/freebsd-9.3-release/crypto/openssl/crypto/asn1/ |
H A D | x_crl.c | 76 * revoked field. 82 if (!a || !a->revoked) 90 (void)sk_X509_REVOKED_set_cmp_func(a->revoked, X509_REVOKED_cmp); 103 ASN1_SEQUENCE_OF_OPT(X509_CRL_INFO, revoked, X509_REVOKED), 132 if (!inf->revoked) 133 inf->revoked = sk_X509_REVOKED_new(X509_REVOKED_cmp); 134 if (!inf->revoked || !sk_X509_REVOKED_push(inf->revoked, rev)) {
|
/freebsd-9.3-release/crypto/openssh/regress/ |
H A D | krl.sh | 15 rm -f $OBJ/revoked-* $OBJ/krl-* 18 $SSHKEYGEN -t $ECDSA -f $OBJ/revoked-ca -C "" -N "" > /dev/null || 24 cat << EOF >> $OBJ/revoked-serials 43 touch $OBJ/revoked-keyid 46 echo "id: revoked $n" >> $OBJ/revoked-keyid 51 f=$OBJ/revoked-`printf "%04d" $N` 61 $SSHKEYGEN -s $OBJ/revoked-ca -z $n -I "revoked $N" $f >/dev/null 2>&1 \ 91 $SSHKEYGEN $OPTS -kf $OBJ/krl-ca $OBJ/revoked [all...] |
H A D | Makefile | 89 sshd_proxy.* authorized_keys_${USER}.* modpipe revoked-* krl-* \
|
/freebsd-9.3-release/crypto/openssl/crypto/x509/ |
H A D | x509cset.c | 126 sk_X509_REVOKED_sort(c->crl->revoked); 127 for (i = 0; i < sk_X509_REVOKED_num(c->crl->revoked); i++) { 128 r = sk_X509_REVOKED_value(c->crl->revoked, i);
|
H A D | x509_vfy.c | 785 * Sort revoked into serial number order if not already sorted. Do this 788 if (!sk_X509_REVOKED_is_sorted(crl->crl->revoked)) { 790 sk_X509_REVOKED_sort(crl->crl->revoked); 793 idx = sk_X509_REVOKED_find(crl->crl->revoked, &rtmp); 795 * If found assume revoked: want something cleverer than this to handle
|
H A D | x509.h | 436 STACK_OF(X509_REVOKED) *revoked; member in struct:X509_crl_info_st 723 # define X509_CRL_get_REVOKED(x) ((x)->crl->revoked)
|
/freebsd-9.3-release/crypto/openssl/demos/asn1/ |
H A D | ocsp.c | 140 revoked [1] IMPLICIT RevokedInfo, 249 RevokedInfo *revoked; member in union:__anon120::__anon121 336 ASN1_IMP(CertStatus, d.revoked, RevokedInfo, 1),
|
/freebsd-9.3-release/usr.sbin/pkg/ |
H A D | pkg.c | 703 struct fingerprint_list *trusted, *revoked; local 713 trusted = revoked = NULL; 733 snprintf(path, MAXPATHLEN, "%s/revoked", fingerprints); 734 if ((revoked = load_fingerprints(path, &revoked_count)) == NULL) { 735 warnx("Error loading revoked certificates"); 750 /* Check if this hash is revoked */ 751 if (revoked != NULL) { 752 STAILQ_FOREACH(fingerprint, revoked, next) { 755 "revoked certificate %s\n", 791 if (revoked) [all...] |
/freebsd-9.3-release/crypto/openssl/crypto/ocsp/ |
H A D | ocsp_asn.c | 135 ASN1_IMP(OCSP_CERTSTATUS, value.revoked, OCSP_REVOKEDINFO, 1),
|
H A D | ocsp_prn.c | 119 {V_OCSP_CERTSTATUS_REVOKED, "revoked"}, 253 rev = cst->value.revoked;
|
H A D | ocsp_srv.c | 173 if (!(cs->value.revoked = ri = OCSP_REVOKEDINFO_new()))
|
H A D | ocsp_cl.c | 267 * revoked. Returns numerical value of status. 282 OCSP_REVOKEDINFO *rev = cst->value.revoked;
|
H A D | ocsp.h | 222 * revoked [1] IMPLICIT RevokedInfo, 232 OCSP_REVOKEDINFO *revoked; member in union:ocsp_cert_status_st::__anon74
|
/freebsd-9.3-release/crypto/heimdal/lib/hx509/ |
H A D | revoke.c | 741 "Certificate revoked by issuer in OCSP"); 832 "Certificate revoked by issuer in CRL"); 1128 status = "revoked"; 1267 hx509_certs revoked; member in struct:hx509_crl 1293 ret = hx509_certs_init(context, "MEMORY:crl", 0, NULL, &(*crl)->revoked); 1304 * Add revoked certificate to an CRL context. 1307 * @param crl the CRL to add the revoked certificate to. 1320 return hx509_certs_merge(context, crl->revoked, certs); 1357 hx509_certs_free(&(*crl)->revoked); 1482 ret = hx509_certs_iter(context, crl->revoked, add_revoke [all...] |
H A D | hxtool.c | 1910 hx509_certs revoked = NULL; local 1913 ret = hx509_certs_init(context, "MEMORY:revoked-certs", 0, 1914 NULL, &revoked); 1917 ret = hx509_certs_append(context, revoked, lock, argv[i]); 1922 hx509_crl_add_revoked_certs(context, crl, revoked); 1923 hx509_certs_free(&revoked);
|
/freebsd-9.3-release/crypto/openssh/ |
H A D | auth.c | 428 error("WARNING: revoked key for %s attempted authentication", 660 /* Returns 1 if key is revoked by revoked_keys_file, 0 otherwise */ 670 return 0; /* Not revoked */ 674 goto revoked; 680 /* key not revoked */ 688 revoked: 689 /* Key revoked */ 691 error("WARNING: authentication attempt with a revoked "
|
H A D | krl.c | 50 * Trees of revoked serial numbers, key IDs and keys. This allows 82 /* Tracks revoked certs for a single CA */ 433 * current section type, the run length of contiguous revoked serial 434 * numbers and the gaps from the last and to the next revoked serial. 540 /* Store the revoked serials. */ 686 /* Store sections for revoked certificates */ 1056 /* Check that the key(s) used to sign the KRL weren't revoked */ 1067 error("All keys used to sign KRL were revoked"); 1108 /* Checks whether a given key/cert is revoked. Does not check its CA */ 1117 /* Check explicitly revoked hashe 1202 int revoked, fd; local [all...] |
/freebsd-9.3-release/contrib/bind9/lib/dns/ |
H A D | zone.c | 3401 int trusted = 0, revoked = 0, pending = 0; local 3429 /* If the removal timer is nonzero, this key was revoked. */ 3431 revoked++; 3458 "%d key(s) revoked, %d still pending", 3459 revoked, pending); 8129 "Confirm revoked DNSKEY is self-signed: " 8295 * trusted keys then all we can do is look at any revoked keys. 8389 * - Previously-known keys that have been revoked 8401 isc_boolean_t revoked = ISC_FALSE; local 8416 revoked [all...] |