issuer distinguished name.



getIssuerUniqueID
abstract public boolean[] getIssuerUniqueID()(Code)
Gets the issuerUniqueID value from the certificate. The issuer unique identifier is present in the certificate to handle the possibility of reuse of issuer names over time. RFC 2459 recommends that names not be reused and that conforming certificates not make use of unique identifiers. Applications conforming to that profile should be capable of parsing unique identifiers and making comparisons.

The ASN.1 definition for this is:

 issuerUniqueID  [1]  IMPLICIT UniqueIdentifier OPTIONAL

UniqueIdentifier ::= BIT STRING

the issuer unique identifier or null if it is notpresent in the certificate.



getIssuerX500Principal
public X500Principal getIssuerX500Principal()(Code)
Returns the issuer (issuer distinguished name) value from the certificate as an X500Principal.

It is recommended that subclasses override this method to provide an efficient implementation. an X500Principal representing the issuerdistinguished name
since:
   1.4




getKeyUsage
abstract public boolean[] getKeyUsage()(Code)
Gets a boolean array representing bits of the KeyUsage extension, (OID = 2.5.29.15). The key usage extension defines the purpose (e.g., encipherment, signature, certificate signing) of the key contained in the certificate. The ASN.1 definition for this is:
 KeyUsage ::= BIT STRING {
 digitalSignature        (0),
 nonRepudiation          (1),
 keyEncipherment         (2),
 dataEncipherment        (3),
 keyAgreement            (4),
 keyCertSign             (5),
 cRLSign                 (6),
 encipherOnly            (7),
 decipherOnly            (8) }
 
RFC 2459 recommends that when used, this be marked as a critical extension. the KeyUsage extension of this certificate, represented asan array of booleans. The order of KeyUsage values in the array isthe same as in the above ASN.1 definition. The array will contain avalue for each KeyUsage defined above. If the KeyUsage list encodedin the certificate is longer than the above list, it will not betruncated. Returns null if this certificate does notcontain a KeyUsage extension.



getNotAfter
abstract public Date getNotAfter()(Code)
Gets the notAfter date from the validity period of the certificate. See X509Certificate.getNotBefore() getNotBefore for relevant ASN.1 definitions. the end date of the validity period.
See Also:   X509Certificate.checkValidity



getNotBefore
abstract public Date getNotBefore()(Code)
Gets the notBefore date from the validity period of the certificate. The relevant ASN.1 definitions are:
 validity             Validity

Validity ::= SEQUENCE { notBefore CertificateValidityDate, notAfter CertificateValidityDate }

CertificateValidityDate ::= CHOICE { utcTime UTCTime, generalTime GeneralizedTime }

the start date of the validity period.
See Also:   X509Certificate.checkValidity



getSerialNumber
abstract public BigInteger getSerialNumber()(Code)
Gets the serialNumber value from the certificate. The serial number is an integer assigned by the certification authority to each certificate. It must be unique for each certificate issued by a given CA (i.e., the issuer name and serial number identify a unique certificate). The ASN.1 definition for this is:
 serialNumber     CertificateSerialNumber

CertificateSerialNumber ::= INTEGER

the serial number.



getSigAlgName
abstract public String getSigAlgName()(Code)
Gets the signature algorithm name for the certificate signature algorithm. An example is the string "SHA-1/DSA". The ASN.1 definition for this is:
 signatureAlgorithm   AlgorithmIdentifier

AlgorithmIdentifier ::= SEQUENCE { algorithm OBJECT IDENTIFIER, parameters ANY DEFINED BY algorithm OPTIONAL } -- contains a value of the type -- registered for use with the -- algorithm object identifier value

The algorithm name is determined from the algorithm OID string. the signature algorithm name.




getSigAlgOID
abstract public String getSigAlgOID()(Code)
Gets the signature algorithm OID string from the certificate. An OID is represented by a set of nonnegative whole numbers separated by periods. For example, the string "1.2.840.10040.4.3" identifies the SHA-1 with DSA signature algorithm, as per RFC 2459.

See X509Certificate.getSigAlgName() getSigAlgName for relevant ASN.1 definitions. the signature algorithm OID string.




getSigAlgParams
abstract public byte[] getSigAlgParams()(Code)
Gets the DER-encoded signature algorithm parameters from this certificate's signature algorithm. In most cases, the signature algorithm parameters are null; the parameters are usually supplied with the certificate's public key. If access to individual parameter values is needed then use java.security.AlgorithmParameters AlgorithmParameters and instantiate with the name returned by X509Certificate.getSigAlgName() getSigAlgName .

See X509Certificate.getSigAlgName() getSigAlgName for relevant ASN.1 definitions. the DER-encoded signature algorithm parameters, ornull if no parameters are present.




getSignature
abstract public byte[] getSignature()(Code)
Gets the signature value (the raw signature bits) from the certificate. The ASN.1 definition for this is:
 signature     BIT STRING  
 
the signature.



getSubjectAlternativeNames
public Collection getSubjectAlternativeNames() throws CertificateParsingException(Code)
Gets an immutable collection of subject alternative names from the SubjectAltName extension, (OID = 2.5.29.17).

