/external/chromium_org/third_party/openssl/openssl/crypto/asn1/ |
x_crl.c | 68 static void setup_idp(X509_CRL *crl, ISSUING_DIST_POINT *idp); 76 static int def_crl_verify(X509_CRL *crl, EVP_PKEY *r); 77 static int def_crl_lookup(X509_CRL *crl, 122 /* Set CRL entry issuer according to CRL certificate issuer extension. 123 * Check for unhandled critical CRL entry extensions. 126 static int crl_set_issuers(X509_CRL *crl) 133 revoked = X509_CRL_get_REVOKED(crl); 147 crl->flags |= EXFLAG_INVALID; 154 if (!crl->issuers [all...] |
asn1_locl.h | 128 /* Method to handle CRL access. 129 * In general a CRL could be very large (several Mb) and can consume large 131 * This method allows general CRL operations to be redirected to more 132 * efficient callbacks: for example a CRL entry database. 140 int (*crl_init)(X509_CRL *crl); 141 int (*crl_free)(X509_CRL *crl); 142 int (*crl_lookup)(X509_CRL *crl, X509_REVOKED **ret, 144 int (*crl_verify)(X509_CRL *crl, EVP_PKEY *pk);
|
x_info.c | 82 ret->crl=NULL; 107 if (x->crl != NULL) X509_CRL_free(x->crl);
|
/external/openssl/crypto/asn1/ |
x_crl.c | 68 static void setup_idp(X509_CRL *crl, ISSUING_DIST_POINT *idp); 76 static int def_crl_verify(X509_CRL *crl, EVP_PKEY *r); 77 static int def_crl_lookup(X509_CRL *crl, 122 /* Set CRL entry issuer according to CRL certificate issuer extension. 123 * Check for unhandled critical CRL entry extensions. 126 static int crl_set_issuers(X509_CRL *crl) 133 revoked = X509_CRL_get_REVOKED(crl); 147 crl->flags |= EXFLAG_INVALID; 154 if (!crl->issuers [all...] |
asn1_locl.h | 128 /* Method to handle CRL access. 129 * In general a CRL could be very large (several Mb) and can consume large 131 * This method allows general CRL operations to be redirected to more 132 * efficient callbacks: for example a CRL entry database. 140 int (*crl_init)(X509_CRL *crl); 141 int (*crl_free)(X509_CRL *crl); 142 int (*crl_lookup)(X509_CRL *crl, X509_REVOKED **ret, 144 int (*crl_verify)(X509_CRL *crl, EVP_PKEY *pk);
|
x_info.c | 82 ret->crl=NULL; 107 if (x->crl != NULL) X509_CRL_free(x->crl);
|
/libcore/luni/src/test/java/tests/security/cert/ |
CRLTest.java | 27 import java.security.cert.CRL; 33 * Tests for <code>java.security.cert.CRL</code> fields and methods 47 * Test for <code>CRL(String type)</code> constructor<br> 51 CRL crl = new MyCRL(validValues[i]); local 52 assertEquals(validValues[i], crl.getType()); 56 CRL crl = new MyCRL(invalidValues[i]); local 57 assertEquals(invalidValues[i], crl.getType()); 61 CRL crl = new MyCRL(null) local 73 CRL crl = new MyCRL("TEST_TYPE"); local 82 CRL crl = new MyCRL(null); local 96 CRL crl = new MyCRL("TEST_TYPE"); local 104 CRL crl = new MyCRL("TEST_TYPE"); local [all...] |
X509CRLTest.java | 236 assertFalse("The CRL should not be equals to the object which is not " 259 TBTCRL crl = new TBTCRL() { local 265 assertEquals(new X500Principal("CN=Z"), crl.getIssuerX500Principal()); 294 TBTCRL crl = new TBTCRL() { local 301 crl.getEncoded(); 302 crl.getIssuerDN(); 303 crl.getNextUpdate(); 304 crl.getRevokedCertificate(BigInteger.ONE); 305 crl.getRevokedCertificates(); 306 crl.getSigAlgName() 323 TBTCRL crl = new TBTCRL(); local [all...] |
X509CRLSelector2Test.java | 20 import java.security.cert.CRL; 69 CRL crl1 = new TestCRL(iss1); 70 CRL crl2 = new TestCRL(iss2); 73 assertTrue("The CRL should match the selection criteria.", selector 75 assertFalse("The CRL should not match the selection criteria.", 78 assertTrue("The CRL should match the selection criteria.", selector 100 assertTrue("The CRL should match the selection criteria.", selector 102 assertFalse("The CRL should not match the selection criteria.", 110 assertTrue("The CRL should match the selection criteria.", selector 141 assertTrue("Any CRL issuers should match in the case of null issuers." 245 CRL crl = new TestCRL(minCRL); local 269 TestCRL crl = new TestCRL(maxCRL); local 289 TestCRL crl = new TestCRL(new Date(200), new Date(300)); local 322 TestCRL crl = new TestCRL(); local 481 TestCRL crl = new TestCRL(iss1); local [all...] |
