/external/bouncycastle/src/main/java/org/bouncycastle/jce/ |
H A D | PrincipalUtil.java | 61 X509CRL crl) 67 ASN1Object.fromByteArray(crl.getTBSCertList())); 60 getIssuerX509Principal( X509CRL crl) argument
|
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/cert/ |
H A D | CertStoreSpiTest.java | 89 public boolean match (CRL crl) { argument 97 public boolean match (Certificate crl) { argument
|
/external/openssl/apps/ |
H A D | crl2p7.c | 94 X509_CRL *crl=NULL; local 167 BIO_printf(bio_err," -nocrl no crl to load, just certs from '-certfile'\n"); 196 crl=d2i_X509_CRL_bio(in,NULL); 198 crl=PEM_read_bio_X509_CRL(in,NULL,NULL,NULL); 200 BIO_printf(bio_err,"bad input format specified for input crl\n"); 203 if (crl == NULL) 219 p7s->crl=crl_stack; 220 if (crl != NULL) 222 sk_X509_CRL_push(crl_stack,crl); 223 crl [all...] |
H A D | pkcs7.c | 169 BIO_printf(bio_err," -print_certs print any certs or crl in the input\n"); 253 crls=p7->d.sign->crl; 257 crls=p7->d.signed_and_enveloped->crl; 279 X509_CRL *crl; local 283 crl=sk_X509_CRL_value(crls,i); 285 X509_CRL_print(out, crl); 287 if(!noout)PEM_write_bio_X509_CRL(out,crl);
|
H A D | ca.c | 118 #define ENV_CRL "crl" 303 X509_CRL *crl=NULL; local 1403 if ((crl=X509_CRL_new()) == NULL) goto err; 1404 if (!X509_CRL_set_issuer_name(crl, X509_get_subject_name(x509))) goto err; 1409 X509_CRL_set_lastUpdate(crl, tmptm); 1416 X509_CRL_set_nextUpdate(crl, tmptm); 1438 X509_CRL_add0_revoked(crl,r); 1444 X509_CRL_sort(crl); 1454 X509V3_set_ctx(&crlctx, x509, NULL, NULL, crl, 0); 1459 crl_ext, crl)) got [all...] |
/external/openssl/crypto/pkcs12/ |
H A D | p12_utl.c | 127 PKCS12_SAFEBAG *PKCS12_x509crl2certbag(X509_CRL *crl) argument 129 return PKCS12_item_pack_safebag(crl, ASN1_ITEM_rptr(X509_CRL),
|
/external/bouncycastle/src/main/java/org/bouncycastle/x509/ |
H A D | X509CRLStoreSelector.java | 98 X509CRL crl = (X509CRL)obj; 102 byte[] bytes = crl 141 byte[] idp = crl 163 public boolean match(CRL crl) argument 165 return match((Object)crl);
|
/external/apache-harmony/security/src/test/impl/java/org/apache/harmony/security/tests/provider/cert/ |
H A D | X509CRLImplTest.java | 190 private static X509CRLImpl crl; field in class:X509CRLImplTest 241 crl = new X509CRLImpl(certificateList); 276 * X509CRLImpl(CertificateList crl) method testing. 293 if (!Arrays.equals(encoding, crl.getEncoded())) { 305 assertEquals("Incorrect version value", 2, crl.getVersion()); 313 new X500Principal(issuerName), crl.getIssuerDN()); 321 new X500Principal(issuerName), crl.getIssuerDN()); 329 thisUpdate.getTime()/1000 == crl.getThisUpdate().getTime()/1000); 337 nextUpdate.getTime()/1000 == crl.getNextUpdate().getTime()/1000); 374 crl [all...] |
/external/openssl/crypto/pkcs7/ |
