/external/openssl/crypto/asn1/ |
H A D | x_crl.c | 68 static void setup_idp(X509_CRL *crl, ISSUING_DIST_POINT *idp); 76 static int def_crl_verify(X509_CRL *crl, EVP_PKEY *r); 77 static int def_crl_lookup(X509_CRL *crl, 126 static int crl_set_issuers(X509_CRL *crl) 133 revoked = X509_CRL_get_REVOKED(crl); 147 crl->flags |= EXFLAG_INVALID; 154 if (!crl->issuers) 156 crl->issuers = sk_GENERAL_NAMES_new_null(); 157 if (!crl->issuers) 160 if (!sk_GENERAL_NAMES_push(crl [all...] |
H A D | asn1_locl.h | 140 int (*crl_init)(X509_CRL *crl); 141 int (*crl_free)(X509_CRL *crl); 142 int (*crl_lookup)(X509_CRL *crl, X509_REVOKED **ret, 144 int (*crl_verify)(X509_CRL *crl, EVP_PKEY *pk);
|
H A D | x_info.c | 82 ret->crl=NULL; 107 if (x->crl != NULL) X509_CRL_free(x->crl);
|
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/cert/ |
H A D | CRLTest.java | 53 CRL crl = new MyCRL("TEST_TYPE"); 54 assertEquals("TEST_TYPE", crl.getType()); 62 CRL crl = new MyCRL(null); 63 assertNull(crl.getType()); 76 CRL crl = new MyCRL("TEST_TYPE"); 77 crl.toString(); 84 CRL crl = new MyCRL("TEST_TYPE"); 85 crl.isRevoked(null);
|
H A D | CertStoreSpiTest.java | 89 public boolean match (CRL crl) { argument 97 public boolean match (Certificate crl) { argument
|
/external/openssl/crypto/x509/ |
H A D | x509cset.c | 69 if (x->crl->version == NULL) 71 if ((x->crl->version=M_ASN1_INTEGER_new()) == NULL) 74 return(ASN1_INTEGER_set(x->crl->version,version)); 79 if ((x == NULL) || (x->crl == NULL)) return(0); 80 return(X509_NAME_set(&x->crl->issuer,name)); 89 in=x->crl->lastUpdate; 95 M_ASN1_TIME_free(x->crl->lastUpdate); 96 x->crl->lastUpdate=in; 107 in=x->crl->nextUpdate; 113 M_ASN1_TIME_free(x->crl [all...] |
H A D | x509_ext.c | 71 return(X509v3_get_ext_count(x->crl->extensions)); 76 return(X509v3_get_ext_by_NID(x->crl->extensions,nid,lastpos)); 81 return(X509v3_get_ext_by_OBJ(x->crl->extensions,obj,lastpos)); 86 return(X509v3_get_ext_by_critical(x->crl->extensions,crit,lastpos)); 91 return(X509v3_get_ext(x->crl->extensions,loc)); 96 return(X509v3_delete_ext(x->crl->extensions,loc)); 101 return X509V3_get_d2i(x->crl->extensions, nid, crit, idx); 107 return X509V3_add1_i2d(&x->crl->extensions, nid, value, crit, flags); 112 return(X509v3_add_ext(&(x->crl->extensions),ex,loc) != NULL);
|
H A D | x509_vfy.c | 123 X509_CRL *crl, X509 *x); 128 static void crl_akid_check(X509_STORE_CTX *ctx, X509_CRL *crl, 130 static int crl_crldp_check(X509 *x, X509_CRL *crl, int crl_score, 694 X509_CRL *crl = NULL, *dcrl = NULL; local 707 ok = ctx->get_crl(ctx, &crl, x); 709 ok = get_crl_delta(ctx, &crl, &dcrl, x); 719 ctx->current_crl = crl; 720 ok = ctx->check_crl(ctx, crl); 739 ok = ctx->cert_crl(ctx, crl, x); 744 X509_CRL_free(crl); 760 check_crl_time(X509_STORE_CTX *ctx, X509_CRL *crl, int notify) argument 826 X509_CRL *crl, *best_crl = NULL; local 974 get_crl_score(X509_STORE_CTX *ctx, X509 **pissuer, unsigned int *preasons, X509_CRL *crl, X509 *x) argument 1043 crl_akid_check(X509_STORE_CTX *ctx, X509_CRL *crl, X509 **pissuer, int *pcrl_score) argument 1233 crldp_check_crlissuer(DIST_POINT *dp, X509_CRL *crl, int crl_score) argument 1253 crl_crldp_check(X509 *x, X509_CRL *crl, int crl_score, unsigned int *preasons) argument 1299 X509_CRL *crl = NULL, *dcrl = NULL; local 1338 check_crl(X509_STORE_CTX *ctx, X509_CRL *crl) argument 1445 cert_crl(X509_STORE_CTX *ctx, X509_CRL *crl, X509 *x) argument [all...] |
H A D | by_dir.c | 285 } crl; member in union:__anon9887 306 data.crl.st_crl.crl= &data.crl.st_crl_info; 307 data.crl.st_crl_info.issuer=name; 308 stmp.data.crl= &data.crl.st_crl;
