/external/openssl/crypto/asn1/ |
H A D | x_crl.c | 68 static void setup_idp(X509_CRL *crl, ISSUING_DIST_POINT *idp); 76 static int def_crl_verify(X509_CRL *crl, EVP_PKEY *r); 77 static int def_crl_lookup(X509_CRL *crl, 126 static int crl_set_issuers(X509_CRL *crl) 133 revoked = X509_CRL_get_REVOKED(crl); 147 crl->flags |= EXFLAG_INVALID; 154 if (!crl->issuers) 156 crl->issuers = sk_GENERAL_NAMES_new_null(); 157 if (!crl->issuers) 160 if (!sk_GENERAL_NAMES_push(crl [all...] |
H A D | asn1_locl.h | 129 int (*crl_init)(X509_CRL *crl); 130 int (*crl_free)(X509_CRL *crl); 131 int (*crl_lookup)(X509_CRL *crl, X509_REVOKED **ret, 133 int (*crl_verify)(X509_CRL *crl, EVP_PKEY *pk);
|
H A D | x_info.c | 82 ret->crl=NULL; 107 if (x->crl != NULL) X509_CRL_free(x->crl);
|
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/cert/ |
H A D | CRLTest.java | 53 CRL crl = new MyCRL("TEST_TYPE"); 54 assertEquals("TEST_TYPE", crl.getType()); 62 CRL crl = new MyCRL(null); 63 assertNull(crl.getType()); 76 CRL crl = new MyCRL("TEST_TYPE"); 77 crl.toString(); 84 CRL crl = new MyCRL("TEST_TYPE"); 85 crl.isRevoked(null);
|
H A D | CertStoreSpiTest.java | 89 public boolean match (CRL crl) { argument 97 public boolean match (Certificate crl) { argument
|
/external/openssl/crypto/x509/ |
H A D | x509cset.c | 69 if (x->crl->version == NULL) 71 if ((x->crl->version=M_ASN1_INTEGER_new()) == NULL) 74 return(ASN1_INTEGER_set(x->crl->version,version)); 79 if ((x == NULL) || (x->crl == NULL)) return(0); 80 return(X509_NAME_set(&x->crl->issuer,name)); 89 in=x->crl->lastUpdate; 95 M_ASN1_TIME_free(x->crl->lastUpdate); 96 x->crl->lastUpdate=in; 107 in=x->crl->nextUpdate; 113 M_ASN1_TIME_free(x->crl [all...] |
H A D | x509_ext.c | 71 return(X509v3_get_ext_count(x->crl->extensions)); 76 return(X509v3_get_ext_by_NID(x->crl->extensions,nid,lastpos)); 81 return(X509v3_get_ext_by_OBJ(x->crl->extensions,obj,lastpos)); 86 return(X509v3_get_ext_by_critical(x->crl->extensions,crit,lastpos)); 91 return(X509v3_get_ext(x->crl->extensions,loc)); 96 return(X509v3_delete_ext(x->crl->extensions,loc)); 101 return X509V3_get_d2i(x->crl->extensions, nid, crit, idx); 107 return X509V3_add1_i2d(&x->crl->extensions, nid, value, crit, flags); 112 return(X509v3_add_ext(&(x->crl->extensions),ex,loc) != NULL);
|
H A D | x509_vfy.c | 123 X509_CRL *crl, X509 *x); 128 static void crl_akid_check(X509_STORE_CTX *ctx, X509_CRL *crl, 130 static int crl_crldp_check(X509 *x, X509_CRL *crl, int crl_score, 699 X509_CRL *crl = NULL, *dcrl = NULL; local 712 ok = ctx->get_crl(ctx, &crl, x); 714 ok = get_crl_delta(ctx, &crl, &dcrl, x); 724 ctx->current_crl = crl; 725 ok = ctx->check_crl(ctx, crl); 744 ok = ctx->cert_crl(ctx, crl, x); 749 X509_CRL_free(crl); 765 check_crl_time(X509_STORE_CTX *ctx, X509_CRL *crl, int notify) argument 831 X509_CRL *crl, *best_crl = NULL; local 979 get_crl_score(X509_STORE_CTX *ctx, X509 **pissuer, unsigned int *preasons, X509_CRL *crl, X509 *x) argument 1048 crl_akid_check(X509_STORE_CTX *ctx, X509_CRL *crl, X509 **pissuer, int *pcrl_score) argument 1238 crldp_check_crlissuer(DIST_POINT *dp, X509_CRL *crl, int crl_score) argument 1258 crl_crldp_check(X509 *x, X509_CRL *crl, int crl_score, unsigned int *preasons) argument 1304 X509_CRL *crl = NULL, *dcrl = NULL; local 1343 check_crl(X509_STORE_CTX *ctx, X509_CRL *crl) argument 1450 cert_crl(X509_STORE_CTX *ctx, X509_CRL *crl, X509 *x) argument [all...] |
H A D | by_dir.c | 285 } crl; member in union:__anon7578 306 data.crl.st_crl.crl= &data.crl.st_crl_info; 307 data.crl.st_crl_info.issuer=name; 308 stmp.data.crl= &data.crl.st_crl;