H A D | pk7_lib.c | 330 int PKCS7_add_crl(PKCS7 *p7, X509_CRL *crl) argument 339 sk= &(p7->d.sign->crl); 342 sk= &(p7->d.signed_and_enveloped->crl); 357 CRYPTO_add(&crl->references,1,CRYPTO_LOCK_X509_CRL); 358 if (!sk_X509_CRL_push(*sk,crl)) 360 X509_CRL_free(crl);
|
H A D | pkcs7.h | 126 STACK_OF(X509_CRL) *crl; /* [ 1 ] */ member in struct:pkcs7_signed_st 154 STACK_OF(X509_CRL) *crl; /* [ 1 ] */ member in struct:pkcs7_signedandenveloped_st
|
/external/openssl/crypto/x509/ |
H A D | by_dir.c | 285 } crl; member in union:__anon7578 306 data.crl.st_crl.crl= &data.crl.st_crl_info; 307 data.crl.st_crl_info.issuer=name; 308 stmp.data.crl= &data.crl.st_crl;
|
H A D | x_all.c | 106 x->crl->enc.modified = 1; 107 return(ASN1_item_sign(ASN1_ITEM_rptr(X509_CRL_INFO),x->crl->sig_alg, 108 x->sig_alg, x->signature, x->crl,pkey,md)); 140 X509_CRL *d2i_X509_CRL_fp(FILE *fp, X509_CRL **crl) argument 142 return ASN1_item_d2i_fp(ASN1_ITEM_rptr(X509_CRL), fp, crl); 145 int i2d_X509_CRL_fp(FILE *fp, X509_CRL *crl) argument 147 return ASN1_item_i2d_fp(ASN1_ITEM_rptr(X509_CRL), fp, crl); 151 X509_CRL *d2i_X509_CRL_bio(BIO *bp, X509_CRL **crl) argument 153 return ASN1_item_d2i_bio(ASN1_ITEM_rptr(X509_CRL), bp, crl); 156 int i2d_X509_CRL_bio(BIO *bp, X509_CRL *crl) argument [all...] |
H A D | x509_vfy.c | 123 X509_CRL *crl, X509 *x); 128 static void crl_akid_check(X509_STORE_CTX *ctx, X509_CRL *crl, 130 static int crl_crldp_check(X509 *x, X509_CRL *crl, int crl_score, 699 X509_CRL *crl = NULL, *dcrl = NULL; local 712 ok = ctx->get_crl(ctx, &crl, x); 714 ok = get_crl_delta(ctx, &crl, &dcrl, x); 724 ctx->current_crl = crl; 725 ok = ctx->check_crl(ctx, crl); 744 ok = ctx->cert_crl(ctx, crl, x); 749 X509_CRL_free(crl); 765 check_crl_time(X509_STORE_CTX *ctx, X509_CRL *crl, int notify) argument 831 X509_CRL *crl, *best_crl = NULL; local 979 get_crl_score(X509_STORE_CTX *ctx, X509 **pissuer, unsigned int *preasons, X509_CRL *crl, X509 *x) argument 1048 crl_akid_check(X509_STORE_CTX *ctx, X509_CRL *crl, X509 **pissuer, int *pcrl_score) argument 1238 crldp_check_crlissuer(DIST_POINT *dp, X509_CRL *crl, int crl_score) argument 1258 crl_crldp_check(X509 *x, X509_CRL *crl, int crl_score, unsigned int *preasons) argument 1304 X509_CRL *crl = NULL, *dcrl = NULL; local 1343 check_crl(X509_STORE_CTX *ctx, X509_CRL *crl) argument 1450 cert_crl(X509_STORE_CTX *ctx, X509_CRL *crl, X509 *x) argument [all...] |
H A D | x509_vfy.h | 130 X509_CRL *crl; member in union:x509_object_st::__anon7582 200 int (*get_crl)(X509_STORE_CTX *ctx, X509_CRL **crl, X509 *x); /* retrieve CRL */ 201 int (*check_crl)(X509_STORE_CTX *ctx, X509_CRL *crl); /* Check CRL validity */ 202 int (*cert_crl)(X509_STORE_CTX *ctx, X509_CRL *crl, X509 *x); /* Check certificate against CRL */ 249 int (*get_crl)(X509_STORE_CTX *ctx, X509_CRL **crl, X509 *x); /* retrieve CRL */ 250 int (*check_crl)(X509_STORE_CTX *ctx, X509_CRL *crl); /* Check CRL validity */ 251 int (*cert_crl)(X509_STORE_CTX *ctx, X509_CRL *crl, X509 *x); /* Check certificate against CRL */
