Home
last modified time | relevance | path

Searched refs:ocsp (Results 1 – 25 of 71) sorted by relevance

123

/third_party/node/test/parallel/
Dtest-tls-ocsp-callback.js51 if (!testOptions.ocsp)
72 if (!testOptions.ocsp)
87 requestOCSP: testOptions.ocsp,
88 secureOptions: testOptions.ocsp ? 0 : SSL_OP_NO_TICKET,
99 }, testOptions.ocsp === false ? 0 : 1));
107 test({ ocsp: true, response: false }); property
108 test({ ocsp: true, response: 'hello world' }); property
109 test({ ocsp: false }); property
112 test({ ocsp: true, response: 'hello pfx', pfx: pfx, passphrase: 'sample' }); property
/third_party/openssl/demos/certs/
Docspquery.sh11 $OPENSSL ocsp -issuer intca.pem -cert client.pem -CAfile root.pem \
13 $OPENSSL ocsp -issuer intca.pem -cert server.pem -CAfile root.pem \
15 $OPENSSL ocsp -issuer intca.pem -cert rev.pem -CAfile root.pem \
19 $OPENSSL ocsp -issuer intca.pem \
Docsprun.sh13 $OPENSSL ocsp -port $PORT -index index.txt -CA intca.pem \
/third_party/nghttp2/script/
DREADME.rst1 fetch-ocsp-response is a Python script which performs OCSP query and
5 fetch-ocsp-response is a translation from original fetch-ocsp-response
9 fetch-ocsp-response is usually installed under $(pkgdatadir), which is
DMakefile.am25 dist_pkgdata_SCRIPTS = fetch-ocsp-response
DCMakeLists.txt3 PROGRAMS fetch-ocsp-response
/third_party/node/test/fixtures/x509-escaping/
Dcreate-certs.js17 ocsp: [1, 3, 6, 1, 5, 5, 7, 48, 1], property
353 accessMethod: oid.ocsp,
369 accessMethod: oid.ocsp,
387 accessMethod: oid.ocsp,
397 accessMethod: oid.ocsp,
407 accessMethod: oid.ocsp,
419 accessMethod: oid.ocsp,
/third_party/nghttp2/doc/bash_completion/
Dnghttpx11ocsp-response-file --no-via --tls-session-cache-memcached-cert-file --no-http2-cipher-black-list -…
/third_party/openssl/doc/man3/
DOCSP_sendreq_new.pod17 #include <openssl/ocsp.h>
65 OCSP_REQ_CTX_i2d(rctx, "application/ocsp-request",
102 For example if the responder URL is B<http://ocsp.com/ocspreq> the BIO
103 B<io> should be connected to host B<ocsp.com> on port 80 and B<path>
108 a Host header for B<ocsp.com> you would call:
110 OCSP_REQ_CTX_add1_header(ctx, "Host", "ocsp.com");
/third_party/openssl/apps/
Dbuild.info34 IF[{- !$disabled{'ocsp'} -}]
35 SOURCE[openssl]=ocsp.c
36 DEPEND[ocsp.o]=progs.h
/third_party/openssl/doc/man1/
Docsp.pod5 openssl-ocsp,
6 ocsp - Online Certificate Status Protocol utility
10 B<openssl> B<ocsp>
98 The B<ocsp> command performs many common OCSP tasks. It can be used
325 If the B<index> option is specified the B<ocsp> utility is in responder
446 It is possible to run the B<ocsp> application in responder mode via a CGI
453 openssl ocsp -issuer issuer.pem -cert c1.pem -cert c2.pem -reqout req.der
455 Send a query to an OCSP responder with URL http://ocsp.myhost.com/ save the
458 openssl ocsp -issuer issuer.pem -cert c1.pem -cert c2.pem \
459 -url http://ocsp.myhost.com/ -resp_text -respout resp.der
[all …]
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/utils/
Dhttp_curl.c61 } ocsp; member
1039 if (depth == 0 && ctx->ocsp != NO_OCSP && preverify_ok) { in curl_cb_ssl_verify()
1050 } else if (res != OCSP_GOOD && (ctx->ocsp == MANDATORY_OCSP)) { in curl_cb_ssl_verify()
1125 if (ctx->ocsp == MANDATORY_OCSP) in ocsp_resp_cb()
1127 return (ctx->ocsp == MANDATORY_OCSP) ? 0 : 1; in ocsp_resp_cb()
1250 (ctx->ocsp == MANDATORY_OCSP) ? "" : in ocsp_resp_cb()
1255 if (ctx->ocsp == MANDATORY_OCSP) in ocsp_resp_cb()
1258 return (ctx->ocsp == MANDATORY_OCSP) ? 0 : 1; in ocsp_resp_cb()
1282 if (ctx->ocsp == MANDATORY_OCSP) { in ocsp_resp_cb()
1324 if (ctx->ocsp != NO_OCSP) { in curl_cb_ssl()
[all …]
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/utils/
Dhttp_curl.c61 } ocsp; member
1039 if (depth == 0 && ctx->ocsp != NO_OCSP && preverify_ok) { in curl_cb_ssl_verify()
1050 } else if (res != OCSP_GOOD && (ctx->ocsp == MANDATORY_OCSP)) { in curl_cb_ssl_verify()
1125 if (ctx->ocsp == MANDATORY_OCSP) in ocsp_resp_cb()
1127 return (ctx->ocsp == MANDATORY_OCSP) ? 0 : 1; in ocsp_resp_cb()
