/external/openssh/regress/ |
D | krl.sh | 15 rm -f $OBJ/revoked-* $OBJ/krl-* 18 $SSHKEYGEN -t $ECDSA -f $OBJ/revoked-ca -C "" -N "" > /dev/null || 20 $SSHKEYGEN -t ed25519 -f $OBJ/revoked-ca2 -C "" -N "" > /dev/null || 26 cat << EOF >> $OBJ/revoked-serials 48 touch $OBJ/revoked-keyid 52 echo "id: revoked $n" >> $OBJ/revoked-keyid 57 f=$OBJ/revoked-`printf "%04d" $N` 67 $SSHKEYGEN -s $OBJ/revoked-ca -z $n -I "revoked $N" $f >/dev/null 2>&1 \ 98 $SSHKEYGEN $OPTS -kf $OBJ/krl-ca $OBJ/revoked-ca.pub \ 101 $SSHKEYGEN $OPTS -kf $OBJ/krl-serial $OBJ/revoked-serials \ [all …]
|
/external/boringssl/src/crypto/x509/ |
D | x_crl.c | 121 if (!a || !a->revoked) in crl_inf_cb() 129 (void)sk_X509_REVOKED_set_cmp_func(a->revoked, X509_REVOKED_cmp); in crl_inf_cb() 142 ASN1_SEQUENCE_OF_OPT(X509_CRL_INFO, revoked, X509_REVOKED), 157 STACK_OF(X509_REVOKED) *revoked; 159 revoked = X509_CRL_get_REVOKED(crl); 162 for (i = 0; i < sk_X509_REVOKED_num(revoked); i++) { 163 X509_REVOKED *rev = sk_X509_REVOKED_value(revoked, i); 382 if (!inf->revoked) in X509_CRL_add0_revoked() 383 inf->revoked = sk_X509_REVOKED_new(X509_REVOKED_cmp); in X509_CRL_add0_revoked() 384 if (!inf->revoked || !sk_X509_REVOKED_push(inf->revoked, rev)) { in X509_CRL_add0_revoked() [all …]
|
D | x509cset.c | 123 sk_X509_REVOKED_sort(c->crl->revoked); in X509_CRL_sort() 124 for (i = 0; i < sk_X509_REVOKED_num(c->crl->revoked); i++) { in X509_CRL_sort() 125 r = sk_X509_REVOKED_value(c->crl->revoked, i); in X509_CRL_sort()
|
/external/python/pyopenssl/tests/ |
D | test_crypto.py | 3028 revoked = crl.get_revoked() 3029 reason = revoked[1].get_reason() 3034 revoked = crl.get_revoked() 3035 revoked[1].set_reason(None) 3036 reason = revoked[1].get_reason() 3044 revoked = Revoked() 3045 assert isinstance(revoked, Revoked) 3046 assert type(revoked) == Revoked 3047 assert revoked.get_serial() == b'00' 3048 assert revoked.get_rev_date() is None [all …]
|
/external/conscrypt/repackaged/common/src/test/java/com/android/org/conscrypt/java/security/cert/ |
D | X509CRLTest.java | 120 X509Certificate revoked = (X509Certificate) cf.generateCertificate( in testCrl() 128 crl.verify(revoked.getPublicKey()); in testCrl() 133 assertTrue(crl.isRevoked(revoked)); in testCrl() 134 X509CRLEntry entry = crl.getRevokedCertificate(revoked); in testCrl()
|
/external/conscrypt/common/src/test/java/org/conscrypt/java/security/cert/ |
D | X509CRLTest.java | 116 X509Certificate revoked = (X509Certificate) cf.generateCertificate( in testCrl() 124 crl.verify(revoked.getPublicKey()); in testCrl() 129 assertTrue(crl.isRevoked(revoked)); in testCrl() 130 X509CRLEntry entry = crl.getRevokedCertificate(revoked); in testCrl()
|
/external/wpa_supplicant_8/hs20/server/ca/ |
D | setup.sh | 151 …nssl.cnf.tmp -batch -new -newkey rsa:2048 -nodes -out server-revoked.csr -keyout server-revoked.key 152 …ca -config $PWD/openssl.cnf.tmp -batch -md sha256 -in server-revoked.csr -out server-revoked.pem -… 153 $OPENSSL ca -revoke server-revoked.pem -key $PASS
|
D | clean.sh | 3 for i in server-client server server-revoked user ocsp; do
|
/external/python/cryptography/src/cryptography/hazmat/backends/openssl/ |
D | x509.py | 252 revoked = self._backend._ffi.new("X509_REVOKED **") 255 self._sorted_crl, revoked, asn1_int 261 revoked[0] != self._backend._ffi.NULL 264 self._backend, self._sorted_crl, revoked[0] 339 revoked = self._backend._lib.X509_CRL_get_REVOKED(self._x509_crl) 340 r = self._backend._lib.sk_X509_REVOKED_value(revoked, idx) 361 revoked = self._backend._lib.X509_CRL_get_REVOKED(self._x509_crl) 362 if revoked == self._backend._ffi.NULL: 365 return self._backend._lib.sk_X509_REVOKED_num(revoked)