|
H A D | x_all.c | 119 x->crl->enc.modified = 1; 120 return(ASN1_item_sign(ASN1_ITEM_rptr(X509_CRL_INFO),x->crl->sig_alg, 121 x->sig_alg, x->signature, x->crl,pkey,md)); 127 x->crl->sig_alg, x->sig_alg, x->signature, x->crl, ctx); 159 X509_CRL *d2i_X509_CRL_fp(FILE *fp, X509_CRL **crl) argument 161 return ASN1_item_d2i_fp(ASN1_ITEM_rptr(X509_CRL), fp, crl); 164 int i2d_X509_CRL_fp(FILE *fp, X509_CRL *crl) argument 166 return ASN1_item_i2d_fp(ASN1_ITEM_rptr(X509_CRL), fp, crl); 170 X509_CRL *d2i_X509_CRL_bio(BIO *bp, X509_CRL **crl) argument 175 i2d_X509_CRL_bio(BIO *bp, X509_CRL *crl) argument [all...] |
H A D | x509_lu.c | 169 ret=X509_CRL_cmp((*a)->data.crl,(*b)->data.crl); 222 X509_CRL_free(a->data.crl); 380 obj->data.crl=x; 408 CRYPTO_add(&a->data.crl->references,1,CRYPTO_LOCK_X509_CRL); 421 X509_CRL_free(a->data.crl); 445 stmp.data.crl= &crl_s; 446 crl_s.crl= &crl_info_s; 569 x = obj->data.crl; 603 if (!X509_CRL_match(obj->data.crl, [all...] |
H A D | x509.h | 464 X509_CRL_INFO *crl; member in struct:X509_crl_st 514 X509_CRL *crl; member in struct:X509_info_st 621 #define X509_CRL_get_version(x) ASN1_INTEGER_get((x)->crl->version) 622 #define X509_CRL_get_lastUpdate(x) ((x)->crl->lastUpdate) 623 #define X509_CRL_get_nextUpdate(x) ((x)->crl->nextUpdate) 624 #define X509_CRL_get_issuer(x) ((x)->crl->issuer) 625 #define X509_CRL_get_REVOKED(x) ((x)->crl->revoked) 629 int (*crl_init)(X509_CRL *crl), 630 int (*crl_free)(X509_CRL *crl), 631 int (*crl_lookup)(X509_CRL *crl, X509_REVOKE [all...] |
/external/apache-harmony/security/src/test/impl/java/org/apache/harmony/security/tests/provider/cert/ |
H A D | X509CRLImplTest.java | 190 private static X509CRLImpl crl; field in class:X509CRLImplTest 241 crl = new X509CRLImpl(certificateList); 276 * X509CRLImpl(CertificateList crl) method testing. 293 if (!Arrays.equals(encoding, crl.getEncoded())) { 305 assertEquals("Incorrect version value", 2, crl.getVersion()); 313 new X500Principal(issuerName), crl.getIssuerDN()); 321 new X500Principal(issuerName), crl.getIssuerDN()); 329 thisUpdate.getTime()/1000 == crl.getThisUpdate().getTime()/1000); 337 nextUpdate.getTime()/1000 == crl.getNextUpdate().getTime()/1000); 374 crl [all...] |
H A D | X509CertFactoryImplTest.java | 108 CRL crl; 114 crl = certFactory.engineGenerateCRL(bais); 115 assertNotNull("First generated CRL is null", crl); 116 crl = certFactory.engineGenerateCRL(bais); 117 assertNotNull("Second generated CRL is null", crl); 129 crl = certFactory.engineGenerateCRL(bais); 130 assertNotNull("First generated CRL is null", crl); 131 crl = certFactory.engineGenerateCRL(bais); 132 assertNotNull("Second generated CRL is null", crl);
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/provider/ |
H A D | PKIXCRLUtil.java | 50 X509CRL crl = (X509CRL)it.next(); 52 if (crl.getNextUpdate().after(validityDate)) 58 if (crl.getThisUpdate().before(cert.getNotAfter())) 60 finalSet.add(crl); 65 finalSet.add(crl);
|
H A D | RFC3280CertPathUtilities.java | 92 * @param crl The CRL. 98 X509CRL crl) 104 idp = IssuingDistributionPoint.getInstance(CertPathValidatorUtilities.getExtensionValue(crl, 135 ASN1Sequence.fromByteArray(CertPathValidatorUtilities.getIssuerPrincipal(crl) 278 * @param crl The CRL for <code>cert</code>. 