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/cert/ |
CRLTest.java | 24 import java.security.cert.CRL; 31 * Tests for <code>java.security.cert.CRL</code> fields and methods 50 * Assertion: returns <code>CRL</code> type 53 CRL crl = new MyCRL("TEST_TYPE"); local 54 assertEquals("TEST_TYPE", crl.getType()); 59 * Assertion: returns <code>CRL</code> type 62 CRL crl = new MyCRL(null); local 63 assertNull(crl.getType()) 76 CRL crl = new MyCRL("TEST_TYPE"); local 84 CRL crl = new MyCRL("TEST_TYPE"); local [all...] |
CertStoreSpiTest.java | 26 import java.security.cert.CRL; 89 public boolean match(CRL crl) { 99 public boolean match(Certificate crl) {
|
/libcore/luni/src/main/java/java/security/cert/ |
CRLSelector.java | 21 * The interface specification for determining whether a CRL meets some criteria 22 * to select CRL objects among a set of {@code CRL}s. 25 * criteria for selecting {@code CRL}s from a {@code CertStore}. 28 * @see CRL 41 * CRL. 43 * @param crl 44 * the CRL to be evaluated. 45 * @return {@code true} if the CRL matches the criteria, {@code false} 48 public boolean match(CRL crl) [all...] |
/external/chromium_org/third_party/openssl/openssl/crypto/x509/ |
x509cset.c | 69 if (x->crl->version == NULL) 71 if ((x->crl->version=M_ASN1_INTEGER_new()) == NULL) 74 return(ASN1_INTEGER_set(x->crl->version,version)); 79 if ((x == NULL) || (x->crl == NULL)) return(0); 80 return(X509_NAME_set(&x->crl->issuer,name)); 89 in=x->crl->lastUpdate; 95 M_ASN1_TIME_free(x->crl->lastUpdate); 96 x->crl->lastUpdate=in; 107 in=x->crl->nextUpdate; 113 M_ASN1_TIME_free(x->crl->nextUpdate) [all...] |
x509_ext.c | 71 return(X509v3_get_ext_count(x->crl->extensions)); 76 return(X509v3_get_ext_by_NID(x->crl->extensions,nid,lastpos)); 81 return(X509v3_get_ext_by_OBJ(x->crl->extensions,obj,lastpos)); 86 return(X509v3_get_ext_by_critical(x->crl->extensions,crit,lastpos)); 91 return(X509v3_get_ext(x->crl->extensions,loc)); 96 return(X509v3_delete_ext(x->crl->extensions,loc)); 101 return X509V3_get_d2i(x->crl->extensions, nid, crit, idx); 107 return X509V3_add1_i2d(&x->crl->extensions, nid, value, crit, flags); 112 return(X509v3_add_ext(&(x->crl->extensions),ex,loc) != NULL);
|
x509_vfy.c | 73 /* CRL score values */ 79 /* certificate is within CRL scope */ 83 /* CRL times valid */ 91 /* If this score or above CRL is probably valid */ 95 /* CRL issuer is certificate issuer */ 99 /* CRL issuer is on certificate path */ 103 /* CRL issuer matches CRL AKID */ 107 /* Have a delta CRL with valid times */ 123 X509_CRL *crl, X509 *x) 694 X509_CRL *crl = NULL, *dcrl = NULL; local 826 X509_CRL *crl, *best_crl = NULL; local 1299 X509_CRL *crl = NULL, *dcrl = NULL; local [all...] |
/external/openssl/crypto/x509/ |
x509cset.c | 69 if (x->crl->version == NULL) 71 if ((x->crl->version=M_ASN1_INTEGER_new()) == NULL) 74 return(ASN1_INTEGER_set(x->crl->version,version)); 79 if ((x == NULL) || (x->crl == NULL)) return(0); 80 return(X509_NAME_set(&x->crl->issuer,name)); 89 in=x->crl->lastUpdate; 95 M_ASN1_TIME_free(x->crl->lastUpdate); 96 x->crl->lastUpdate=in; 107 in=x->crl->nextUpdate; 113 M_ASN1_TIME_free(x->crl->nextUpdate) [all...] |
x509_ext.c | 71 return(X509v3_get_ext_count(x->crl->extensions)); 76 return(X509v3_get_ext_by_NID(x->crl->extensions,nid,lastpos)); 81 return(X509v3_get_ext_by_OBJ(x->crl->extensions,obj,lastpos)); 86 return(X509v3_get_ext_by_critical(x->crl->extensions,crit,lastpos)); 91 return(X509v3_get_ext(x->crl->extensions,loc)); 96 return(X509v3_delete_ext(x->crl->extensions,loc)); 101 return X509V3_get_d2i(x->crl->extensions, nid, crit, idx); 107 return X509V3_add1_i2d(&x->crl->extensions, nid, value, crit, flags); 112 return(X509v3_add_ext(&(x->crl->extensions),ex,loc) != NULL);
|
