kevans d30a617ac3 certctl(8): let one blacklist based on hashed filenames
It seems reasonable to allow, for instance:

$ certctl list
# reviews output -- ah, yeah, I don't trust that one
$ certctl blacklist ce5e74ef.0
$ certctl rehash

We can unambiguously determine what cert "ce5e74ef.0" refers to, and we've
described it to them in `certctl list` output -- I see little sense in
forcing another level of filesystem inspection to determien what cert file
this physically corresponds to.
2019-10-03 20:45:52 +00:00
..
2019-08-13 20:06:55 +00:00
2019-06-09 02:06:31 +00:00
2019-08-08 21:08:13 +00:00
2019-09-04 13:47:38 +00:00
2019-07-12 06:19:25 +00:00
2019-07-17 06:17:27 +00:00
2019-10-02 01:05:53 +00:00