HomeSort by relevance Sort by last modified time
    Searched refs:crl (Results 1 - 25 of 143) sorted by null

1 2 3 4 5 6

  /external/chromium_org/third_party/openssl/openssl/crypto/asn1/
x_crl.c 68 static void setup_idp(X509_CRL *crl, ISSUING_DIST_POINT *idp);
76 static int def_crl_verify(X509_CRL *crl, EVP_PKEY *r);
77 static int def_crl_lookup(X509_CRL *crl,
122 /* Set CRL entry issuer according to CRL certificate issuer extension.
123 * Check for unhandled critical CRL entry extensions.
126 static int crl_set_issuers(X509_CRL *crl)
133 revoked = X509_CRL_get_REVOKED(crl);
147 crl->flags |= EXFLAG_INVALID;
154 if (!crl->issuers
    [all...]
asn1_locl.h 128 /* Method to handle CRL access.
129 * In general a CRL could be very large (several Mb) and can consume large
131 * This method allows general CRL operations to be redirected to more
132 * efficient callbacks: for example a CRL entry database.
140 int (*crl_init)(X509_CRL *crl);
141 int (*crl_free)(X509_CRL *crl);
142 int (*crl_lookup)(X509_CRL *crl, X509_REVOKED **ret,
144 int (*crl_verify)(X509_CRL *crl, EVP_PKEY *pk);
x_info.c 82 ret->crl=NULL;
107 if (x->crl != NULL) X509_CRL_free(x->crl);
  /external/openssl/crypto/asn1/
x_crl.c 68 static void setup_idp(X509_CRL *crl, ISSUING_DIST_POINT *idp);
76 static int def_crl_verify(X509_CRL *crl, EVP_PKEY *r);
77 static int def_crl_lookup(X509_CRL *crl,
122 /* Set CRL entry issuer according to CRL certificate issuer extension.
123 * Check for unhandled critical CRL entry extensions.
126 static int crl_set_issuers(X509_CRL *crl)
133 revoked = X509_CRL_get_REVOKED(crl);
147 crl->flags |= EXFLAG_INVALID;
154 if (!crl->issuers
    [all...]
asn1_locl.h 128 /* Method to handle CRL access.
129 * In general a CRL could be very large (several Mb) and can consume large
131 * This method allows general CRL operations to be redirected to more
132 * efficient callbacks: for example a CRL entry database.
140 int (*crl_init)(X509_CRL *crl);
141 int (*crl_free)(X509_CRL *crl);
142 int (*crl_lookup)(X509_CRL *crl, X509_REVOKED **ret,
144 int (*crl_verify)(X509_CRL *crl, EVP_PKEY *pk);
x_info.c 82 ret->crl=NULL;
107 if (x->crl != NULL) X509_CRL_free(x->crl);
  /libcore/luni/src/test/java/tests/security/cert/
CRLTest.java 27 import java.security.cert.CRL;
33 * Tests for <code>java.security.cert.CRL</code> fields and methods
47 * Test for <code>CRL(String type)</code> constructor<br>
51 CRL crl = new MyCRL(validValues[i]); local
52 assertEquals(validValues[i], crl.getType());
56 CRL crl = new MyCRL(invalidValues[i]); local
57 assertEquals(invalidValues[i], crl.getType());
61 CRL crl = new MyCRL(null) local
73 CRL crl = new MyCRL("TEST_TYPE"); local
82 CRL crl = new MyCRL(null); local
96 CRL crl = new MyCRL("TEST_TYPE"); local
104 CRL crl = new MyCRL("TEST_TYPE"); local
    [all...]
X509CRLTest.java 236 assertFalse("The CRL should not be equals to the object which is not "
259 TBTCRL crl = new TBTCRL() { local
265 assertEquals(new X500Principal("CN=Z"), crl.getIssuerX500Principal());
294 TBTCRL crl = new TBTCRL() { local
301 crl.getEncoded();
302 crl.getIssuerDN();
303 crl.getNextUpdate();
304 crl.getRevokedCertificate(BigInteger.ONE);
305 crl.getRevokedCertificates();
306 crl.getSigAlgName()
323 TBTCRL crl = new TBTCRL(); local
    [all...]
X509CRLSelector2Test.java 20 import java.security.cert.CRL;
69 CRL crl1 = new TestCRL(iss1);
70 CRL crl2 = new TestCRL(iss2);
73 assertTrue("The CRL should match the selection criteria.", selector
75 assertFalse("The CRL should not match the selection criteria.",
78 assertTrue("The CRL should match the selection criteria.", selector
100 assertTrue("The CRL should match the selection criteria.", selector
102 assertFalse("The CRL should not match the selection criteria.",
110 assertTrue("The CRL should match the selection criteria.", selector
141 assertTrue("Any CRL issuers should match in the case of null issuers."
