/freebsd/crypto/openssl/crypto/x509/ |
H A D | x509cset.c | 48 return ossl_x509_set1_time(&x->crl.nextUpdate, tm); in X509_CRL_set1_nextUpdate() 91 return crl->crl.nextUpdate; in X509_CRL_get0_nextUpdate() 102 return crl->crl.nextUpdate; in X509_CRL_get_nextUpdate()
|
H A D | x_crl.c | 72 ASN1_OPT(X509_CRL_INFO, nextUpdate, ASN1_TIME),
|
/freebsd/crypto/heimdal/lib/hx509/ |
H A D | revoke.c | 474 if (crl->tbsCertList.nextUpdate == NULL) { in verify_crl() 480 t = _hx509_Time2time_t(crl->tbsCertList.nextUpdate); in verify_crl() 760 if (ocsp->ocsp.tbsResponseData.responses.val[j].nextUpdate) { in hx509_revoke_verify() 761 if (*ocsp->ocsp.tbsResponseData.responses.val[j].nextUpdate < now) in hx509_revoke_verify() 1153 if (ocsp.ocsp.tbsResponseData.responses.val[i].nextUpdate) in hx509_revoke_ocsp_print() 1241 if (basic.tbsResponseData.responses.val[i].nextUpdate) { in hx509_ocsp_verify() 1242 if (*basic.tbsResponseData.responses.val[i].nextUpdate < now) in hx509_ocsp_verify() 1244 *expiration = *basic.tbsResponseData.responses.val[i].nextUpdate; in hx509_ocsp_verify() 1470 c.tbsCertList.nextUpdate = malloc(sizeof(*c.tbsCertList.nextUpdate)); in hx509_crl_sign() 1471 if (c.tbsCertList.nextUpdate == NULL) { in hx509_crl_sign() [all …]
|
H A D | ocsp.asn1 | 32 nextUpdate [0] EXPLICIT GeneralizedTime OPTIONAL,
|
/freebsd/crypto/openssl/doc/man3/ |
H A D | X509_get0_notBefore.pod | 47 B<lastUpdate> and B<nextUpdate> fields of B<crl>. The value 49 the call. If the B<nextUpdate> field is absent from B<crl> then 53 and B<nextUpdate> fields of B<crl> to B<tm>. Ownership of the passed parameter
|
H A D | OCSP_resp_find_status.pod | 188 An OCSP response for a certificate contains B<thisUpdate> and B<nextUpdate> 191 OCSP_check_validity(). Some responders do not set the B<nextUpdate> field, this
|
H A D | X509_STORE_CTX_get_error.pod | 183 format error in CRL's nextUpdate field> 185 The CRL C<nextUpdate> field contains an invalid time.
|
/freebsd/contrib/wpa/src/crypto/ |
H A D | tls_openssl_ocsp.c | 135 ASN1_GENERALIZEDTIME *nextUpdate; member 196 ASN1_EXP_OPT(SingleResponse, nextUpdate, ASN1_GENERALIZEDTIME, 0), 755 if (sresp->nextUpdate) { in check_ocsp_resp() 756 txt = generalizedtime_str(sresp->nextUpdate); in check_ocsp_resp() 809 matching_resp->nextUpdate)) { in check_ocsp_resp()
|
/freebsd/crypto/openssl/crypto/ocsp/ |
H A D | ocsp_prn.c | 216 if (single->nextUpdate) { in OCSP_RESPONSE_print() 219 if (!ASN1_GENERALIZEDTIME_print(bp, single->nextUpdate)) in OCSP_RESPONSE_print()
|
H A D | ocsp_local.h | 146 ASN1_GENERALIZEDTIME *nextUpdate; member
|
H A D | ocsp_asn.c | 97 ASN1_EXP_OPT(OCSP_SINGLERESP, nextUpdate, ASN1_GENERALIZEDTIME, 0),
|
H A D | ocsp_cl.c | 275 *nextupd = single->nextUpdate; in OCSP_single_get0_status()
|
H A D | ocsp_srv.c | 107 !ASN1_TIME_to_generalizedtime(nextupd, &single->nextUpdate)) in OCSP_basic_add1_status()
|
/freebsd/crypto/openssl/doc/man1/ |
H A D | openssl-crl.pod.in | 133 Output the nextUpdate field.
|
H A D | openssl-ocsp.pod.in | 408 used in the B<nextUpdate> field. If neither option is present then the 409 B<nextUpdate> field is omitted meaning fresh revocation information is
|
H A D | openssl-ca.pod.in | 359 Allows the value of the CRL's nextUpdate field to be explicitly set; if 367 now to place in the CRL nextUpdate field.
|
/freebsd/crypto/openssl/include/crypto/ |
H A D | x509.h | 94 ASN1_TIME *nextUpdate; /* nextUpdate field: optional */ member
|
/freebsd/crypto/heimdal/lib/asn1/ |
H A D | rfc2459.asn1 | 459 nextUpdate Time OPTIONAL,
|
/freebsd/sys/contrib/zstd/lib/legacy/ |
H A D | zstd_v01.c | 1431 U32 nextUpdate; member
|
/freebsd/crypto/openssl/ |
H A D | CHANGES.md | 2403 allowing the `lastUpdate` and `nextUpdate` fields in the generated CRL to 9133 * Fix bug where CRLs with nextUpdate in the past are sometimes accepted 13886 between thisUpdate and nextUpdate max reject otherwise valid responses 13888 we allow thisUpdate and nextUpdate to fall within a certain period of
|