|
/external/e2fsprogs/tests/j_long_revoke_trans/ |
D | name | 1 revoked transaction nuking free space
|
/external/e2fsprogs/tests/j_long_revoke_trans_mcsum_32bit/ |
D | name | 1 revoked trans nuking free space 32bit,mcsum
|
/external/python/cryptography/docs/x509/ |
D | ocsp.rst | 249 ``None`` if the ``cert`` is not revoked. The time in UTC at which 250 the certificate was revoked. 254 the ``cert`` is not revoked. 511 A naïve datetime representing the time when the certificate was revoked 512 or ``None`` if the certificate has not been revoked. 521 The reason the certificate was revoked or ``None`` if not specified or 522 not revoked. 644 The value for a certificate that is not revoked. 648 The certificate being checked is revoked.
|
/external/curl/tests/data/ |
D | test2043 | 22 --ssl-no-revoke -I https://revoked.grc.com/
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/x509/ |
D | CertPathReviewerMessages.properties | 370 # Certificate not revoked 371 CertPathReviewer.notRevoked.title = Certificate not revoked 372 CertPathReviewer.notRevoked.text = The certificate was not revoked. 373 CertPathReviewer.notRevoked.summary = The certificate was not revoked. 374 CertPathReviewer.notRevoked.details = The certificate was not revoked. 376 # CRL found: certificate was revoked, but after the validationDate 377 # {0} the date the certificate was revoked 379 CertPathReviewer.revokedAfterValidation.title = Certificate was revoked after the validation date 380 CertPathReviewer.revokedAfterValidation.text = The certificate was revoked after the validation dat… 381 CertPathReviewer.revokedAfterValidation.summary = The certificate was revoked after the validation … [all …]
|
/external/autotest/client/site_tests/buffet_InvalidCredentials/ |
D | control | 12 Test that buffet transitions properly if refresh token is revoked.
|
/external/curl/docs/cmdline-opts/ |
D | crlfile.d | 8 specify peer certificates that are to be considered revoked.
|
D | cert-status.d | 10 response, if the response suggests that the server certificate has been revoked,
|
/external/openssh/regress/unittests/hostkeys/testdata/ |
D | known_hosts | 47 @revoked sisyphus.example.com 1024 65537 1741433661226970481963353882170567703103457536980794643671… 48 @revoked sisyphus.example.com ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIDFP8L9REfN/iYy1KIRtFqSCn3V2+vOCp…
|
/external/openssh/ |
D | ssh-keygen.0 | 47 Lists, and to test whether given keys have been revoked by one. See the 197 Keys/certificates to be revoked may be specified by public key 296 -Q Test whether keys have been revoked in a KRL. 465 These binary files specify keys or certificates to be revoked using a 467 being revoked by serial number. 472 per line. Plain public keys are revoked by listing their hash or 473 contents in the KRL and certificates revoked by serial number or key ID 488 including and between each is revoked. The CA key must have been 498 is revoked as a plain public key. 510 been revoked (or an error encountered) then ssh-keygen will exit with a [all …]
|
D | PROTOCOL.krl | 44 certificates to be revoked and a reserved field whose contents is currently 87 revoked.
