Home
last modified time | relevance | path

Searched refs:revoked (Results 1 – 25 of 32) sorted by relevance

12

/external/openssh/regress/
Dkrl.sh15 rm -f $OBJ/revoked-* $OBJ/krl-*
18 $SSHKEYGEN -t $ECDSA -f $OBJ/revoked-ca -C "" -N "" > /dev/null ||
20 $SSHKEYGEN -t ed25519 -f $OBJ/revoked-ca2 -C "" -N "" > /dev/null ||
26 cat << EOF >> $OBJ/revoked-serials
48 touch $OBJ/revoked-keyid
52 echo "id: revoked $n" >> $OBJ/revoked-keyid
57 f=$OBJ/revoked-`printf "%04d" $N`
67 $SSHKEYGEN -s $OBJ/revoked-ca -z $n -I "revoked $N" $f >/dev/null 2>&1 \
98 $SSHKEYGEN $OPTS -kf $OBJ/krl-ca $OBJ/revoked-ca.pub \
101 $SSHKEYGEN $OPTS -kf $OBJ/krl-serial $OBJ/revoked-serials \
[all …]
DMakefile105 revoked-* rsa rsa-agent rsa-agent.pub rsa.pub rsa1 \
/external/boringssl/src/crypto/x509/
Dx_crl.c121 if (!a || !a->revoked) in crl_inf_cb()
129 (void)sk_X509_REVOKED_set_cmp_func(a->revoked, X509_REVOKED_cmp); in crl_inf_cb()
142 ASN1_SEQUENCE_OF_OPT(X509_CRL_INFO, revoked, X509_REVOKED),
157 STACK_OF(X509_REVOKED) *revoked;
159 revoked = X509_CRL_get_REVOKED(crl);
162 for (i = 0; i < sk_X509_REVOKED_num(revoked); i++) {
163 X509_REVOKED *rev = sk_X509_REVOKED_value(revoked, i);
382 if (!inf->revoked) in X509_CRL_add0_revoked()
383 inf->revoked = sk_X509_REVOKED_new(X509_REVOKED_cmp); in X509_CRL_add0_revoked()
384 if (!inf->revoked || !sk_X509_REVOKED_push(inf->revoked, rev)) { in X509_CRL_add0_revoked()
[all …]
Dx509cset.c123 sk_X509_REVOKED_sort(c->crl->revoked); in X509_CRL_sort()
124 for (i = 0; i < sk_X509_REVOKED_num(c->crl->revoked); i++) { in X509_CRL_sort()
125 r = sk_X509_REVOKED_value(c->crl->revoked, i); in X509_CRL_sort()
/external/wpa_supplicant_8/hs20/server/ca/
Dsetup.sh151 …nssl.cnf.tmp -batch -new -newkey rsa:2048 -nodes -out server-revoked.csr -keyout server-revoked.key
152 …ca -config $PWD/openssl.cnf.tmp -batch -md sha256 -in server-revoked.csr -out server-revoked.pem -…
153 $OPENSSL ca -revoke server-revoked.pem -key $PASS
Dclean.sh3 for i in server-client server server-revoked user ocsp; do
/external/e2fsprogs/tests/j_long_revoke_trans/
Dname1 revoked transaction nuking free space
/external/e2fsprogs/tests/j_ext_long_revoke_trans/
Dname1 revoked transaction nuking free space w/ ext. journal
/external/e2fsprogs/tests/j_long_revoke_trans_mcsum_64bit/
Dname1 revoked transaction nuking free space on 64bit,metadata_csum
/external/e2fsprogs/tests/j_long_revoke_trans_mcsum_32bit/
Dname1 revoked transaction nuking free space on 32bit,metadata_csum
/external/curl/tests/data/
Dtest204322 --ssl-no-revoke -I https://revoked.grc.com/
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/x509/
DCertPathReviewerMessages.properties370 # Certificate not revoked
371 CertPathReviewer.notRevoked.title = Certificate not revoked
372 CertPathReviewer.notRevoked.text = The certificate was not revoked.
373 CertPathReviewer.notRevoked.summary = The certificate was not revoked.
374 CertPathReviewer.notRevoked.details = The certificate was not revoked.
376 # CRL found: certificate was revoked, but after the validationDate
377 # {0} the date the certificate was revoked
379 CertPathReviewer.revokedAfterValidation.title = Certificate was revoked after the validation date
380 CertPathReviewer.revokedAfterValidation.text = The certificate was revoked after the validation dat…
381 CertPathReviewer.revokedAfterValidation.summary = The certificate was revoked after the validation …
[all …]
/external/autotest/client/site_tests/buffet_InvalidCredentials/
Dcontrol12 Test that buffet transitions properly if refresh token is revoked.
/external/curl/docs/cmdline-opts/
