/third_party/node/test/parallel/ |
D | test-tls-ocsp-callback.js | 51 if (!testOptions.ocsp) 72 if (!testOptions.ocsp) 87 requestOCSP: testOptions.ocsp, 88 secureOptions: testOptions.ocsp ? 0 : SSL_OP_NO_TICKET, 99 }, testOptions.ocsp === false ? 0 : 1)); 107 test({ ocsp: true, response: false }); property 108 test({ ocsp: true, response: 'hello world' }); property 109 test({ ocsp: false }); property 112 test({ ocsp: true, response: 'hello pfx', pfx: pfx, passphrase: 'sample' }); property
|
/third_party/openssl/demos/certs/ |
D | ocspquery.sh | 11 $OPENSSL ocsp -issuer intca.pem -cert client.pem -CAfile root.pem \ 13 $OPENSSL ocsp -issuer intca.pem -cert server.pem -CAfile root.pem \ 15 $OPENSSL ocsp -issuer intca.pem -cert rev.pem -CAfile root.pem \ 19 $OPENSSL ocsp -issuer intca.pem \
|
D | ocsprun.sh | 13 $OPENSSL ocsp -port $PORT -index index.txt -CA intca.pem \
|
/third_party/nghttp2/script/ |
D | README.rst | 1 fetch-ocsp-response is a Python script which performs OCSP query and 5 fetch-ocsp-response is a translation from original fetch-ocsp-response 9 fetch-ocsp-response is usually installed under $(pkgdatadir), which is
|
D | Makefile.am | 25 dist_pkgdata_SCRIPTS = fetch-ocsp-response
|
D | CMakeLists.txt | 3 PROGRAMS fetch-ocsp-response
|
/third_party/node/test/fixtures/x509-escaping/ |
D | create-certs.js | 17 ocsp: [1, 3, 6, 1, 5, 5, 7, 48, 1], property 353 accessMethod: oid.ocsp, 369 accessMethod: oid.ocsp, 387 accessMethod: oid.ocsp, 397 accessMethod: oid.ocsp, 407 accessMethod: oid.ocsp, 419 accessMethod: oid.ocsp,
|
/third_party/nghttp2/doc/bash_completion/ |
D | nghttpx | 11 …ocsp-response-file --no-via --tls-session-cache-memcached-cert-file --no-http2-cipher-black-list -…
|
/third_party/openssl/doc/man3/ |
D | OCSP_sendreq_new.pod | 17 #include <openssl/ocsp.h> 65 OCSP_REQ_CTX_i2d(rctx, "application/ocsp-request", 102 For example if the responder URL is B<http://ocsp.com/ocspreq> the BIO 103 B<io> should be connected to host B<ocsp.com> on port 80 and B<path> 108 a Host header for B<ocsp.com> you would call: 110 OCSP_REQ_CTX_add1_header(ctx, "Host", "ocsp.com");
|
/third_party/openssl/apps/ |
D | build.info | 34 IF[{- !$disabled{'ocsp'} -}] 35 SOURCE[openssl]=ocsp.c 36 DEPEND[ocsp.o]=progs.h
|
/third_party/openssl/doc/man1/ |
D | ocsp.pod | 5 openssl-ocsp, 6 ocsp - Online Certificate Status Protocol utility 10 B<openssl> B<ocsp> 98 The B<ocsp> command performs many common OCSP tasks. It can be used 325 If the B<index> option is specified the B<ocsp> utility is in responder 446 It is possible to run the B<ocsp> application in responder mode via a CGI 453 openssl ocsp -issuer issuer.pem -cert c1.pem -cert c2.pem -reqout req.der 455 Send a query to an OCSP responder with URL http://ocsp.myhost.com/ save the 458 openssl ocsp -issuer issuer.pem -cert c1.pem -cert c2.pem \ 459 -url http://ocsp.myhost.com/ -resp_text -respout resp.der [all …]
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/utils/ |
D | http_curl.c | 61 } ocsp; member 1039 if (depth == 0 && ctx->ocsp != NO_OCSP && preverify_ok) { in curl_cb_ssl_verify() 1050 } else if (res != OCSP_GOOD && (ctx->ocsp == MANDATORY_OCSP)) { in curl_cb_ssl_verify() 1125 if (ctx->ocsp == MANDATORY_OCSP) in ocsp_resp_cb() 1127 return (ctx->ocsp == MANDATORY_OCSP) ? 0 : 1; in ocsp_resp_cb() 1250 (ctx->ocsp == MANDATORY_OCSP) ? "" : in ocsp_resp_cb() 1255 if (ctx->ocsp == MANDATORY_OCSP) in ocsp_resp_cb() 1258 return (ctx->ocsp == MANDATORY_OCSP) ? 0 : 1; in ocsp_resp_cb() 1282 if (ctx->ocsp == MANDATORY_OCSP) { in ocsp_resp_cb() 1324 if (ctx->ocsp != NO_OCSP) { in curl_cb_ssl() [all …]
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/utils/ |
D | http_curl.c | 61 } ocsp; member 1039 if (depth == 0 && ctx->ocsp != NO_OCSP && preverify_ok) { in curl_cb_ssl_verify() 1050 } else if (res != OCSP_GOOD && (ctx->ocsp == MANDATORY_OCSP)) { in curl_cb_ssl_verify() 1125 if (ctx->ocsp == MANDATORY_OCSP) in ocsp_resp_cb() 1127 return (ctx->ocsp == MANDATORY_OCSP) ? 0 : 1; in ocsp_resp_cb() 1250 (ctx->ocsp == MANDATORY_OCSP) ? "" : in ocsp_resp_cb() 1255 if (ctx->ocsp == MANDATORY_OCSP) in ocsp_resp_cb() 1258 return (ctx->ocsp == MANDATORY_OCSP) ? 0 : 1; in ocsp_resp_cb() 1282 if (ctx->ocsp == MANDATORY_OCSP) { in ocsp_resp_cb() 1324 if (ctx->ocsp != NO_OCSP) { in curl_cb_ssl() [all …]