x509_vfy.c | 73 /* CRL score values */ 79 /* certificate is within CRL scope */ 83 /* CRL times valid */ 91 /* If this score or above CRL is probably valid */ 95 /* CRL issuer is certificate issuer */ 99 /* CRL issuer is on certificate path */ 103 /* CRL issuer matches CRL AKID */ 107 /* Have a delta CRL with valid times */ 123 X509_CRL *crl, X509 *x) 694 X509_CRL *crl = NULL, *dcrl = NULL; local 837 X509_CRL *crl, *best_crl = NULL; local 1310 X509_CRL *crl = NULL, *dcrl = NULL; local [all...] |
/libcore/support/src/test/java/tests/resources/x509/ |
create.sh | 82 # Create temporary CA for CRL generation 92 openssl x509 -in /tmp/cacert.pem -outform d > ${DIR}/cert-crl-ca.der 94 openssl ca -gencrl -crlhours 70 -keyfile /tmp/cakey.pem -cert /tmp/cacert.pem -out /tmp/crl-empty.pem -config ${DIR}/default.cnf 95 openssl crl -in /tmp/crl-empty.pem -outform d -out ${DIR}/crl-empty.der 99 openssl ca -gencrl -crlhours 70 -keyfile /tmp/cakey.pem -cert /tmp/cacert.pem -out /tmp/crl-rsa.pem -config ${DIR}/default.cnf 100 openssl crl -in /tmp/crl-rsa.pem -outform d -out ${DIR}/crl-rsa.de [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/provider/ |
PKIXCRLUtil.java | 29 // get complete CRL(s) 52 X509CRL crl = (X509CRL)it.next(); local 54 if (crl.getNextUpdate().after(validityDate)) 60 if (crl.getThisUpdate().before(cert.getNotAfter())) 62 finalSet.add(crl); 67 finalSet.add(crl); 80 // get complete CRL(s) 132 // "Exception searching in X.509 CRL store.", e); 148 "Exception searching in X.509 CRL store.", e);
|
/external/apache-harmony/security/src/test/impl/java.injected/java/security/cert/ |
X509CRLSelectorTest.java | 193 assertTrue("Any CRL issuers should match in the case of null issuers.", 200 assertTrue("The CRL should match the selection criteria.", 202 assertFalse("The CRL should not match the selection criteria.", 234 assertTrue("Any CRL issuers should match in the case of null issuers.", 246 assertTrue("The CRL should match the selection criteria.", 248 assertFalse("The CRL should not match the selection criteria.", 268 assertTrue("The CRL should match the selection criteria.", 270 assertFalse("The CRL should not match the selection criteria.", 273 assertTrue("The CRL should match the selection criteria.", 295 assertTrue("The CRL should match the selection criteria." 356 TestCRL crl = new TestCRL(minCRL); local 378 TestCRL crl = new TestCRL(maxCRL); local 399 TestCRL crl = new TestCRL(new Date(200), new Date(300)); local 569 TestCRL crl = new TestCRL(iss1); local [all...] |
/external/chromium_org/third_party/openssl/openssl/apps/ |
crl2p7.c | 94 X509_CRL *crl=NULL; local 167 BIO_printf(bio_err," -nocrl no crl to load, just certs from '-certfile'\n"); 196 crl=d2i_X509_CRL_bio(in,NULL); 198 crl=PEM_read_bio_X509_CRL(in,NULL,NULL,NULL); 200 BIO_printf(bio_err,"bad input format specified for input crl\n"); 203 if (crl == NULL) 205 BIO_printf(bio_err,"unable to load CRL\n"); 219 p7s->crl=crl_stack; 220 if (crl != NULL) 222 sk_X509_CRL_push(crl_stack,crl); [all...] |
/external/openssl/apps/ |
crl2p7.c | 94 X509_CRL *crl=NULL; local 167 BIO_printf(bio_err," -nocrl no crl to load, just certs from '-certfile'\n"); 196 crl=d2i_X509_CRL_bio(in,NULL); 198 crl=PEM_read_bio_X509_CRL(in,NULL,NULL,NULL); 200 BIO_printf(bio_err,"bad input format specified for input crl\n"); 203 if (crl == NULL) 205 BIO_printf(bio_err,"unable to load CRL\n"); 219 p7s->crl=crl_stack; 220 if (crl != NULL) 222 sk_X509_CRL_push(crl_stack,crl); [all...] |
/external/chromium_org/third_party/openssl/openssl/android.testssl/ |
CAss.cnf | 36 crl_dir = $dir/crl # Where the issued crl are kept 44 crl = $dir/crl.pem # The current CRL 54 default_crl_days= 30 # how long before next CRL
|
/external/openssl/android.testssl/ |
CAss.cnf | 36 crl_dir = $dir/crl # Where the issued crl are kept 44 crl = $dir/crl.pem # The current CRL 54 default_crl_days= 30 # how long before next CRL
|