| /src/external/bsd/unbound/dist/validator/ |
| autotrust.h | 82 /** revoked TA was seen */ 83 uint8_t revoked; member in struct:autr_ta 120 /** true if the trust point has been revoked */ 121 uint8_t revoked; member in struct:autr_point_data 193 * @return false if trust anchor was revoked completely.
|
| /src/crypto/external/apache2/openssl/dist/crypto/ocsp/ |
| ocsp_local.h | 123 * revoked [1] IMPLICIT RevokedInfo, 130 OCSP_REVOKEDINFO *revoked; member in union:ocsp_cert_status_st::__anon332
|
| /src/crypto/external/bsd/openssl/dist/crypto/ocsp/ |
| ocsp_local.h | 123 * revoked [1] IMPLICIT RevokedInfo, 130 OCSP_REVOKEDINFO *revoked; member in union:ocsp_cert_status_st::__anon1431
|
| /src/crypto/external/bsd/openssl.old/dist/crypto/ocsp/ |
| ocsp_local.h | 121 * revoked [1] IMPLICIT RevokedInfo, 128 OCSP_REVOKEDINFO *revoked; member in union:ocsp_cert_status_st::__anon2098
|
| /src/external/bsd/wpa/dist/src/tls/ |
| tlsv1_client_read.c | 586 "certificate revoked"); 902 int good = 0, revoked = 0; local 946 revoked++; 952 if (revoked) 971 "certificate revoked");
|
| /src/crypto/external/bsd/heimdal/dist/lib/hx509/ |
| revoke.c | 781 "Certificate revoked by issuer in OCSP"); 872 "Certificate revoked by issuer in CRL"); 1149 status = "revoked"; 1386 hx509_certs revoked; member in struct:hx509_crl 1412 ret = hx509_certs_init(context, "MEMORY:crl", 0, NULL, &(*crl)->revoked); 1423 * Add revoked certificate to an CRL context. 1426 * @param crl the CRL to add the revoked certificate to. 1439 return hx509_certs_merge(context, crl->revoked, certs); 1476 hx509_certs_free(&(*crl)->revoked); 1601 ret = hx509_certs_iter_f(context, crl->revoked, add_revoked, &c.tbsCertList) [all...] |
| hxtool.c | 2230 hx509_certs revoked = NULL; local 2233 ret = hx509_certs_init(context, "MEMORY:revoked-certs", 0, 2234 NULL, &revoked); 2240 ret = hx509_certs_append(context, revoked, lock, argv[i]); 2245 hx509_crl_add_revoked_certs(context, crl, revoked); 2246 hx509_certs_free(&revoked);
|
| /src/external/bsd/wpa/dist/src/crypto/ |
| tls_openssl_ocsp.c | 111 * revoked [1] IMPLICIT RevokedInfo, 118 RevokedInfo *revoked; member in union:__anon8327::__anon8328 188 ASN1_IMP(CertStatus, value.revoked, RevokedInfo, 1), 742 wpa_printf(MSG_DEBUG, "OpenSSL: certStatus: revoked"); 817 "OpenSSL: OCSP response indicated that the peer certificate has been revoked");
|
| /src/crypto/external/apache2/openssl/dist/include/crypto/ |
| x509.h | 95 STACK_OF(X509_REVOKED) *revoked; /* revoked entries: optional */ member in struct:X509_crl_info_st 131 ASN1_INTEGER serialNumber; /* revoked entry serial number */
|
| /src/crypto/external/bsd/netpgp/dist/src/libverify/ |
| verify.h | 143 uint8_t revoked; /* subtract 1 to get real reason, 0 == not revoked */ member in struct:pgpv_signature_t 218 uint8_t revoked; member in struct:pgpv_signed_userid_t 224 uint8_t revoked; member in struct:pgpv_signed_userattr_t
|
| /src/crypto/external/bsd/openssl/dist/include/crypto/ |
| x509.h | 95 STACK_OF(X509_REVOKED) *revoked; /* revoked entries: optional */ member in struct:X509_crl_info_st 131 ASN1_INTEGER serialNumber; /* revoked entry serial number */
|
| /src/crypto/external/bsd/openssl.old/dist/include/crypto/ |
| x509.h | 84 STACK_OF(X509_REVOKED) *revoked; /* revoked entries: optional */ member in struct:X509_crl_info_st 117 ASN1_INTEGER serialNumber; /* revoked entry serial number */
|
| /src/crypto/external/bsd/netpgp/dist/src/lib/ |
| packet.h | 997 uint8_t revoked; /* key has been revoked */ member in struct:pgp_key_t
|
| /src/crypto/external/bsd/netpgp/dist/src/netpgpverify/ |
| libverify.c | 167 uint8_t revoked; /* subtract 1 to get real reason, 0 == not revoked */ member in struct:pgpv_signature_t 242 uint8_t revoked; member in struct:pgpv_signed_userid_t 248 uint8_t revoked; member in struct:pgpv_signed_userattr_t 1183 sigpkt->sig.revoked = *p++ + 1; 1642 if (signature.revoked) { 1643 userid->revoked = signature.revoked; 1669 if (signature.revoked) { 1670 userattr->revoked = signature.revoked [all...] |
| /src/external/mpl/bind/dist/bin/named/ |
| server.c | 16287 bool revoked; local 16305 revoked = ((kd.flags & DNS_KEYFLAG_REVOKE) != 0); 16307 revoked ? " REVOKE" : "", 16332 } else if (revoked) { 16333 snprintf(buf, sizeof(buf), "\n\ttrust revoked");
|
| /src/external/mpl/bind/dist/lib/dns/ |
| zone.c | 4410 int trusted = 0, revoked = 0, pending = 0; local 4437 /* If the removal timer is nonzero, this key was revoked. */ 4439 revoked++; 4466 "%d key(s) revoked, %d still pending", revoked, 6435 * If the key was revoked and the private file 6436 * doesn't exist, maybe it was revoked internally 7177 * If this key is revoked, it may only sign the DNSKEY RRset. 10338 "Confirm revoked DNSKEY is self-signed: %s", 10553 * trusted keys then all we can do is look at any revoked keys 10697 bool revoked = false; local [all...] |
| /src/external/mpl/dhcp/bind/dist/lib/dns/ |
| zone.c | 4314 int trusted = 0, revoked = 0, pending = 0; local 4343 /* If the removal timer is nonzero, this key was revoked. */ 4345 revoked++; 4372 "%d key(s) revoked, %d still pending", revoked, 7252 * If this key is revoked, it may only sign the 10375 "Confirm revoked DNSKEY is self-signed: %s", 10590 * trusted keys then all we can do is look at any revoked keys. 10679 "Revoked key %d for zone %s " 10720 * - Previously-known keys that have been revoked 10732 bool revoked = false; local [all...] |