|
/external/conscrypt/common/src/jni/main/cpp/conscrypt/ |
D | native_crypto.cc | 4128 X509_REVOKED* revoked = reinterpret_cast<X509_REVOKED*>(static_cast<uintptr_t>(x509RevokedRef)); in NativeCrypto_X509_REVOKED_get_serialNumber() local 4129 JNI_TRACE("X509_REVOKED_get_serialNumber(%p)", revoked); in NativeCrypto_X509_REVOKED_get_serialNumber() 4130 return get_X509Type_serialNumber<X509_REVOKED>(env, revoked, X509_REVOKED_get_serialNumber); in NativeCrypto_X509_REVOKED_get_serialNumber() 4280 X509_REVOKED* revoked = nullptr; in NativeCrypto_X509_CRL_get0_by_cert() local 4281 int ret = X509_CRL_get0_by_cert(x509crl, &revoked, x509); in NativeCrypto_X509_CRL_get0_by_cert() 4287 JNI_TRACE("X509_CRL_get0_by_cert(%p, %p) => %p", x509crl, x509, revoked); in NativeCrypto_X509_CRL_get0_by_cert() 4288 return reinterpret_cast<uintptr_t>(revoked); in NativeCrypto_X509_CRL_get0_by_cert() 4325 X509_REVOKED* revoked = nullptr; in NativeCrypto_X509_CRL_get0_by_serial() local 4326 int ret = X509_CRL_get0_by_serial(x509crl, &revoked, serialInteger.get()); in NativeCrypto_X509_CRL_get0_by_serial() 4332 JNI_TRACE("X509_CRL_get0_by_cert(%p, %p) => %p", x509crl, serialArray, revoked); in NativeCrypto_X509_CRL_get0_by_serial() [all …]
|
/external/python/cryptography/docs/development/ |
D | test-vectors.rst | 413 * ``crl_all_reasons.pem`` - Contains a CRL with 12 revoked certificates, whose 427 * ``crl_empty.pem`` - Contains a CRL with no revoked certificates. 469 * ``x509/ocsp/resp-revoked.der`` - An OCSP response for ``revoked.badssl.com`` 470 with a revoked status. 476 * ``x509/ocsp/resp-revoked-reason.der`` - An OCSP response from the 477 ``QuoVadis`` OCSP responder that contains a revoked certificate with a 479 * ``x509/ocsp/resp-revoked-no-next-update.der`` - An OCSP response that 480 contains a revoked certificate and no ``nextUpdate`` value.
|
/external/scapy/scapy/layers/tls/ |
D | cert.py | 800 revoked = [] 811 revoked.append((serial, date)) 812 self.revoked_cert_serials = revoked
|
/external/wpa_supplicant_8/src/crypto/ |
D | tls_openssl_ocsp.c | 118 RevokedInfo *revoked; member 188 ASN1_IMP(CertStatus, value.revoked, RevokedInfo, 1),
|
/external/python/pyopenssl/src/OpenSSL/ |
D | crypto.py | 1973 revoked = _lib.X509_REVOKED_new() 1974 self._revoked = _ffi.gc(revoked, _lib.X509_REVOKED_free) 2178 revoked = _lib.sk_X509_REVOKED_value(revoked_stack, i) 2179 revoked_copy = _lib.Cryptography_X509_REVOKED_dup(revoked) 2186 def add_revoked(self, revoked): argument 2197 copy = _lib.Cryptography_X509_REVOKED_dup(revoked._revoked)
|