Java™ Platform
Standard Ed. 6

Uses of Class
java.security.cert.CRLException

Packages that use CRLException
java.security.cert Provides classes and interfaces for parsing and managing certificates, certificate revocation lists (CRLs), and certification paths. 
 

Uses of CRLException in java.security.cert
 

Methods in java.security.cert that throw CRLException
abstract  CRL CertificateFactorySpi.engineGenerateCRL(InputStream inStream)
          Generates a certificate revocation list (CRL) object and initializes it with the data read from the input stream inStream.
abstract  Collection<? extends CRL> CertificateFactorySpi.engineGenerateCRLs(InputStream inStream)
          Returns a (possibly empty) collection view of the CRLs read from the given input stream inStream.
 CRL CertificateFactory.generateCRL(InputStream inStream)
          Generates a certificate revocation list (CRL) object and initializes it with the data read from the input stream inStream.
 Collection<? extends CRL> CertificateFactory.generateCRLs(InputStream inStream)
          Returns a (possibly empty) collection view of the CRLs read from the given input stream inStream.
abstract  byte[] X509CRLEntry.getEncoded()
          Returns the ASN.1 DER-encoded form of this CRL Entry, that is the inner SEQUENCE.
abstract  byte[] X509CRL.getEncoded()
          Returns the ASN.1 DER-encoded form of this CRL.
abstract  byte[] X509CRL.getTBSCertList()
          Gets the DER-encoded CRL information, the tbsCertList from this CRL.
abstract  void X509CRL.verify(PublicKey key)
          Verifies that this CRL was signed using the private key that corresponds to the given public key.
abstract  void X509CRL.verify(PublicKey key, String sigProvider)
          Verifies that this CRL was signed using the private key that corresponds to the given public key.
 


Java™ Platform
Standard Ed. 6

Submit a bug or feature
For further API reference and developer documentation, see Java SE Developer Documentation. That documentation contains more detailed, developer-targeted descriptions, with conceptual overviews, definitions of terms, workarounds, and working code examples.

Copyright 2006 Sun Microsystems, Inc. All rights reserved. Use is subject to license terms. Also see the documentation redistribution policy.