|
/third_party/node/test/fixtures/keys/ |
D | agent1.cnf | 25 OCSP;URI.0 = http://ocsp.nodejs.org/
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_peer/ |
D | eap_config.h | 773 int ocsp; member
|
/third_party/openssl/crypto/err/ |
D | openssl.ec | 27 L OCSP include/openssl/ocsp.h crypto/ocsp/ocsp_err.c
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_peer/ |
D | eap_config.h | 295 int ocsp; member
|
D | eap_tls_common.c | 128 if (config->ocsp) in eap_tls_cert_params_from_conf() 130 if (config->ocsp >= 2) in eap_tls_cert_params_from_conf() 132 if (config->ocsp == 3) in eap_tls_cert_params_from_conf()
|
/third_party/openssl/ |
D | BUILD.gn | 568 "crypto/ocsp/ocsp_asn.c", 569 "crypto/ocsp/ocsp_cl.c", 570 "crypto/ocsp/ocsp_err.c", 571 "crypto/ocsp/ocsp_ext.c", 572 "crypto/ocsp/ocsp_ht.c", 573 "crypto/ocsp/ocsp_lib.c", 574 "crypto/ocsp/ocsp_prn.c", 575 "crypto/ocsp/ocsp_srv.c", 576 "crypto/ocsp/ocsp_vfy.c", 577 "crypto/ocsp/v3_ocsp.c",
|
/third_party/openssl/ssl/statem/ |
D | extensions_srvr.c | 369 sk_OCSP_RESPID_pop_free(s->ext.ocsp.ids, OCSP_RESPID_free); in tls_parse_ctos_status_request() 371 s->ext.ocsp.ids = sk_OCSP_RESPID_new_null(); in tls_parse_ctos_status_request() 372 if (s->ext.ocsp.ids == NULL) { in tls_parse_ctos_status_request() 378 s->ext.ocsp.ids = NULL; in tls_parse_ctos_status_request() 411 if (!sk_OCSP_RESPID_push(s->ext.ocsp.ids, id)) { in tls_parse_ctos_status_request() 430 sk_X509_EXTENSION_pop_free(s->ext.ocsp.exts, in tls_parse_ctos_status_request() 432 s->ext.ocsp.exts = in tls_parse_ctos_status_request() 434 if (s->ext.ocsp.exts == NULL || ext_data != PACKET_end(&exts)) { in tls_parse_ctos_status_request()
|
/third_party/nghttp2/src/ |
D | shrpx_connection_handler.cc | 551 get_config()->tls.ocsp.fetch_ocsp_response_file.c_str()), in start_ocsp_update() 629 if (tlsconf.ocsp.no_verify || in handle_ocsp_complete() 669 ev_timer_set(&ocsp_timer_, get_config()->tls.ocsp.update_interval, 0.); in proceed_next_cert_ocsp()
|
D | shrpx_worker_process.cc | 542 if (tls::upstream_tls_enabled(config->conn) && !config->tls.ocsp.disabled) { in worker_process_event_loop() 543 if (config->tls.ocsp.startup) { in worker_process_event_loop()
|
/third_party/openssl/ssl/ |
D | s3_lib.c | 3516 *(STACK_OF(X509_EXTENSION) **)parg = s->ext.ocsp.exts; in ssl3_ctrl() 3521 s->ext.ocsp.exts = parg; in ssl3_ctrl() 3526 *(STACK_OF(OCSP_RESPID) **)parg = s->ext.ocsp.ids; in ssl3_ctrl() 3531 s->ext.ocsp.ids = parg; in ssl3_ctrl() 3536 *(unsigned char **)parg = s->ext.ocsp.resp; in ssl3_ctrl() 3537 if (s->ext.ocsp.resp_len == 0 in ssl3_ctrl() 3538 || s->ext.ocsp.resp_len > LONG_MAX) in ssl3_ctrl() 3540 return (long)s->ext.ocsp.resp_len; in ssl3_ctrl() 3543 OPENSSL_free(s->ext.ocsp.resp); in ssl3_ctrl() 3544 s->ext.ocsp.resp = parg; in ssl3_ctrl() [all …]
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/wpa_supplicant/ |
D | config_file.c | 765 INTe(ocsp, cert.ocsp); in wpa_config_write_network() 766 INTe(ocsp2, phase2_cert.ocsp); in wpa_config_write_network() 767 INTe(machine_ocsp, machine_cert.ocsp); in wpa_config_write_network() 985 if (cred->ocsp) in wpa_config_write_cred() 986 fprintf(f, "\tocsp=%d\n", cred->ocsp); in wpa_config_write_cred()
|
/third_party/nghttp2/doc/ |
D | nghttpx.h2r | 163 ``fetch-ocsp-response``, which has been originally developed in Perl 169 be customized using :option:`--fetch-ocsp-response-file` option. 174 :option:`--fetch-ocsp-response-file` option provides wide range of 177 interface of ``fetch-ocsp-response`` script, and it must return a 181 for each server to perform OCSP query using ``fetch-ocsp-response``. 184 :option:`--fetch-ocsp-response-file` to fetch it from those stores. 187 beyond the ability of nghttpx itself or ``fetch-ocsp-response``
|