The ASN.1 definition of the SubjectAltName extension is:

 SubjectAltName ::= GeneralNames
 GeneralNames :: = SEQUENCE SIZE (1..MAX) OF GeneralName
 GeneralName ::= CHOICE {
 otherName                       [0]     OtherName,
 rfc822Name                      [1]     IA5String,
 dNSName                         [2]     IA5String,
 x400Address                     [3]     ORAddress,
 directoryName                   [4]     Name,
 ediPartyName                    [5]     EDIPartyName,
 uniformResourceIdentifier       [6]     IA5String,
 iPAddress                       [7]     OCTET STRING,
 registeredID                    [8]     OBJECT IDENTIFIER}
 

If this certificate does not contain a SubjectAltName extension, null is returned. Otherwise, a Collection is returned with an entry representing each GeneralName included in the extension. Each entry is a List whose first entry is an Integer (the name type, 0-8) and whose second entry is a String or a byte array (the name, in string or ASN.1 DER encoded form, respectively).

RFC 822, DNS, and URI names are returned as Strings, using the well-established string formats for those types (subject to the restrictions included in RFC 2459). IPv4 address names are returned using dotted quad notation. IPv6 address names are returned in the form "a1:a2:...:a8", where a1-a8 are hexadecimal values representing the eight 16-bit pieces of the address. OID names are returned as Strings represented as a series of nonnegative integers separated by periods. And directory names (distinguished names) are returned in RFC 2253 string format. No standard string format is defined for otherNames, X.400 names, EDI party names, or any other type of names. They are returned as byte arrays containing the ASN.1 DER encoded form of the name.

Note that the Collection returned may contain more than one name of the same type. Also, note that the returned Collection is immutable and any entries containing byte arrays are cloned to protect against subsequent modifications.

This method was added to version 1.4 of the Java 2 Platform Standard Edition. In order to maintain backwards compatibility with existing service providers, this method is not abstract and it provides a default implementation. Subclasses should override this method with a correct implementation. an immutable Collection of subject alternative names (or null)
throws:
  CertificateParsingException - if the extension cannot be decoded
since:
   1.4




getSubjectDN
abstract public Principal getSubjectDN()(Code)
Gets the subject (subject distinguished name) value from the certificate. If the subject value is empty, then the getName() method of the returned Principal object returns an empty string ("").

The ASN.1 definition for this is:

 subject    Name
 

See X509Certificate.getIssuerDN() getIssuerDN for Name and other relevant definitions. a Principal whose name is the subject name.




getSubjectUniqueID
abstract public boolean[] getSubjectUniqueID()(Code)
Gets the subjectUniqueID value from the certificate.

The ASN.1 definition for this is:

 subjectUniqueID  [2]  IMPLICIT UniqueIdentifier OPTIONAL

UniqueIdentifier ::= BIT STRING

the subject unique identifier or null if it is notpresent in the certificate.



getSubjectX500Principal
public X500Principal getSubjectX500Principal()(Code)
Returns the subject (subject distinguished name) value from the certificate as an X500Principal. If the subject value is empty, then the getName() method of the returned X500Principal object returns an empty string ("").

It is recommended that subclasses override this method to provide an efficient implementation. an X500Principal representing the subjectdistinguished name
since:
   1.4




getTBSCertificate
abstract public byte[] getTBSCertificate() throws CertificateEncodingException(Code)
Gets the DER-encoded certificate information, the tbsCertificate from this certificate. This can be used to verify the signature independently. the DER-encoded certificate information.
exception:
  CertificateEncodingException - if an encoding error occurs.



getVersion
abstract public int getVersion()(Code)
Gets the version (version number) value from the certificate. The ASN.1 definition for this is:
 version  [0] EXPLICIT Version DEFAULT v1

Version ::= INTEGER { v1(0), v2(1), v3(2) }

the version number, i.e. 1, 2 or 3.



Methods inherited from java.security.cert.Certificate
public boolean equals(Object other)(Code)(Java Doc)
abstract public byte[] getEncoded() throws CertificateEncodingException(Code)(Java Doc)
abstract public PublicKey getPublicKey()(Code)(Java Doc)
final public String getType()(Code)(Java Doc)
public int hashCode()(Code)(Java Doc)
abstract public String toString()(Code)(Java Doc)
abstract public void verify(PublicKey key) throws CertificateException, NoSuchAlgorithmException, InvalidKeyException, NoSuchProviderException, SignatureException(Code)(Java Doc)
abstract public void verify(PublicKey key, String sigProvider) throws CertificateException, NoSuchAlgorithmException, InvalidKeyException, NoSuchProviderException, SignatureException(Code)(Java Doc)
protected Object writeReplace() throws java.io.ObjectStreamException(Code)(Java Doc)

Methods inherited from java.lang.Object
public boolean equals(Object obj)(Code)(Java Doc)
final native public Class getClass()(Code)(Java Doc)
native public int hashCode()(Code)(Java Doc)
final native public void notify()(Code)(Java Doc)
final native public void notifyAll()(Code)(Java Doc)
public String toString()(Code)(Java Doc)
final native public void wait(long timeout) throws InterruptedException(Code)(Java Doc)
final public void wait(long timeout, int nanos) throws InterruptedException(Code)(Java Doc)
final public void wait() throws InterruptedException(Code)(Java Doc)

www.java2java.com | Contact Us
Copyright 2009 - 12 Demo Source and Support. All rights reserved.
All other trademarks are property of their respective owners.