• Home
  • History
  • Annotate
  • Raw
  • Download
  • only in /macosx-10.10/Security-57031.1.35/Security/libsecurity_apple_x509_tp/lib/

Lines Matching defs:expired

1210 	bool expired = false;
1219 /* check for expired, not valid yet */
1230 expired = true;
1237 if(expired && !allowExpired) {
1423 * Temporal validity check: if we're not already holding an expired
1428 tpDebug("findIssuerForCertOrCrl: holding expired cert %p",
1456 /* OK, we'll use this one (preferred over an expired issuer) */
1463 tpDbDebug("findIssuerForCertOrCrl: using expired cert %p", expiredIssuer);
1475 * we always try to find a valid cert to replace an expired or
1564 /* possible expired root which we'll only use if we can't find
1568 /* and the general case of an expired or not yet valid cert */
1718 * the anchor (and handle the anchor correctly if it's expired.)
1764 * If we find a cert that's expired or not yet valid, we hold on to it
1766 * expired one at the end of the loop. If that expired cert is a root
1789 /* Check whether candidate issuer is expired or not yet valid */
1792 tpDebug("buildCertGroup: saving expired cert %p (1)", issuerCert);
1796 /* else we already have an expired issuer candidate */
1802 tpDebug("buildCertGroup: DISCARDING expired cert %p (1)", expiredIssuer);
1848 /* Check whether candidate issuer is expired or not yet valid */
1851 tpDebug("buildCertGroup: saving expired cert %p (2)", issuerCert);
1855 /* else we already have an expired issuer candidate */
1861 tpDebug("buildCertGroup: DISCARDING expired cert %p (2)", expiredIssuer);
1928 tpDebug("buildCertGroup: DISCARDING expired cert %p (3)", expiredIssuer);
1966 tpDebug("buildCertGroup: DISCARDING expired cert %p (4)", expiredIssuer);
2006 * Note: we don't handle an expired cert returned from tpDbFindIssuerCert()
2009 * it returns an expired cert (or, if findIssuerForCertOrCrl() gave us an
2010 * expired cert and tpDbFindIssuerCert() could not do any better), that's all
2012 * and apply trust settings if enabled; if an expired cert is trusted per
2015 * and subject name are in DLDBs, and one of them is expired, we'll have the
2019 * If Trust Settings are not enabled, and we have an expired root at this
2039 (expiredIssuer != NULL)) { /* but we have an expired candidate */
2041 * OK, we'll take the expired issuer.
2046 tpDebug("buildCertGroup: USING expired cert %p", expiredIssuer);
2134 tpDebug("buildCertGroup: saving expired anchor %p", anchorInfo);
2143 /* else we already have an expired candidate anchor */
2151 tpDebug("buildCertGroup: DISCARDING expired anchor %p", expiredIssuer);
2276 tpDebug("buildCertGroup: accepting expired anchor %p", expiredIssuer);
2290 * the expired root and return.