245 CRL crl = new TestCRL(minCRL); local
269 TestCRL crl = new TestCRL(maxCRL); local
289 TestCRL crl = new TestCRL(new Date(200), new Date(300)); local
322 TestCRL crl = new TestCRL(); local
481 TestCRL crl = new TestCRL(iss1); local
    [all...]
  /external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/cert/
CRLTest.java 24 import java.security.cert.CRL;
31 * Tests for <code>java.security.cert.CRL</code> fields and methods
50 * Assertion: returns <code>CRL</code> type
53 CRL crl = new MyCRL("TEST_TYPE"); local
54 assertEquals("TEST_TYPE", crl.getType());
59 * Assertion: returns <code>CRL</code> type
62 CRL crl = new MyCRL(null); local
63 assertNull(crl.getType())
76 CRL crl = new MyCRL("TEST_TYPE"); local
84 CRL crl = new MyCRL("TEST_TYPE"); local
    [all...]
CertStoreSpiTest.java 26 import java.security.cert.CRL;
89 public boolean match(CRL crl) {
99 public boolean match(Certificate crl) {
  /libcore/luni/src/main/java/java/security/cert/
CRLSelector.java 21 * The interface specification for determining whether a CRL meets some criteria
22 * to select CRL objects among a set of {@code CRL}s.
25 * criteria for selecting {@code CRL}s from a {@code CertStore}.
28 * @see CRL
41 * CRL.
43 * @param crl
44 * the CRL to be evaluated.
45 * @return {@code true} if the CRL matches the criteria, {@code false}
48 public boolean match(CRL crl)
    [all...]
  /external/chromium_org/third_party/openssl/openssl/crypto/x509/
x509cset.c 69 if (x->crl->version == NULL)
71 if ((x->crl->version=M_ASN1_INTEGER_new()) == NULL)
74 return(ASN1_INTEGER_set(x->crl->version,version));
79 if ((x == NULL) || (x->crl == NULL)) return(0);
80 return(X509_NAME_set(&x->crl->issuer,name));
89 in=x->crl->lastUpdate;
95 M_ASN1_TIME_free(x->crl->lastUpdate);
96 x->crl->lastUpdate=in;
107 in=x->crl->nextUpdate;
113 M_ASN1_TIME_free(x->crl->nextUpdate)
    [all...]
x509_ext.c 71 return(X509v3_get_ext_count(x->crl->extensions));
76 return(X509v3_get_ext_by_NID(x->crl->extensions,nid,lastpos));
81 return(X509v3_get_ext_by_OBJ(x->crl->extensions,obj,lastpos));
86 return(X509v3_get_ext_by_critical(x->crl->extensions,crit,lastpos));
91 return(X509v3_get_ext(x->crl->extensions,loc));
96 return(X509v3_delete_ext(x->crl->extensions,loc));
101 return X509V3_get_d2i(x->crl->extensions, nid, crit, idx);
107 return X509V3_add1_i2d(&x->crl->extensions, nid, value, crit, flags);
112 return(X509v3_add_ext(&(x->crl->extensions),ex,loc) != NULL);
x509_vfy.c 73 /* CRL score values */
79 /* certificate is within CRL scope */
83 /* CRL times valid */
91 /* If this score or above CRL is probably valid */
95 /* CRL issuer is certificate issuer */
99 /* CRL issuer is on certificate path */
103 /* CRL issuer matches CRL AKID */
107 /* Have a delta CRL with valid times */
123 X509_CRL *crl, X509 *x)
694 X509_CRL *crl = NULL, *dcrl = NULL; local
826 X509_CRL *crl, *best_crl = NULL; local
1299 X509_CRL *crl = NULL, *dcrl = NULL; local
    [all...]
  /external/openssl/crypto/x509/
x509cset.c 69 if (x->crl->version == NULL)
71 if ((x->crl->version=M_ASN1_INTEGER_new()) == NULL)
74 return(ASN1_INTEGER_set(x->crl->version,version));
79 if ((x == NULL) || (x->crl == NULL)) return(0);
80 return(X509_NAME_set(&x->crl->issuer,name));
89 in=x->crl->lastUpdate;
95 M_ASN1_TIME_free(x->crl->lastUpdate);
96 x->crl->lastUpdate=in;
107 in=x->crl->nextUpdate;
113 M_ASN1_TIME_free(x->crl->nextUpdate)
    [all...]
x509_ext.c 71 return(X509v3_get_ext_count(x->crl->extensions));
76 return(X509v3_get_ext_by_NID(x->crl->extensions,nid,lastpos));
81 return(X509v3_get_ext_by_OBJ(x->crl->extensions,obj,lastpos));
86 return(X509v3_get_ext_by_critical(x->crl->extensions,crit,lastpos));
91 return(X509v3_get_ext(x->crl->extensions,loc));
96 return(X509v3_delete_ext(x->crl->extensions,loc));
101 return X509V3_get_d2i(x->crl->extensions, nid, crit, idx);
107 return X509V3_add1_i2d(&x->crl->extensions, nid, value, crit, flags);
112 return(X509v3_add_ext(&(x->crl->extensions),ex,loc) != NULL);
x509_vfy.c 73 /* CRL score values */
79 /* certificate is within CRL scope */
83 /* CRL times valid */
91 /* If this score or above CRL is probably valid */
95 /* CRL issuer is certificate issuer */
99 /* CRL issuer is on certificate path */
103 /* CRL issuer matches CRL AKID */
107 /* Have a delta CRL with valid times */
123 X509_CRL *crl, X509 *x)
694 X509_CRL *crl = NULL, *dcrl = NULL; local
837 X509_CRL *crl, *best_crl = NULL; local
1310 X509_CRL *crl = NULL, *dcrl = NULL; local
    [all...]