|
H A D | x509.h | 464 X509_CRL_INFO *crl; member in struct:X509_crl_st 514 X509_CRL *crl; member in struct:X509_info_st 621 #define X509_CRL_get_version(x) ASN1_INTEGER_get((x)->crl->version) 622 #define X509_CRL_get_lastUpdate(x) ((x)->crl->lastUpdate) 623 #define X509_CRL_get_nextUpdate(x) ((x)->crl->nextUpdate) 624 #define X509_CRL_get_issuer(x) ((x)->crl->issuer) 625 #define X509_CRL_get_REVOKED(x) ((x)->crl->revoked) 629 int (*crl_init)(X509_CRL *crl), 630 int (*crl_free)(X509_CRL *crl), 631 int (*crl_lookup)(X509_CRL *crl, X509_REVOKE [all...] |
/external/openssl/crypto/x509v3/ |
H A D | v3_conf.c | 358 X509_CRL *crl) 361 if (crl) 362 sk = &crl->crl->extensions; 447 X509_CRL *crl, int flags) 451 ctx->crl = crl; 510 char *section, X509_CRL *crl) 514 return X509V3_EXT_CRL_add_nconf(&ctmp, ctx, section, crl); 357 X509V3_EXT_CRL_add_nconf(CONF *conf, X509V3_CTX *ctx, char *section, X509_CRL *crl) argument 446 X509V3_set_ctx(X509V3_CTX *ctx, X509 *issuer, X509 *subj, X509_REQ *req, X509_CRL *crl, int flags) argument
|
H A D | x509v3.h | 135 X509_CRL *crl; member in struct:v3_ext_ctx 610 int X509V3_EXT_CRL_add_nconf(CONF *conf, X509V3_CTX *ctx, char *section, X509_CRL *crl); 621 char *section, X509_CRL *crl); variable 636 X509_REQ *req, X509_CRL *crl, int flags);
|
/external/bouncycastle/src/main/java/org/bouncycastle/jce/provider/ |
H A D | CertPathValidatorUtilities.java | 353 protected static X500Principal getIssuerPrincipal(X509CRL crl) argument 355 return crl.getIssuerX500Principal(); 376 // crl checking 987 X509CRL crl, 996 bcCRL = new X509CRLObject(new CertificateList((ASN1Sequence) ASN1Sequence.fromByteArray(crl.getEncoded()))); 1007 .equals(getIssuerPrincipal(crl)))) 1127 X509CRL crl = (X509CRL)it.next(); 1129 if (isDeltaCRL(crl)) 1131 result.add(crl); 1138 private static boolean isDeltaCRL(X509CRL crl) argument 985 getCertStatus( Date validDate, X509CRL crl, Object cert, CertStatus certStatus) argument [all...] |
H A D | RFC3280CertPathUtilities.java | 92 * @param crl The CRL. 98 X509CRL crl) 104 idp = IssuingDistributionPoint.getInstance(CertPathValidatorUtilities.getExtensionValue(crl, 135 ASN1Sequence.fromByteArray(CertPathValidatorUtilities.getIssuerPrincipal(crl) 278 * @param crl The CRL for <code>cert</code>. 