|
H A D | x509_lu.c | 169 ret=X509_CRL_cmp((*a)->data.crl,(*b)->data.crl); 222 X509_CRL_free(a->data.crl); 380 obj->data.crl=x; 408 CRYPTO_add(&a->data.crl->references,1,CRYPTO_LOCK_X509_CRL); 421 X509_CRL_free(a->data.crl); 445 stmp.data.crl= &crl_s; 446 crl_s.crl= &crl_info_s; 569 x = obj->data.crl; 603 if (!X509_CRL_match(obj->data.crl, [all...] |
H A D | x_all.c | 106 x->crl->enc.modified = 1; 107 return(ASN1_item_sign(ASN1_ITEM_rptr(X509_CRL_INFO),x->crl->sig_alg, 108 x->sig_alg, x->signature, x->crl,pkey,md)); 140 X509_CRL *d2i_X509_CRL_fp(FILE *fp, X509_CRL **crl) argument 142 return ASN1_item_d2i_fp(ASN1_ITEM_rptr(X509_CRL), fp, crl); 145 int i2d_X509_CRL_fp(FILE *fp, X509_CRL *crl) argument 147 return ASN1_item_i2d_fp(ASN1_ITEM_rptr(X509_CRL), fp, crl); 151 X509_CRL *d2i_X509_CRL_bio(BIO *bp, X509_CRL **crl) argument 153 return ASN1_item_d2i_bio(ASN1_ITEM_rptr(X509_CRL), bp, crl); 156 int i2d_X509_CRL_bio(BIO *bp, X509_CRL *crl) argument [all...] |
H A D | x509.h | 464 X509_CRL_INFO *crl; member in struct:X509_crl_st 514 X509_CRL *crl; member in struct:X509_info_st 621 #define X509_CRL_get_version(x) ASN1_INTEGER_get((x)->crl->version) 622 #define X509_CRL_get_lastUpdate(x) ((x)->crl->lastUpdate) 623 #define X509_CRL_get_nextUpdate(x) ((x)->crl->nextUpdate) 624 #define X509_CRL_get_issuer(x) ((x)->crl->issuer) 625 #define X509_CRL_get_REVOKED(x) ((x)->crl->revoked) 629 int (*crl_init)(X509_CRL *crl), 630 int (*crl_free)(X509_CRL *crl), 631 int (*crl_lookup)(X509_CRL *crl, X509_REVOKE [all...] |
/external/apache-harmony/security/src/test/impl/java/org/apache/harmony/security/tests/provider/cert/ |
H A D | X509CRLImplTest.java | 190 private static X509CRLImpl crl; field in class:X509CRLImplTest 241 crl = new X509CRLImpl(certificateList); 276 * X509CRLImpl(CertificateList crl) method testing. 293 if (!Arrays.equals(encoding, crl.getEncoded())) { 305 assertEquals("Incorrect version value", 2, crl.getVersion()); 313 new X500Principal(issuerName), crl.getIssuerDN()); 321 new X500Principal(issuerName), crl.getIssuerDN()); 329 thisUpdate.getTime()/1000 == crl.getThisUpdate().getTime()/1000); 337 nextUpdate.getTime()/1000 == crl.getNextUpdate().getTime()/1000); 374 crl [all...] |
H A D | X509CertFactoryImplTest.java | 108 CRL crl; 114 crl = certFactory.engineGenerateCRL(bais); 115 assertNotNull("First generated CRL is null", crl); 116 crl = certFactory.engineGenerateCRL(bais); 117 assertNotNull("Second generated CRL is null", crl); 129 crl = certFactory.engineGenerateCRL(bais); 130 assertNotNull("First generated CRL is null", crl); 131 crl = certFactory.engineGenerateCRL(bais); 132 assertNotNull("Second generated CRL is null", crl);
|
/external/bouncycastle/src/main/java/org/bouncycastle/jce/ |
H A D | PrincipalUtil.java | 61 X509CRL crl) 67 ASN1Object.fromByteArray(crl.getTBSCertList())); 60 getIssuerX509Principal( X509CRL crl) argument
|
/external/bouncycastle/src/main/java/org/bouncycastle/jce/provider/ |
H A D | PKIXCRLUtil.java | 50 X509CRL crl = (X509CRL)it.next(); 52 if (crl.getNextUpdate().after(validityDate)) 58 if (crl.getThisUpdate().before(cert.getNotAfter())) 60 finalSet.add(crl); 65 finalSet.add(crl);
|
