| /src/contrib/llvm-project/llvm/lib/IR/ |
| H A D | ConstantRangeList.cpp | 144 ConstantRangeList::unionWith(const ConstantRangeList &CRL) const { in unionWith() 145 assert(getBitWidth() == CRL.getBitWidth() && in unionWith() 149 return CRL; in unionWith() 150 if (CRL.empty()) in unionWith() 158 if (Ranges[i].getLower().slt(CRL.Ranges[j].getLower())) { in unionWith() 161 PreviousRange = CRL.Ranges[j++]; in unionWith() 179 while (i < size() || j < CRL.size()) { in unionWith() 180 if (j == CRL.size() || in unionWith() 181 (i < size() && Ranges[i].getLower().slt(CRL.Ranges[j].getLower()))) { in unionWith() 186 UnionAndUpdateRange(CRL.Ranges[j++]); in unionWith() [all …]
|
| /src/crypto/openssl/doc/man1/ |
| H A D | openssl-crl.pod.in | 6 openssl-crl - CRL command 37 This command processes CRL files in DER or PEM format. 49 The CRL input format; unspecified by default. 54 The CRL output format; the default is B<PEM>. 59 The private key to be used to sign the CRL. 78 Output a comparison of the main CRL and the one specified here. 92 Print out the CRL in text form. 96 Verify the signature in the CRL. If the verification fails, 105 Don't output the encoded version of the CRL. 109 Output the fingerprint of the CRL. [all …]
|
| H A D | openssl-crl2pkcs7.pod.in | 6 openssl-crl2pkcs7 - Create a PKCS#7 structure from a CRL and certificates 22 This command takes an optional CRL and one or more 36 The input format of the CRL; the default is B<PEM>. 46 This specifies the input filename to read a CRL from or standard input if this 63 Normally a CRL is included in the output file. With this option no CRL is 64 included in the output file and a CRL is not read from the input file. 72 Create a PKCS#7 structure from a certificate and CRL: 76 Creates a PKCS#7 structure in DER format with no CRL from several 85 just certificates and an optional CRL.
|
| H A D | openssl-ca.pod.in | 364 =head1 CRL OPTIONS 370 This option generates a CRL based on information in the index file. 374 Allows the value of the CRL's lastUpdate field to be explicitly set; if 381 Allows the value of the CRL's nextUpdate field to be explicitly set; if 388 The number of days before the next CRL is due. That is the days from 389 now to place in the CRL nextUpdate field. 393 The number of hours before the next CRL is due. 397 The number of seconds before the next CRL is due. 421 insensitive. Setting any revocation reason will make the CRL v2. 428 This sets the CRL revocation reason code to B<certificateHold> and the hold [all …]
|
| /src/contrib/llvm-project/llvm/include/llvm/IR/ |
| H A D | ConstantRangeList.h | 79 ConstantRangeList unionWith(const ConstantRangeList &CRL) const; 83 ConstantRangeList intersectWith(const ConstantRangeList &CRL) const; 86 bool operator==(const ConstantRangeList &CRL) const { 87 return Ranges == CRL.Ranges; 89 bool operator!=(const ConstantRangeList &CRL) const { 90 return !operator==(CRL);
|
| /src/crypto/openssl/test/certs/ |
| H A D | cyrillic_crl.utf8 | 1 Certificate Revocation List (CRL): 7 CRL extensions: 8 X509v3 CRL Number: 28 -----BEGIN X509 CRL----- 40 -----END X509 CRL-----
|
| H A D | cyrillic_crl.pem | 1 -----BEGIN X509 CRL----- 13 -----END X509 CRL-----
|
| /src/crypto/openssl/doc/man3/ |
| H A D | X509_STORE_CTX_get_error.pod | 119 =item B<X509_V_ERR_UNABLE_TO_GET_CRL: unable to get certificate CRL> 121 The CRL of a certificate could not be found. 131 unable to decrypt CRL's signature> 133 The CRL signature could not be decrypted: this means that the actual signature 147 =item B<X509_V_ERR_CRL_SIGNATURE_FAILURE: CRL signature failure> 149 The signature of the CRL is invalid. 161 =item B<X509_V_ERR_CRL_NOT_YET_VALID: CRL is not yet valid> 163 The CRL is not yet valid. 165 =item B<X509_V_ERR_CRL_HAS_EXPIRED: CRL has expired> 167 The CRL has expired. [all …]
|
| H A D | X509V3_get_d2i.pod | 78 of CRL I<crl>. They are otherwise identical to X509V3_get_d2i() and 82 extensions of B<X509_REVOKED> structure I<r> (i.e for CRL entry extensions). 88 a CRL or a CRL entry respectively. 180 =head2 PKIX CRL Extensions 182 The following are CRL extensions from PKIX standards such as RFC5280. 184 CRL Number NID_crl_number 185 CRL Distribution Points NID_crl_distribution_points 186 Delta CRL Indicator NID_delta_crl 187 Freshest CRL NID_freshest_crl 191 The following are CRL entry extensions from PKIX standards such as RFC5280. [all …]
|
| H A D | X509_LOOKUP_hash_dir.pod | 49 or CRL object (while PEM can contain several concatenated PEM objects) 87 The directory should contain one certificate or CRL per file in PEM format, 89 I<hash>.B<r>I<N> for a CRL. 96 incremented consecutively for each certificate or CRL with the same I<hash> 108 When checking for new CRLs once one CRL for given hash value is 110 sequence number greater than that of the already cached CRL.