1250 (ctx->ocsp == MANDATORY_OCSP) ? "" : in ocsp_resp_cb()
1255 if (ctx->ocsp == MANDATORY_OCSP) in ocsp_resp_cb()
1258 return (ctx->ocsp == MANDATORY_OCSP) ? 0 : 1; in ocsp_resp_cb()
1282 if (ctx->ocsp == MANDATORY_OCSP) { in ocsp_resp_cb()
1324 if (ctx->ocsp != NO_OCSP) { in curl_cb_ssl()
[all …]
/third_party/node/test/fixtures/keys/
Dagent1.cnf25 OCSP;URI.0 = http://ocsp.nodejs.org/
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_peer/
Deap_config.h773 int ocsp; member
/third_party/openssl/crypto/err/
Dopenssl.ec27 L OCSP include/openssl/ocsp.h crypto/ocsp/ocsp_err.c
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_peer/
Deap_config.h295 int ocsp; member
Deap_tls_common.c128 if (config->ocsp) in eap_tls_cert_params_from_conf()
130 if (config->ocsp >= 2) in eap_tls_cert_params_from_conf()
132 if (config->ocsp == 3) in eap_tls_cert_params_from_conf()
/third_party/openssl/
DBUILD.gn568 "crypto/ocsp/ocsp_asn.c",
569 "crypto/ocsp/ocsp_cl.c",
570 "crypto/ocsp/ocsp_err.c",
571 "crypto/ocsp/ocsp_ext.c",
572 "crypto/ocsp/ocsp_ht.c",
573 "crypto/ocsp/ocsp_lib.c",
574 "crypto/ocsp/ocsp_prn.c",
575 "crypto/ocsp/ocsp_srv.c",
576 "crypto/ocsp/ocsp_vfy.c",
577 "crypto/ocsp/v3_ocsp.c",
/third_party/openssl/ssl/statem/
Dextensions_srvr.c369 sk_OCSP_RESPID_pop_free(s->ext.ocsp.ids, OCSP_RESPID_free); in tls_parse_ctos_status_request()
371 s->ext.ocsp.ids = sk_OCSP_RESPID_new_null(); in tls_parse_ctos_status_request()
372 if (s->ext.ocsp.ids == NULL) { in tls_parse_ctos_status_request()
378 s->ext.ocsp.ids = NULL; in tls_parse_ctos_status_request()
411 if (!sk_OCSP_RESPID_push(s->ext.ocsp.ids, id)) { in tls_parse_ctos_status_request()
430 sk_X509_EXTENSION_pop_free(s->ext.ocsp.exts, in tls_parse_ctos_status_request()
432 s->ext.ocsp.exts = in tls_parse_ctos_status_request()
434 if (s->ext.ocsp.exts == NULL || ext_data != PACKET_end(&exts)) { in tls_parse_ctos_status_request()
/third_party/nghttp2/src/
Dshrpx_connection_handler.cc551 get_config()->tls.ocsp.fetch_ocsp_response_file.c_str()), in start_ocsp_update()
629 if (tlsconf.ocsp.no_verify || in handle_ocsp_complete()
669 ev_timer_set(&ocsp_timer_, get_config()->tls.ocsp.update_interval, 0.); in proceed_next_cert_ocsp()
Dshrpx_worker_process.cc542 if (tls::upstream_tls_enabled(config->conn) && !config->tls.ocsp.disabled) { in worker_process_event_loop()
543 if (config->tls.ocsp.startup) { in worker_process_event_loop()
/third_party/openssl/ssl/
Ds3_lib.c3516 *(STACK_OF(X509_EXTENSION) **)parg = s->ext.ocsp.exts; in ssl3_ctrl()
3521 s->ext.ocsp.exts = parg; in ssl3_ctrl()
3526 *(STACK_OF(OCSP_RESPID) **)parg = s->ext.ocsp.ids; in ssl3_ctrl()
3531 s->ext.ocsp.ids = parg; in ssl3_ctrl()
3536 *(unsigned char **)parg = s->ext.ocsp.resp; in ssl3_ctrl()
3537 if (s->ext.ocsp.resp_len == 0 in ssl3_ctrl()
3538 || s->ext.ocsp.resp_len > LONG_MAX) in ssl3_ctrl()
3540 return (long)s->ext.ocsp.resp_len; in ssl3_ctrl()
3543 OPENSSL_free(s->ext.ocsp.resp); in ssl3_ctrl()
3544 s->ext.ocsp.resp = parg; in ssl3_ctrl()
[all …]
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/wpa_supplicant/
Dconfig_file.c765 INTe(ocsp, cert.ocsp); in wpa_config_write_network()
766 INTe(ocsp2, phase2_cert.ocsp); in wpa_config_write_network()
767 INTe(machine_ocsp, machine_cert.ocsp); in wpa_config_write_network()
985 if (cred->ocsp) in wpa_config_write_cred()
986 fprintf(f, "\tocsp=%d\n", cred->ocsp); in wpa_config_write_cred()
/third_party/nghttp2/doc/
Dnghttpx.h2r163 ``fetch-ocsp-response``, which has been originally developed in Perl
169 be customized using :option:`--fetch-ocsp-response-file` option.
174 :option:`--fetch-ocsp-response-file` option provides wide range of
177 interface of ``fetch-ocsp-response`` script, and it must return a
181 for each server to perform OCSP query using ``fetch-ocsp-response``.
184 :option:`--fetch-ocsp-response-file` to fetch it from those stores.
187 beyond the ability of nghttpx itself or ``fetch-ocsp-response``

123