/freebsd/crypto/openssh/regress/ |
H A D | krl.sh | 23 rm -f $OBJ/revoked-* $OBJ/krl-* 26 $SSHKEYGEN -t $ktype1 -f $OBJ/revoked-ca -C "" -N "" > /dev/null || 28 $SSHKEYGEN -t $ktype2 -f $OBJ/revoked-ca2 -C "" -N "" > /dev/null || 34 cat << EOF >> $OBJ/revoked-serials 57 touch $OBJ/revoked-keyid 61 echo "id: revoked $n" >> $OBJ/revoked-keyid 66 f=$OBJ/revoked-`printf "%04d" $N` 80 $SSHKEYGEN -s $OBJ/revoked-ca -z $n -I "revoked $N" $f >/dev/null 2>&1 \ 102 touch $OBJ/revoked-sha1 $OBJ/revoked-sha256 $OBJ/revoked-hash 104 (printf "sha1: "; cat $rkey) >> $OBJ/revoked-sha1 [all …]
|
/freebsd/crypto/openssl/crypto/x509/ |
H A D | x_crl.c | 52 if (!a || !a->revoked) in crl_inf_cb() 60 (void)sk_X509_REVOKED_set_cmp_func(a->revoked, X509_REVOKED_cmp); in crl_inf_cb() 73 ASN1_SEQUENCE_OF_OPT(X509_CRL_INFO, revoked, X509_REVOKED), 87 STACK_OF(X509_REVOKED) *revoked; 89 revoked = X509_CRL_get_REVOKED(crl); 92 for (i = 0; i < sk_X509_REVOKED_num(revoked); i++) { 93 X509_REVOKED *rev = sk_X509_REVOKED_value(revoked, i); 364 if (inf->revoked == NULL) in X509_CRL_add0_revoked() 365 inf->revoked = sk_X509_REVOKED_new(X509_REVOKED_cmp); in X509_CRL_add0_revoked() 366 if (inf->revoked == NULL || !sk_X509_REVOKED_push(inf->revoked, rev)) { in X509_CRL_add0_revoked() [all …]
|
H A D | x509cset.c | 58 sk_X509_REVOKED_sort(c->crl.revoked); in X509_CRL_sort() 59 for (i = 0; i < sk_X509_REVOKED_num(c->crl.revoked); i++) { in X509_CRL_sort() 60 r = sk_X509_REVOKED_value(c->crl.revoked, i); in X509_CRL_sort() 118 return crl->crl.revoked; in STACK_OF()
|
/freebsd/crypto/openssl/doc/man3/ |
H A D | X509_CRL_get0_by_serial.pod | 8 X509_CRL_add0_revoked, X509_CRL_sort - CRL revoked entry utility 33 X509_CRL_get0_by_serial() attempts to find a revoked entry in I<crl> for 39 looks for a revoked entry using the serial number of certificate I<x>. 42 revoked entries for I<crl>. 58 X509_CRL_add0_revoked() appends revoked entry I<rev> to CRL I<crl>. The 62 X509_CRL_sort() sorts the revoked entries of I<crl> into ascending serial 67 Applications can determine the number of revoked entries returned by 74 1 on success except if the revoked entry has the reason C<removeFromCRL> (8), 77 X509_CRL_get_REVOKED() returns a STACK of revoked entries.
|
H A D | SSL_alert_type_string.pod | 113 =item "CR"/"certificate revoked" 115 A certificate was revoked by its signer.