|
| H A D | CMS_add0_cert.pod | 7 - CMS certificate and CRL utility functions 37 CMS_add0_crl() and CMS_add1_crl() add CRL I<crl> to I<cms>. 39 For signed data, such a CRL may be used in certificate validation
|
| H A D | X509_CRL_get0_by_serial.pod | 8 X509_CRL_add0_revoked, X509_CRL_sort - CRL revoked entry utility 58 X509_CRL_add0_revoked() appends revoked entry I<rev> to CRL I<crl>. The 60 it is freed when the parent CRL is freed.
|
| H A D | OSSL_CMP_ITAV_new_caCerts.pod | 100 If given, a copy of the CRL issuance time I<thisUpdate> is also included. 137 CRL status data, each of which is of type B<OSSL_CMP_CRLSTATUS>. 140 pointer to the list of CRL status data in the infoValue field of I<itav>. 141 The pointer may be NULL if no CRL status data is included. 146 or including a singleton list a with copy of the provided CRL otherwise. 150 The pointer may be NULL if no CRL is included.
|
| H A D | X509_load_http.pod | 9 - certificate and CRL loading functions 27 X509_load_http() and X509_CRL_load_http() loads a certificate or a CRL,
|
| /src/crypto/krb5/src/lib/krb5/krb/ |
| H A D | t_krb5.conf | 32 /COM/DEC/CRL = /COM/DEC 33 /COM/DEC/CRL = /COM 34 /COM/DEC/CRL = /COM/HP 35 /COM/DEC/CRL = /COM/HP/APOLLO
|
| /src/crypto/openssl/test/recipes/80-test_cmp_http_data/Mock/ |
| H A D | oldcrl.pem | 1 -----BEGIN X509 CRL----- 12 -----END X509 CRL-----
|
| H A D | newcrl.pem | 1 -----BEGIN X509 CRL----- 12 -----END X509 CRL-----
|
| /src/crypto/openssl/test/ |
| H A D | testcrl.pem | 1 -----BEGIN X509 CRL----- 16 -----END X509 CRL-----
|
| H A D | test.cnf | 17 crl = $dir/crl.pem # The current CRL 21 default_crl_days= 30 # how long before next CRL
|
| /src/crypto/openssl/doc/man7/ |
| H A D | x509.pod | 14 an individual, a device, or anything one can imagine. An X.509 CRL 19 the type X509_CRL is used to express a CRL. 30 Finally, there's the supertype X509_INFO, which can contain a CRL, a
|
| /src/crypto/openssl/demos/certs/ |
| H A D | README.txt | 11 certificates and generates a CRL. Then one certificate is revoked and a 12 second CRL generated.
|
| /src/crypto/openssl/test/recipes/90-test_includes_data/conf-includes/ |
| H A D | includes1.cnf | 22 crl = $dir/crl.pem # The current CRL 26 default_crl_days= 30 # how long before next CRL
|
| /src/crypto/heimdal/lib/hx509/ |
| H A D | hx509_err.et | 74 error_code CRL_USED_BEFORE_TIME, "CRL used before it became valid" 75 error_code CRL_USED_AFTER_TIME, "CRL used after it became invalid" 76 error_code CRL_INVALID_FORMAT, "CRL have invalid format" 80 error_code REVOKE_WRONG_DATA, "Got wrong CRL/OCSP data from server"
|
| /src/crypto/openssl/apps/ |
| H A D | openssl-vms.cnf | 93 # must be commented out to leave a V1 CRL 94 crl = $dir]crl.pem # The current CRL 107 # Extensions to add to a CRL. Note: Netscape communicator chokes on V2 CRLs 108 # so this is commented out by default to leave a V1 CRL. 109 # crlnumber must also be commented out to leave a V1 CRL. 113 default_crl_days= 30 # how long before next CRL 270 # CRL extensions. 271 # Only issuerAltName and authorityKeyIdentifier make any sense in a CRL.
|
| H A D | openssl.cnf | 94 # must be commented out to leave a V1 CRL 95 crl = $dir/crl.pem # The current CRL 108 # Extensions to add to a CRL. Note: Netscape communicator chokes on V2 CRLs 109 # so this is commented out by default to leave a V1 CRL. 110 # crlnumber must also be commented out to leave a V1 CRL. 114 default_crl_days= 30 # how long before next CRL 271 # CRL extensions. 272 # Only issuerAltName and authorityKeyIdentifier make any sense in a CRL.
|