Searched refs:revoked (Results 1 – 22 of 22) sorted by relevance
123 if(!a || !a->revoked) return 1; in crl_inf_cb()129 (void)sk_X509_REVOKED_set_cmp_func(a->revoked,X509_REVOKED_cmp); in crl_inf_cb()142 ASN1_SEQUENCE_OF_OPT(X509_CRL_INFO, revoked, X509_REVOKED),156 STACK_OF(X509_REVOKED) *revoked;158 revoked = X509_CRL_get_REVOKED(crl);161 for (i = 0; i < sk_X509_REVOKED_num(revoked); i++)163 X509_REVOKED *rev = sk_X509_REVOKED_value(revoked, i);400 if(!inf->revoked) in X509_CRL_add0_revoked()401 inf->revoked = sk_X509_REVOKED_new(X509_REVOKED_cmp); in X509_CRL_add0_revoked()402 if(!inf->revoked || !sk_X509_REVOKED_push(inf->revoked, rev)) { in X509_CRL_add0_revoked()[all …]
123 sk_X509_REVOKED_sort(c->crl->revoked); in X509_CRL_sort()124 for (i=0; i<sk_X509_REVOKED_num(c->crl->revoked); i++) in X509_CRL_sort()126 r=sk_X509_REVOKED_value(c->crl->revoked,i); in X509_CRL_sort()
151 …nssl.cnf.tmp -batch -new -newkey rsa:2048 -nodes -out server-revoked.csr -keyout server-revoked.key152 …ca -config $PWD/openssl.cnf.tmp -batch -md sha256 -in server-revoked.csr -out server-revoked.pem -…153 $OPENSSL ca -revoke server-revoked.pem -key $PASS
3 for i in server-client server server-revoked user ocsp; do
370 # Certificate not revoked371 CertPathReviewer.notRevoked.title = Certificate not revoked372 CertPathReviewer.notRevoked.text = The certificate was not revoked.373 CertPathReviewer.notRevoked.summary = The certificate was not revoked.374 CertPathReviewer.notRevoked.details = The certificate was not revoked.376 # CRL found: certificate was revoked, but after the validationDate377 # {0} the date the certificate was revoked379 CertPathReviewer.revokedAfterValidation.title = Certificate was revoked after the validation date380 CertPathReviewer.revokedAfterValidation.text = The certificate was revoked after the validation dat…381 CertPathReviewer.revokedAfterValidation.summary = The certificate was revoked after the validation …[all …]
13 Test that buffet transitions properly if refresh token is revoked.
5747 X509_REVOKED* revoked = reinterpret_cast<X509_REVOKED*>(static_cast<uintptr_t>(x509RevokedRef)); local5748 JNI_TRACE("X509_REVOKED_get_serialNumber(%p)", revoked);5749 return get_X509Type_serialNumber<X509_REVOKED>(env, revoked, X509_REVOKED_get_serialNumber);5874 X509_REVOKED* revoked = nullptr; local5875 int ret = X509_CRL_get0_by_cert(x509crl, &revoked, x509);5881 JNI_TRACE("X509_CRL_get0_by_cert(%p, %p) => %p", x509crl, x509, revoked);5882 return reinterpret_cast<uintptr_t>(revoked);5916 X509_REVOKED* revoked = nullptr; local5917 int ret = X509_CRL_get0_by_serial(x509crl, &revoked, serialInteger.get());5923 JNI_TRACE("X509_CRL_get0_by_cert(%p, %p) => %p", x509crl, serialArray, revoked);[all …]
18 22) Block revoked or bad certs such as MD5 inc. and others.
118 RevokedInfo *revoked; member188 ASN1_IMP(CertStatus, value.revoked, RevokedInfo, 1),
896 int good = 0, revoked = 0; in tls_process_certificate_status() local940 revoked++; in tls_process_certificate_status()946 if (revoked) in tls_process_certificate_status()
258 bool revoked = local261 revoked ? GcdState::kInvalidCredentials : GcdState::kUnconfigured;
116 -V $old_hostname-osu-revoked \
412 STACK_OF(X509_REVOKED) *revoked;576 #define X509_CRL_get_REVOKED(x) ((x)->crl->revoked)
352 and 2.2(b) are revoked effective as of the date You first made, used,
810 revoked by the Internet Society or its successors or assigns.
384 cause commit access to be revoked.
1675 revoked by the Internet Society or its successors or assigns.
1733 revoked by the Internet Society or its successors or assigns.
2367 revoked by the Internet Society or its successors or assigns.
2502 revoked by the Internet Society or its successors or assigns.
META-INF/ META-INF/MANIFEST.MF org/ org/apache/ org/ ...