/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/asn1/ |
H A D | x_crl.c | 92 * reordering of the revoked field. 99 if(!a || !a->revoked) return 1; 105 (void)sk_X509_REVOKED_set_cmp_func(a->revoked,X509_REVOKED_cmp); 118 ASN1_SEQUENCE_OF_OPT(X509_CRL_INFO, revoked, X509_REVOKED), 131 STACK_OF(X509_REVOKED) *revoked; 133 revoked = X509_CRL_get_REVOKED(crl); 136 for (i = 0; i < sk_X509_REVOKED_num(revoked); i++) 138 X509_REVOKED *rev = sk_X509_REVOKED_value(revoked, i); 375 if(!inf->revoked) 376 inf->revoked [all...] |
/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/x509/ |
H A D | x509cset.c | 126 sk_X509_REVOKED_sort(c->crl->revoked); 127 for (i=0; i<sk_X509_REVOKED_num(c->crl->revoked); i++) 129 r=sk_X509_REVOKED_value(c->crl->revoked,i);
|
H A D | x509.h | 456 STACK_OF(X509_REVOKED) *revoked; member in struct:X509_crl_info_st 625 #define X509_CRL_get_REVOKED(x) ((x)->crl->revoked)
|
/barrelfish-2018-10-04/kernel/ |
H A D | cap_delete.c | 470 * \param base The data for the capability being revoked 471 * \param revoked The revoke target if it is on this core. This specific 473 * &revoked->cap) must hold. 478 errval_t caps_mark_revoke(struct capability *base, struct cte *revoked) argument 481 assert(!revoked || revoked->mdbnode.owner == my_core_id); 506 if (next == revoked) { 507 // do not delete the revoked capability, use it as the new prev 510 prev = revoked; 512 assert(revoked || nex [all...] |
/barrelfish-2018-10-04/lib/openssl-1.0.0d/demos/asn1/ |
H A D | ocsp.c | 141 revoked [1] IMPLICIT RevokedInfo, 250 RevokedInfo *revoked; member in union:__anon1319::__anon1320 340 ASN1_IMP(CertStatus, d.revoked, RevokedInfo, 1),
|
/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/ocsp/ |
H A D | ocsp_asn.c | 134 ASN1_IMP(OCSP_CERTSTATUS, value.revoked, OCSP_REVOKEDINFO, 1),
|
H A D | ocsp_cl.c | 254 * certificate status is revoked. Returns numerical value of 270 OCSP_REVOKEDINFO *rev = cst->value.revoked;
|
H A D | ocsp_prn.c | 116 { V_OCSP_CERTSTATUS_REVOKED, "revoked" }, 243 rev = cst->value.revoked;
|
H A D | ocsp_srv.c | 163 if (!(cs->value.revoked = ri = OCSP_REVOKEDINFO_new())) goto err;
|
H A D | ocsp.h | 230 * revoked [1] IMPLICIT RevokedInfo, 241 OCSP_REVOKEDINFO *revoked; member in union:ocsp_cert_status_st::__anon1267
|
/barrelfish-2018-10-04/kernel/include/ |
H A D | capabilities.h | 161 errval_t caps_mark_revoke(struct capability *base, struct cte *revoked);
|
/barrelfish-2018-10-04/include/openssl/ |
H A D | ocsp.h | 230 * revoked [1] IMPLICIT RevokedInfo, 241 OCSP_REVOKEDINFO *revoked; member in union:ocsp_cert_status_st::__anon236
|
H A D | x509.h | 456 STACK_OF(X509_REVOKED) *revoked; member in struct:X509_crl_info_st 625 #define X509_CRL_get_REVOKED(x) ((x)->crl->revoked)
|
/barrelfish-2018-10-04/doc/011-idc/ |
H A D | IDC.tex | 957 being revoked. If the check fails, a \lstinline+cap_send_reply+ error is
|
/barrelfish-2018-10-04/doc/006-routing/ |
H A D | Routing.tex | 244 To send a capability, the monitor sends a \texttt{multihop\_cap\_send} message to its local monitor, containing the capability. The monitor determines whether the capability can be sent to the remote dispatcher. In gereral, capabilities referring to inherently local state (such as LMP endpoint) may not be sent, nor may capabilities that are currently being revoked. If the capability cannot be sent, a \texttt{multihop\_cap\_reply} message is sent back to the local dispatcher containing the error code. Otherwise, the capability is serialised and forwarded along the multi-hop channel.
|