Searched refs:crl (Results 1 - 8 of 8) sorted by relevance
/forgerock/openam-v13/openam-certs/src/main/java/com/sun/identity/security/cert/ |
H A D | AMCRLStore.java | 76 * The class is used to manage crl store in LDAP server 77 * This class does get crl and update crl with CRLDistribution 136 X509CRL crl = null; 142 crl = getCRLFromCache(certificate); 149 if (crl == null) { 151 debug.message("AMCRLStore.getCRL: crl is null"); 158 crl = getCRLFromEntry(crlEntry); 161 if (storeParam.isDoUpdateCRLs() && needCRLUpdate(crl)) { 169 if (crl ! 238 updateCRLCache(X509Certificate certificate, X509CRL crl) argument 332 getCRLIDPExt(X509CRL crl) argument 674 needCRLUpdate(X509CRL crl) argument [all...] |
H A D | CRLValidator.java | 124 * Validate certificate against configured crl 126 * @return true if certificate is not in crl 135 X509CRL crl = 138 if (crl != null) { 139 crls.add(crl); 175 * @return crl if ldap store configured with crl 178 X509CRL crl = null; 187 debug.message("CRLValidator - attrValue to search crl : " + attrValue); 195 crl [all...] |
H A D | AMCertPath.java | 93 X509CRL crl = (X509CRL) crls.elementAt(0); 94 debug.message("AMCertPath:AMCertPath: crl =" + crl.toString()); 104 debug.message("AMCertPath:AMCertPath: no crl"); 162 //OCSP revocation checking not configured properly. Disable the check if crl-based checking not enabled 170 //the Security properties are static - if we are doing crl validation, insure that the property
|
/forgerock/openam/openam-certs/src/main/java/com/sun/identity/security/cert/ |
H A D | AMCRLStore.java | 78 * The class is used to manage crl store in LDAP server 79 * This class does get crl and update crl with CRLDistribution 138 X509CRL crl = null; 144 crl = getCRLFromCache(certificate); 151 if (crl == null) { 153 debug.message("AMCRLStore.getCRL: crl is null"); 160 crl = getCRLFromEntry(crlEntry); 163 if (storeParam.isDoUpdateCRLs() && needCRLUpdate(crl)) { 171 if (crl ! 240 updateCRLCache(X509Certificate certificate, X509CRL crl) argument 334 getCRLIDPExt(X509CRL crl) argument 676 needCRLUpdate(X509CRL crl) argument [all...] |
H A D | CRLValidator.java | 124 * Validate certificate against configured crl 126 * @return true if certificate is not in crl 135 X509CRL crl = 138 if (crl != null) { 139 crls.add(crl); 175 * @return crl if ldap store configured with crl 178 X509CRL crl = null; 187 debug.message("CRLValidator - attrValue to search crl : " + attrValue); 195 crl [all...] |
H A D | AMCertPath.java | 93 X509CRL crl = (X509CRL) crls.elementAt(0); 94 debug.message("AMCertPath:AMCertPath: crl =" + crl.toString()); 104 debug.message("AMCertPath:AMCertPath: no crl"); 162 //OCSP revocation checking not configured properly. Disable the check if crl-based checking not enabled 170 //the Security properties are static - if we are doing crl validation, insure that the property
|
/forgerock/openam-v13/openam-authentication/openam-auth-cert/src/main/java/com/sun/identity/authentication/modules/cert/ |
H A D | Cert.java | 229 options, "iplanet-am-auth-cert-check-crl"); 232 options, "iplanet-am-auth-cert-attr-check-crl"); 240 options, "openam-am-auth-cert-attr-cache-crl","true"); 245 options, "openam-am-auth-cert-update-crl", "true"); 256 options, "iplanet-am-auth-cert-param-get-crl"); 492 X509CRL crl = null; 495 crl = AMCRLStore.getCRL(ldapParam, cert, amAuthCert_chkAttributesCRL); 497 if ((crl != null) && (!crl.isRevoked(cert))) { 551 X509CRL crl [all...] |
/forgerock/openam/openam-authentication/openam-auth-cert/src/main/java/com/sun/identity/authentication/modules/cert/ |
H A D | Cert.java | 217 options, "iplanet-am-auth-cert-check-crl"); 220 options, "iplanet-am-auth-cert-attr-check-crl"); 228 options, "openam-am-auth-cert-attr-cache-crl","true"); 233 options, "openam-am-auth-cert-update-crl", "true"); 244 options, "iplanet-am-auth-cert-param-get-crl"); 491 X509CRL crl = AMCRLStore.getCRL(ldapParam, cert, amAuthCert_chkAttributesCRL); 492 if (crl != null) { 493 crls.add(crl); 681 * @return value for attribute name to search crl from ldap store
|
Completed in 43 milliseconds