  /libcore/support/src/test/java/tests/resources/x509/
create.sh 82 # Create temporary CA for CRL generation
92 openssl x509 -in /tmp/cacert.pem -outform d > ${DIR}/cert-crl-ca.der
94 openssl ca -gencrl -crlhours 70 -keyfile /tmp/cakey.pem -cert /tmp/cacert.pem -out /tmp/crl-empty.pem -config ${DIR}/default.cnf
95 openssl crl -in /tmp/crl-empty.pem -outform d -out ${DIR}/crl-empty.der
99 openssl ca -gencrl -crlhours 70 -keyfile /tmp/cakey.pem -cert /tmp/cacert.pem -out /tmp/crl-rsa.pem -config ${DIR}/default.cnf
100 openssl crl -in /tmp/crl-rsa.pem -outform d -out ${DIR}/crl-rsa.de
    [all...]
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/provider/
PKIXCRLUtil.java 29 // get complete CRL(s)
52 X509CRL crl = (X509CRL)it.next(); local
54 if (crl.getNextUpdate().after(validityDate))
60 if (crl.getThisUpdate().before(cert.getNotAfter()))
62 finalSet.add(crl);
67 finalSet.add(crl);
80 // get complete CRL(s)
132 // "Exception searching in X.509 CRL store.", e);
148 "Exception searching in X.509 CRL store.", e);
  /external/apache-harmony/security/src/test/impl/java.injected/java/security/cert/
X509CRLSelectorTest.java 193 assertTrue("Any CRL issuers should match in the case of null issuers.",
200 assertTrue("The CRL should match the selection criteria.",
202 assertFalse("The CRL should not match the selection criteria.",
234 assertTrue("Any CRL issuers should match in the case of null issuers.",
246 assertTrue("The CRL should match the selection criteria.",
248 assertFalse("The CRL should not match the selection criteria.",
268 assertTrue("The CRL should match the selection criteria.",
270 assertFalse("The CRL should not match the selection criteria.",
273 assertTrue("The CRL should match the selection criteria.",
295 assertTrue("The CRL should match the selection criteria."
356 TestCRL crl = new TestCRL(minCRL); local
378 TestCRL crl = new TestCRL(maxCRL); local
399 TestCRL crl = new TestCRL(new Date(200), new Date(300)); local
569 TestCRL crl = new TestCRL(iss1); local
    [all...]
  /external/chromium_org/third_party/openssl/openssl/apps/
crl2p7.c 94 X509_CRL *crl=NULL; local
167 BIO_printf(bio_err," -nocrl no crl to load, just certs from '-certfile'\n");
196 crl=d2i_X509_CRL_bio(in,NULL);
198 crl=PEM_read_bio_X509_CRL(in,NULL,NULL,NULL);
200 BIO_printf(bio_err,"bad input format specified for input crl\n");
203 if (crl == NULL)
205 BIO_printf(bio_err,"unable to load CRL\n");
219 p7s->crl=crl_stack;
220 if (crl != NULL)
222 sk_X509_CRL_push(crl_stack,crl);
    [all...]
  /external/openssl/apps/
crl2p7.c 94 X509_CRL *crl=NULL; local
167 BIO_printf(bio_err," -nocrl no crl to load, just certs from '-certfile'\n");
196 crl=d2i_X509_CRL_bio(in,NULL);
198 crl=PEM_read_bio_X509_CRL(in,NULL,NULL,NULL);
200 BIO_printf(bio_err,"bad input format specified for input crl\n");
203 if (crl == NULL)
205 BIO_printf(bio_err,"unable to load CRL\n");
219 p7s->crl=crl_stack;
220 if (crl != NULL)
222 sk_X509_CRL_push(crl_stack,crl);
    [all...]
  /external/chromium_org/third_party/openssl/openssl/android.testssl/
CAss.cnf 36 crl_dir = $dir/crl # Where the issued crl are kept
44 crl = $dir/crl.pem # The current CRL
54 default_crl_days= 30 # how long before next CRL
  /external/openssl/android.testssl/
CAss.cnf 36 crl_dir = $dir/crl # Where the issued crl are kept
44 crl = $dir/crl.pem # The current CRL
54 default_crl_days= 30 # how long before next CRL

Completed in 429 milliseconds

1 2 3 4 5 6