Dcrlfile.d8 specify peer certificates that are to be considered revoked.
Dcert-status.d10 response, if the response suggests that the server certificate has been revoked,
/external/openssh/regress/unittests/hostkeys/testdata/
Dknown_hosts47 @revoked sisyphus.example.com 1024 65537 1741433661226970481963353882170567703103457536980794643671…
48 @revoked sisyphus.example.com ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIDFP8L9REfN/iYy1KIRtFqSCn3V2+vOCp…
/external/openssh/
Dssh-keygen.047 Lists, and to test whether given keys have been revoked by one. See the
197 Keys/certificates to be revoked may be specified by public key
296 -Q Test whether keys have been revoked in a KRL.
465 These binary files specify keys or certificates to be revoked using a
467 being revoked by serial number.
472 per line. Plain public keys are revoked by listing their hash or
473 contents in the KRL and certificates revoked by serial number or key ID
488 including and between each is revoked. The CA key must have been
498 is revoked as a plain public key.
510 been revoked (or an error encountered) then ssh-keygen will exit with a
[all …]
DPROTOCOL.krl44 certificates to be revoked and a reserved field whose contents is currently
87 revoked.
Dsshd.0411 the line is revoked and must not ever be accepted. Only one marker
443 The known hosts file also provides a facility to mark keys as revoked,
473 # A revoked key
474 @revoked * ssh-rsa AAAAB5W...
/external/conscrypt/common/src/jni/main/cpp/
DNativeCrypto.cpp3790 X509_REVOKED* revoked = reinterpret_cast<X509_REVOKED*>(static_cast<uintptr_t>(x509RevokedRef)); in NativeCrypto_X509_REVOKED_get_serialNumber() local
3791 JNI_TRACE("X509_REVOKED_get_serialNumber(%p)", revoked); in NativeCrypto_X509_REVOKED_get_serialNumber()
3792 return get_X509Type_serialNumber<X509_REVOKED>(env, revoked, X509_REVOKED_get_serialNumber); in NativeCrypto_X509_REVOKED_get_serialNumber()
3917 X509_REVOKED* revoked = nullptr; in NativeCrypto_X509_CRL_get0_by_cert() local
3918 int ret = X509_CRL_get0_by_cert(x509crl, &revoked, x509); in NativeCrypto_X509_CRL_get0_by_cert()
3924 JNI_TRACE("X509_CRL_get0_by_cert(%p, %p) => %p", x509crl, x509, revoked); in NativeCrypto_X509_CRL_get0_by_cert()
3925 return reinterpret_cast<uintptr_t>(revoked); in NativeCrypto_X509_CRL_get0_by_cert()
3959 X509_REVOKED* revoked = nullptr; in NativeCrypto_X509_CRL_get0_by_serial() local
3960 int ret = X509_CRL_get0_by_serial(x509crl, &revoked, serialInteger.get()); in NativeCrypto_X509_CRL_get0_by_serial()
3966 JNI_TRACE("X509_CRL_get0_by_cert(%p, %p) => %p", x509crl, serialArray, revoked); in NativeCrypto_X509_CRL_get0_by_serial()
[all …]
/external/wpa_supplicant_8/src/crypto/
Dtls_openssl_ocsp.c118 RevokedInfo *revoked; member
188 ASN1_IMP(CertStatus, value.revoked, RevokedInfo, 1),
/external/wpa_supplicant_8/src/tls/
Dtlsv1_client_read.c896 int good = 0, revoked = 0; in tls_process_certificate_status() local
940 revoked++; in tls_process_certificate_status()
946 if (revoked) in tls_process_certificate_status()
/external/swiftshader/third_party/subzero/docs/
DREGALLOC.rst288 different initial register choice would not have been revoked. For relatively
291 During register allocation, we keep track of the revoked variables and then do
298 was subsequently revoked), but our experience is that this greatly increases
/external/wpa_supplicant_8/hs20/server/
Dhs20-osu-server.txt116 -V $old_hostname-osu-revoked \
/external/boringssl/src/include/openssl/
Dx509.h410 STACK_OF(X509_REVOKED) *revoked;
537 #define X509_CRL_get_REVOKED(x) ((x)->crl->revoked)

12