H A D | RFC3280CertPathUtilities.java | 92 * @param crl The CRL. 98 X509CRL crl) 104 idp = IssuingDistributionPoint.getInstance(CertPathValidatorUtilities.getExtensionValue(crl, 135 ASN1Sequence.fromByteArray(CertPathValidatorUtilities.getIssuerPrincipal(crl) 278 * @param crl The CRL for <code>cert</code>. 285 X509CRL crl) 288 DERObject idp = CertPathValidatorUtilities.getExtensionValue(crl, ISSUING_DISTRIBUTION_POINT); 297 byte[] issuerBytes = CertPathValidatorUtilities.getIssuerPrincipal(crl).getEncoded(); 332 if (CertPathValidatorUtilities.getIssuerPrincipal(crl).equals( 345 X509CRL crl, 95 processCRLB2( DistributionPoint dp, Object cert, X509CRL crl) argument 282 processCRLB1( DistributionPoint dp, Object cert, X509CRL crl) argument 344 processCRLD( X509CRL crl, DistributionPoint dp) argument 435 processCRLF( X509CRL crl, Object cert, X509Certificate defaultCRLSignCert, PublicKey defaultCRLSignKey, ExtendedPKIXParameters paramsPKIX, List certPathCerts) argument 568 processCRLG( X509CRL crl, Set keys) argument 618 processCRLA1i( Date currentDate, ExtendedPKIXParameters paramsPKIX, X509Certificate cert, X509CRL crl) argument 675 processCRLA1ii( Date currentDate, ExtendedPKIXParameters paramsPKIX, X509Certificate cert, X509CRL crl) argument [all...] |
/external/apache-harmony/security/src/test/impl/java.injected/java/security/cert/ |
H A D | X509CRLSelectorTest.java | 351 * Tests if CRLs with any crl number value match the selector in the case of 358 TestCRL crl = new TestCRL(minCRL); 362 selector.match(crl)); 365 selector.match(crl)); 368 selector.match(crl)); 373 * Tests if CRLs with any crl number value match the selector in the case of 380 TestCRL crl = new TestCRL(maxCRL); 384 selector.match(crl)); 387 selector.match(crl)); 390 selector.match(crl)); [all...] |
/external/openssl/apps/ |
H A D | crl2p7.c | 94 X509_CRL *crl=NULL; local 167 BIO_printf(bio_err," -nocrl no crl to load, just certs from '-certfile'\n"); 196 crl=d2i_X509_CRL_bio(in,NULL); 198 crl=PEM_read_bio_X509_CRL(in,NULL,NULL,NULL); 200 BIO_printf(bio_err,"bad input format specified for input crl\n"); 203 if (crl == NULL) 219 p7s->crl=crl_stack; 220 if (crl != NULL) 222 sk_X509_CRL_push(crl_stack,crl); 223 crl [all...] |
H A D | pkcs7.c | 169 BIO_printf(bio_err," -print_certs print any certs or crl in the input\n"); 253 crls=p7->d.sign->crl; 257 crls=p7->d.signed_and_enveloped->crl; 279 X509_CRL *crl; local 283 crl=sk_X509_CRL_value(crls,i); 285 X509_CRL_print(out, crl); 287 if(!noout)PEM_write_bio_X509_CRL(out,crl);
|
H A D | openssl.cnf | 44 crl_dir = $dir/crl # Where the issued crl are kept 52 crlnumber = $dir/crlnumber # the current crl number 54 crl = $dir/crl.pem # The current CRL 207 #nsCaRevocationUrl = http://www.domain.dom/ca-crl.pem 312 #nsCaRevocationUrl = http://www.domain.dom/ca-crl.pem
|
/external/openssl/android.testssl/ |
H A D | CAss.cnf | 36 crl_dir = $dir/crl # Where the issued crl are kept 44 crl = $dir/crl.pem # The current CRL
|
/external/bouncycastle/src/main/java/org/bouncycastle/x509/ |
H A D | X509CRLStoreSelector.java | 98 X509CRL crl = (X509CRL)obj; 102 byte[] bytes = crl 141 byte[] idp = crl 163 public boolean match(CRL crl) argument 165 return match((Object)crl);
|
/external/openssl/crypto/x509v3/ |
H A D | v3_conf.c | 358 X509_CRL *crl) 361 if (crl) 362 sk = &crl->crl->extensions; 447 X509_CRL *crl, int flags) 451 ctx->crl = crl; 510 char *section, X509_CRL *crl) 514 return X509V3_EXT_CRL_add_nconf(&ctmp, ctx, section, crl); 357 X509V3_EXT_CRL_add_nconf(CONF *conf, X509V3_CTX *ctx, char *section, X509_CRL *crl) argument 446 X509V3_set_ctx(X509V3_CTX *ctx, X509 *issuer, X509 *subj, X509_REQ *req, X509_CRL *crl, int flags) argument
|
/external/openssl/crypto/pkcs12/ |
H A D | p12_utl.c | 127 PKCS12_SAFEBAG *PKCS12_x509crl2certbag(X509_CRL *crl) argument 129 return PKCS12_item_pack_safebag(crl, ASN1_ITEM_rptr(X509_CRL),
|