285 X509CRL crl) 288 ASN1Primitive idp = CertPathValidatorUtilities.getExtensionValue(crl, ISSUING_DISTRIBUTION_POINT); 297 byte[] issuerBytes = CertPathValidatorUtilities.getIssuerPrincipal(crl).getEncoded(); 332 if (CertPathValidatorUtilities.getIssuerPrincipal(crl).equals( 345 X509CRL crl, 95 processCRLB2( DistributionPoint dp, Object cert, X509CRL crl) argument 282 processCRLB1( DistributionPoint dp, Object cert, X509CRL crl) argument 344 processCRLD( X509CRL crl, DistributionPoint dp) argument 434 processCRLF( X509CRL crl, Object cert, X509Certificate defaultCRLSignCert, PublicKey defaultCRLSignKey, ExtendedPKIXParameters paramsPKIX, List certPathCerts) argument 567 processCRLG( X509CRL crl, Set keys) argument 617 processCRLA1i( Date currentDate, ExtendedPKIXParameters paramsPKIX, X509Certificate cert, X509CRL crl) argument 674 processCRLA1ii( Date currentDate, ExtendedPKIXParameters paramsPKIX, X509Certificate cert, X509CRL crl) argument [all...] |
/external/apache-harmony/security/src/test/impl/java.injected/java/security/cert/ |
H A D | X509CRLSelectorTest.java | 351 * Tests if CRLs with any crl number value match the selector in the case of 358 TestCRL crl = new TestCRL(minCRL); 362 selector.match(crl)); 365 selector.match(crl)); 368 selector.match(crl)); 373 * Tests if CRLs with any crl number value match the selector in the case of 380 TestCRL crl = new TestCRL(maxCRL); 384 selector.match(crl)); 387 selector.match(crl)); 390 selector.match(crl)); [all...] |
/external/openssl/apps/ |
H A D | crl2p7.c | 94 X509_CRL *crl=NULL; local 167 BIO_printf(bio_err," -nocrl no crl to load, just certs from '-certfile'\n"); 196 crl=d2i_X509_CRL_bio(in,NULL); 198 crl=PEM_read_bio_X509_CRL(in,NULL,NULL,NULL); 200 BIO_printf(bio_err,"bad input format specified for input crl\n"); 203 if (crl == NULL) 219 p7s->crl=crl_stack; 220 if (crl != NULL) 222 sk_X509_CRL_push(crl_stack,crl); 223 crl [all...] |
H A D | pkcs7.c | 169 BIO_printf(bio_err," -print_certs print any certs or crl in the input\n"); 253 crls=p7->d.sign->crl; 257 crls=p7->d.signed_and_enveloped->crl; 279 X509_CRL *crl; local 283 crl=sk_X509_CRL_value(crls,i); 285 X509_CRL_print(out, crl); 287 if(!noout)PEM_write_bio_X509_CRL(out,crl);
|
H A D | openssl.cnf | 44 crl_dir = $dir/crl # Where the issued crl are kept 52 crlnumber = $dir/crlnumber # the current crl number 54 crl = $dir/crl.pem # The current CRL 207 #nsCaRevocationUrl = http://www.domain.dom/ca-crl.pem 312 #nsCaRevocationUrl = http://www.domain.dom/ca-crl.pem
|
/external/openssl/android.testssl/ |
H A D | CAss.cnf | 36 crl_dir = $dir/crl # Where the issued crl are kept 44 crl = $dir/crl.pem # The current CRL
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/ |
H A D | PrincipalUtil.java | 66 X509CRL crl) 72 ASN1Primitive.fromByteArray(crl.getTBSCertList())); 65 getIssuerX509Principal( X509CRL crl) argument
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/x509/ |
H A D | X509CRLStoreSelector.java | 98 X509CRL crl = (X509CRL)obj; 102 byte[] bytes = crl 141 byte[] idp = crl 163 public boolean match(CRL crl) argument 165 return match((Object)crl);
|
/external/openssl/crypto/x509v3/ |
H A D | v3_conf.c | 358 X509_CRL *crl) 361 if (crl) 362 sk = &crl->crl->extensions; 447 X509_CRL *crl, int flags) 451 ctx->crl = crl; 510 char *section, X509_CRL *crl) 514 return X509V3_EXT_CRL_add_nconf(&ctmp, ctx, section, crl); 357 X509V3_EXT_CRL_add_nconf(CONF *conf, X509V3_CTX *ctx, char *section, X509_CRL *crl) argument 446 X509V3_set_ctx(X509V3_CTX *ctx, X509 *issuer, X509 *subj, X509_REQ *req, X509_CRL *crl, int flags) argument
|
/external/openssl/crypto/pkcs12/ |
H A D | p12_utl.c | 127 PKCS12_SAFEBAG *PKCS12_x509crl2certbag(X509_CRL *crl) argument 129 return PKCS12_item_pack_safebag(crl, ASN1_ITEM_rptr(X509_CRL),
|