285 X509CRL crl) 288 DERObject idp = CertPathValidatorUtilities.getExtensionValue(crl, ISSUING_DISTRIBUTION_POINT); 297 byte[] issuerBytes = CertPathValidatorUtilities.getIssuerPrincipal(crl).getEncoded(); 332 if (CertPathValidatorUtilities.getIssuerPrincipal(crl).equals( 345 X509CRL crl, 95 processCRLB2( DistributionPoint dp, Object cert, X509CRL crl) argument 282 processCRLB1( DistributionPoint dp, Object cert, X509CRL crl) argument 344 processCRLD( X509CRL crl, DistributionPoint dp) argument 435 processCRLF( X509CRL crl, Object cert, X509Certificate defaultCRLSignCert, PublicKey defaultCRLSignKey, ExtendedPKIXParameters paramsPKIX, List certPathCerts) argument 568 processCRLG( X509CRL crl, Set keys) argument 618 processCRLA1i( Date currentDate, ExtendedPKIXParameters paramsPKIX, X509Certificate cert, X509CRL crl) argument 675 processCRLA1ii( Date currentDate, ExtendedPKIXParameters paramsPKIX, X509Certificate cert, X509CRL crl) argument [all...] |
/external/openssl/crypto/store/ |
H A D | str_lib.c | 858 X509_CRL *crl; local 865 if (!object || !object->data.crl) 871 CRYPTO_add(&object->data.crl->references,1,CRYPTO_LOCK_X509_CRL); 875 crl = object->data.crl; 877 return crl; 884 X509_CRL *crl; local 891 if (!object || !object->data.crl) 897 CRYPTO_add(&object->data.crl->references,1,CRYPTO_LOCK_X509_CRL); 901 crl 999 X509_CRL *crl; local [all...] |
H A D | store.h | 222 X509_CRL *crl; member in union:STORE_OBJECT_st::__anon7572
|
/external/openssl/include/openssl/ |
H A D | pkcs7.h | 126 STACK_OF(X509_CRL) *crl; /* [ 1 ] */ member in struct:pkcs7_signed_st 154 STACK_OF(X509_CRL) *crl; /* [ 1 ] */ member in struct:pkcs7_signedandenveloped_st
|
H A D | x509_vfy.h | 130 X509_CRL *crl; member in union:x509_object_st::__anon7615 200 int (*get_crl)(X509_STORE_CTX *ctx, X509_CRL **crl, X509 *x); /* retrieve CRL */ 201 int (*check_crl)(X509_STORE_CTX *ctx, X509_CRL *crl); /* Check CRL validity */ 202 int (*cert_crl)(X509_STORE_CTX *ctx, X509_CRL *crl, X509 *x); /* Check certificate against CRL */ 249 int (*get_crl)(X509_STORE_CTX *ctx, X509_CRL **crl, X509 *x); /* retrieve CRL */ 250 int (*check_crl)(X509_STORE_CTX *ctx, X509_CRL *crl); /* Check CRL validity */ 251 int (*cert_crl)(X509_STORE_CTX *ctx, X509_CRL *crl, X509 *x); /* Check certificate against CRL */
|
H A D | x509.h | 464 X509_CRL_INFO *crl; member in struct:X509_crl_st 514 X509_CRL *crl; member in struct:X509_info_st 621 #define X509_CRL_get_version(x) ASN1_INTEGER_get((x)->crl->version) 622 #define X509_CRL_get_lastUpdate(x) ((x)->crl->lastUpdate) 623 #define X509_CRL_get_nextUpdate(x) ((x)->crl->nextUpdate) 624 #define X509_CRL_get_issuer(x) ((x)->crl->issuer) 625 #define X509_CRL_get_REVOKED(x) ((x)->crl->revoked) 629 int (*crl_init)(X509_CRL *crl), 630 int (*crl_free)(X509_CRL *crl), 631 int (*crl_lookup)(X509_CRL *crl, X509_REVOKE [all...] |
H A D | x509v3.h | 135 X509_CRL *crl; member in struct:v3_ext_ctx 610 int X509V3_EXT_CRL_add_nconf(CONF *conf, X509V3_CTX *ctx, char *section, X509_CRL *crl); 621 char *section, X509_CRL *crl); variable 636 X509_REQ *req, X509_CRL *crl, int flags);
|