|
/freebsd/contrib/unbound/validator/ |
H A D | autotrust.h | 83 uint8_t revoked; member 121 uint8_t revoked; member
|
H A D | autotrust.c | 1125 if(tp->autr->revoked) { in autr_write_contents() 1335 seen_revoked_trustanchor(struct autr_ta* ta, uint8_t revoked) in seen_revoked_trustanchor() argument 1337 ta->revoked = revoked; in seen_revoked_trustanchor() 1571 if(!ta->revoked) in check_contains_revoked() 1827 if (anchor->revoked) in anchor_state_update() 1840 if (anchor->revoked) in anchor_state_update() 2112 tp->autr->revoked = 1; in autr_tp_remove() 2165 if(tp->autr->revoked) { in autr_process_prime() 2282 ta->fetched?" fetched":"", ta->revoked?" revoked":"", buf); in autr_debug_print_ta()
|
/freebsd/usr.sbin/pkg/ |
H A D | pkg.c | 725 struct fingerprint_list *trusted, *revoked; in verify_signature() local 738 trusted = revoked = NULL; in verify_signature() 766 snprintf(path, MAXPATHLEN, "%s/revoked", fingerprints); in verify_signature() 767 if ((revoked = load_fingerprints(path, &revoked_count)) == NULL) { in verify_signature() 768 warnx("Error loading revoked certificates"); in verify_signature() 783 /* Check if this hash is revoked */ in verify_signature() 784 if (revoked != NULL) { in verify_signature() 785 STAILQ_FOREACH(fingerprint, revoked, next) { in verify_signature() 788 "revoked certificate %s\n", in verify_signature() 828 if (revoked) in verify_signature() [all...] |
/freebsd/usr.sbin/rpc.tlsservd/ |
H A D | rpc.tlscommon.c | 168 X509_REVOKED *revoked; in rpctls_checkcrl() local 193 ret = X509_CRL_get0_by_cert(crl, &revoked, in rpctls_checkcrl()
|
/freebsd/crypto/heimdal/lib/krb5/ |
H A D | krb5_err.et | 29 error_code CLIENT_REVOKED, "Clients credentials have been revoked" 30 error_code SERVICE_REVOKED, "Credentials for server have been revoked" 31 error_code TGT_REVOKED, "TGT has been revoked" 93 error_code REVOKED_CERTIFICATE, "Certificate revoked"
|
/freebsd/crypto/openssl/demos/certs/ |
H A D | README.txt | 11 certificates and generates a CRL. Then one certificate is revoked and a
|
/freebsd/crypto/heimdal/lib/hx509/ |
H A D | revoke.c | 1280 hx509_certs revoked; member 1306 ret = hx509_certs_init(context, "MEMORY:crl", 0, NULL, &(*crl)->revoked); in hx509_crl_alloc() 1333 return hx509_certs_merge(context, crl->revoked, certs); in hx509_crl_add_revoked_certs() 1370 hx509_certs_free(&(*crl)->revoked); in hx509_crl_free() 1495 ret = hx509_certs_iter_f(context, crl->revoked, add_revoked, &c.tbsCertList); in hx509_crl_sign()
|
H A D | ocsp.asn1 | 16 revoked [1] IMPLICIT -- OCSPRevokedInfo -- SEQUENCE {
|
H A D | hxtool.c | 2163 hx509_certs revoked = NULL; in crl_sign() local 2167 NULL, &revoked); in crl_sign() 2173 ret = hx509_certs_append(context, revoked, lock, argv[i]); in crl_sign() 2178 hx509_crl_add_revoked_certs(context, crl, revoked); in crl_sign() 2179 hx509_certs_free(&revoked); in crl_sign()
|
/freebsd/crypto/openssl/crypto/ocsp/ |
H A D | ocsp_local.h | 130 OCSP_REVOKEDINFO *revoked; member
|
H A D | ocsp_asn.c | 87 ASN1_IMP(OCSP_CERTSTATUS, value.revoked, OCSP_REVOKEDINFO, 1),
|
H A D | ocsp_prn.c | 199 rev = cst->value.revoked; in OCSP_RESPONSE_print()
|
H A D | ocsp_cl.c | 261 OCSP_REVOKEDINFO *rev = cst->value.revoked; in OCSP_single_get0_status()
|
H A D | ocsp_srv.c | 122 if ((cs->value.revoked = ri = OCSP_REVOKEDINFO_new()) == NULL) in OCSP_basic_add1_status()
|
/freebsd/share/snmp/mibs/ |
H A D | FREEBSD-MIB.txt | 67 These assignments are not revoked when committers leave
|
/freebsd/crypto/openssh/ |
H A D | PROTOCOL.krl | 46 certificates to be revoked and a reserved field whose contents is currently 90 revoked.
|
/freebsd/contrib/wpa/src/crypto/ |
H A D | tls_openssl_ocsp.c | 118 RevokedInfo *revoked; member 188 ASN1_IMP(CertStatus, value.revoked, RevokedInfo, 1),
|
/freebsd/crypto/heimdal/doc/ |
H A D | hx509.texi | 474 Certificates that a CA issues may need to be revoked at some stage. As 502 or an OCSP service to ensure revoked certificates belonging to former 510 Create an empty CRL with no certificates revoked. Default expiration 520 @file{/path/to/revoked/dir} included in the CRL as revoked. Also make 528 DIR:/path/to/revoked/dir
|
/freebsd/crypto/openssh/regress/unittests/hostkeys/testdata/ |
H A D | known_hosts | 40 @revoked sisyphus.example.com ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIDFP8L9REfN/iYy1KIRtFqSCn3V2+vOCp…
|
/freebsd/contrib/wpa/src/tls/ |
H A D | tlsv1_client_read.c | 902 int good = 0, revoked = 0; in tls_process_certificate_status() local 946 revoked++; in tls_process_certificate_status() 952 if (revoked) in tls_process_certificate_status()
|