Searched refs:revoked (Results 1 - 18 of 18) sorted by relevance

/freebsd-9.3-release/crypto/openssl/crypto/asn1/
H A Dx_crl.c76 * revoked field.
82 if (!a || !a->revoked)
90 (void)sk_X509_REVOKED_set_cmp_func(a->revoked, X509_REVOKED_cmp);
103 ASN1_SEQUENCE_OF_OPT(X509_CRL_INFO, revoked, X509_REVOKED),
132 if (!inf->revoked)
133 inf->revoked = sk_X509_REVOKED_new(X509_REVOKED_cmp);
134 if (!inf->revoked || !sk_X509_REVOKED_push(inf->revoked, rev)) {
/freebsd-9.3-release/crypto/openssh/regress/
H A Dkrl.sh15 rm -f $OBJ/revoked-* $OBJ/krl-*
18 $SSHKEYGEN -t $ECDSA -f $OBJ/revoked-ca -C "" -N "" > /dev/null ||
24 cat << EOF >> $OBJ/revoked-serials
43 touch $OBJ/revoked-keyid
46 echo "id: revoked $n" >> $OBJ/revoked-keyid
51 f=$OBJ/revoked-`printf "%04d" $N`
61 $SSHKEYGEN -s $OBJ/revoked-ca -z $n -I "revoked $N" $f >/dev/null 2>&1 \
91 $SSHKEYGEN $OPTS -kf $OBJ/krl-ca $OBJ/revoked
[all...]
H A DMakefile89 sshd_proxy.* authorized_keys_${USER}.* modpipe revoked-* krl-* \
/freebsd-9.3-release/crypto/openssl/crypto/x509/
H A Dx509cset.c126 sk_X509_REVOKED_sort(c->crl->revoked);
127 for (i = 0; i < sk_X509_REVOKED_num(c->crl->revoked); i++) {
128 r = sk_X509_REVOKED_value(c->crl->revoked, i);
H A Dx509_vfy.c785 * Sort revoked into serial number order if not already sorted. Do this
788 if (!sk_X509_REVOKED_is_sorted(crl->crl->revoked)) {
790 sk_X509_REVOKED_sort(crl->crl->revoked);
793 idx = sk_X509_REVOKED_find(crl->crl->revoked, &rtmp);
795 * If found assume revoked: want something cleverer than this to handle
H A Dx509.h436 STACK_OF(X509_REVOKED) *revoked; member in struct:X509_crl_info_st
723 # define X509_CRL_get_REVOKED(x) ((x)->crl->revoked)
/freebsd-9.3-release/crypto/openssl/demos/asn1/
H A Docsp.c140 revoked [1] IMPLICIT RevokedInfo,
249 RevokedInfo *revoked; member in union:__anon120::__anon121
336 ASN1_IMP(CertStatus, d.revoked, RevokedInfo, 1),
/freebsd-9.3-release/usr.sbin/pkg/
H A Dpkg.c703 struct fingerprint_list *trusted, *revoked; local
713 trusted = revoked = NULL;
733 snprintf(path, MAXPATHLEN, "%s/revoked", fingerprints);
734 if ((revoked = load_fingerprints(path, &revoked_count)) == NULL) {
735 warnx("Error loading revoked certificates");
750 /* Check if this hash is revoked */
751 if (revoked != NULL) {
752 STAILQ_FOREACH(fingerprint, revoked, next) {
755 "revoked certificate %s\n",
791 if (revoked)
[all...]
/freebsd-9.3-release/crypto/openssl/crypto/ocsp/
H A Docsp_asn.c135 ASN1_IMP(OCSP_CERTSTATUS, value.revoked, OCSP_REVOKEDINFO, 1),
H A Docsp_prn.c119 {V_OCSP_CERTSTATUS_REVOKED, "revoked"},
253 rev = cst->value.revoked;
H A Docsp_srv.c173 if (!(cs->value.revoked = ri = OCSP_REVOKEDINFO_new()))
H A Docsp_cl.c267 * revoked. Returns numerical value of status.
282 OCSP_REVOKEDINFO *rev = cst->value.revoked;
H A Docsp.h222 * revoked [1] IMPLICIT RevokedInfo,
232 OCSP_REVOKEDINFO *revoked; member in union:ocsp_cert_status_st::__anon74
/freebsd-9.3-release/crypto/heimdal/lib/hx509/
H A Drevoke.c741 "Certificate revoked by issuer in OCSP");
832 "Certificate revoked by issuer in CRL");
1128 status = "revoked";
1267 hx509_certs revoked; member in struct:hx509_crl
1293 ret = hx509_certs_init(context, "MEMORY:crl", 0, NULL, &(*crl)->revoked);
1304 * Add revoked certificate to an CRL context.
1307 * @param crl the CRL to add the revoked certificate to.
1320 return hx509_certs_merge(context, crl->revoked, certs);
1357 hx509_certs_free(&(*crl)->revoked);
1482 ret = hx509_certs_iter(context, crl->revoked, add_revoke
[all...]
H A Dhxtool.c1910 hx509_certs revoked = NULL; local
1913 ret = hx509_certs_init(context, "MEMORY:revoked-certs", 0,
1914 NULL, &revoked);
1917 ret = hx509_certs_append(context, revoked, lock, argv[i]);
1922 hx509_crl_add_revoked_certs(context, crl, revoked);
1923 hx509_certs_free(&revoked);
/freebsd-9.3-release/crypto/openssh/
H A Dauth.c428 error("WARNING: revoked key for %s attempted authentication",
660 /* Returns 1 if key is revoked by revoked_keys_file, 0 otherwise */
670 return 0; /* Not revoked */
674 goto revoked;
680 /* key not revoked */
688 revoked:
689 /* Key revoked */
691 error("WARNING: authentication attempt with a revoked "
H A Dkrl.c50 * Trees of revoked serial numbers, key IDs and keys. This allows
82 /* Tracks revoked certs for a single CA */
433 * current section type, the run length of contiguous revoked serial
434 * numbers and the gaps from the last and to the next revoked serial.
540 /* Store the revoked serials. */
686 /* Store sections for revoked certificates */
1056 /* Check that the key(s) used to sign the KRL weren't revoked */
1067 error("All keys used to sign KRL were revoked");
1108 /* Checks whether a given key/cert is revoked. Does not check its CA */
1117 /* Check explicitly revoked hashe
1202 int revoked, fd; local
[all...]
/freebsd-9.3-release/contrib/bind9/lib/dns/
H A Dzone.c3401 int trusted = 0, revoked = 0, pending = 0; local
3429 /* If the removal timer is nonzero, this key was revoked. */
3431 revoked++;
3458 "%d key(s) revoked, %d still pending",
3459 revoked, pending);
8129 "Confirm revoked DNSKEY is self-signed: "
8295 * trusted keys then all we can do is look at any revoked keys.
8389 * - Previously-known keys that have been revoked
8401 isc_boolean_t revoked = ISC_FALSE; local
8416 revoked
[all...]

Completed in 236 milliseconds