Home
last modified time | relevance | path

Searched refs:OCSP (Results 1 – 25 of 86) sorted by relevance

1234

/third_party/openssl/doc/man1/
Dopenssl-ocsp.pod.in10 =head2 OCSP Client
53 =head2 OCSP Server
79 The Online Certificate Status Protocol (OCSP) enables applications to
82 This command performs many common OCSP tasks. It can be used
84 to an OCSP responder and behave like a mini OCSP server itself.
91 =head2 OCSP Client Options
128 Sign the OCSP request using the certificate specified in the B<-signer>
132 the OCSP request is not signed.
141 Add an OCSP nonce extension to a request or disable OCSP nonce addition.
142 Normally if an OCSP request is input using the B<-reqin> option no
[all …]
/third_party/openssl/doc/man3/
DSSL_CTX_set_tlsext_status_cb.pod15 - OCSP Certificate Status Request functions
38 A client application may request that a server send back an OCSP status response
39 (also known as OCSP stapling). To do so the client should call the
49 with the returned OCSP response by calling SSL_CTX_set_tlsext_status_cb(). The
50 callback function should determine whether the returned OCSP response is
63 requested OCSP stapling. If the client requested it then this function will
68 to the OCSP response data and the return value will be the length of that data.
75 if it wants to be able to provide clients with OCSP Certificate Status
78 obtain the OCSP response to be sent back; and then set that response data by
90 SSL_TLSEXT_ERR_OK (meaning that the OCSP response that has been set should be
[all …]
DOCSP_request_add1_nonce.pod5 OCSP_request_add1_nonce, OCSP_basic_add1_nonce, OCSP_check_nonce, OCSP_copy_nonce - OCSP nonce func…
19 OCSP request B<req>. If B<val> is B<NULL> a random nonce is used. If B<len>
23 it adds a nonce to OCSP basic response B<resp>.
49 An OCSP nonce is typically added to an OCSP request to thwart replay attacks
55 Some responders cache OCSP responses and do not sign each response for
DOCSP_response_status.pod9 - OCSP response functions
36 OCSP_response_status() returns the OCSP response status of I<resp>. It returns
48 OCSP_RESPONSE_free() frees up OCSP response I<resp>.
51 subject name in the supplied X509 certificate I<cert> for the OCSP responder.
54 key in the supplied X509 certificate I<cert> for the OCSP responder. The key is
75 OCSP_basic_sign() signs OCSP response I<brsp> using certificate I<signer>, private key
79 rather than by name. OCSP_basic_sign_ctx() also signs OCSP response I<brsp> but
DOCSP_REQUEST_new.pod7 OCSP_request_onereq_get0 - OCSP request functions
38 OCSP_request_sign() signs OCSP request B<req> using certificate
72 An OCSP request structure contains one or more B<OCSP_ONEREQ> structures
76 OCSP responders.
DX509V3_get_d2i.pod184 =head2 OCSP Extensions
186 OCSP Nonce NID_id_pkix_OCSP_Nonce
187 OCSP CRL ID NID_id_pkix_OCSP_CrlID
188 Acceptable OCSP Responses NID_id_pkix_OCSP_acceptableResponses
189 OCSP No Check NID_id_pkix_OCSP_noCheck
190 OCSP Archive Cutoff NID_id_pkix_OCSP_archiveCutoff
191 OCSP Service Locator NID_id_pkix_OCSP_serviceLocator
DOCSP_resp_find_status.pod12 - OCSP response utility functions
59 OCSP_resp_find_status() searches I<bs> for an OCSP response for I<id>. If it is
95 signed I<bs>. The OCSP protocol does not require that this certificate
138 Otherwise it verifies that the signer certificate meets the OCSP issuer
141 trust for OCSP signing in the root CA certificate.
188 An OCSP response for a certificate contains B<thisUpdate> and B<nextUpdate>
DOCSP_sendreq_new.pod14 - OCSP responder query functions
39 These functions perform an OCSP POST request / response transfer over HTTP,
44 optionally the OCSP request I<req>, and a response header maximum line length
DSSL_get_certificate.pod47 example for the purpose of identifying a certificate's OCSP responder URL so
48 that an OCSP response can be obtained.
DOCSP_cert_to_id.pod6 OCSP_id_cmp, OCSP_id_get0_info - OCSP certificate ID utility functions
64 OCSP clients will typically only use OCSP_cert_to_id() or OCSP_cert_id_new():
DX509_STORE_CTX_get_error.pod428 =item B<X509_V_ERR_OCSP_VERIFY_NEEDED: OCSP verification needed>
430 Returned by the verify callback to indicate an OCSP verification is needed.
432 =item B<X509_V_ERR_OCSP_VERIFY_FAILED: OCSP verification failed>
434 Returned by the verify callback to indicate OCSP verification failed.
436 =item B<X509_V_ERR_OCSP_CERT_UNKNOWN: OCSP unknown cert>
439 recognized by the OCSP responder.
/third_party/node/deps/openssl/openssl/util/
Dlibcrypto.num48 i2d_OCSP_RESPONSE 50 3_0_0 EXIST::FUNCTION:OCSP
56 OCSP_crl_reason_str 58 3_0_0 EXIST::FUNCTION:OCSP
67 OCSP_basic_sign 69 3_0_0 EXIST::FUNCTION:OCSP
87 d2i_OCSP_RESPBYTES 89 3_0_0 EXIST::FUNCTION:OCSP
90 OCSP_archive_cutoff_new 92 3_0_0 EXIST::FUNCTION:OCSP
109 OCSP_CERTID_dup 111 3_0_0 EXIST::FUNCTION:OCSP
120 OCSP_BASICRESP_add1_ext_i2d 122 3_0_0 EXIST::FUNCTION:OCSP
131 OCSP_basic_add1_nonce 133 3_0_0 EXIST::FUNCTION:OCSP
132 d2i_OCSP_BASICRESP 134 3_0_0 EXIST::FUNCTION:OCSP
178 OCSP_response_status 182 3_0_0 EXIST::FUNCTION:OCSP
[all …]
/third_party/openssl/util/
Dlibcrypto.num48 i2d_OCSP_RESPONSE 50 3_0_0 EXIST::FUNCTION:OCSP
56 OCSP_crl_reason_str 58 3_0_0 EXIST::FUNCTION:OCSP
67 OCSP_basic_sign 69 3_0_0 EXIST::FUNCTION:OCSP
87 d2i_OCSP_RESPBYTES 89 3_0_0 EXIST::FUNCTION:OCSP
90 OCSP_archive_cutoff_new 92 3_0_0 EXIST::FUNCTION:OCSP
109 OCSP_CERTID_dup 111 3_0_0 EXIST::FUNCTION:OCSP
120 OCSP_BASICRESP_add1_ext_i2d 122 3_0_0 EXIST::FUNCTION:OCSP
131 OCSP_basic_add1_nonce 133 3_0_0 EXIST::FUNCTION:OCSP
132 d2i_OCSP_BASICRESP 134 3_0_0 EXIST::FUNCTION:OCSP
178 OCSP_response_status 182 3_0_0 EXIST::FUNCTION:OCSP
[all …]
/third_party/curl/docs/libcurl/opts/
DCURLOPT_SSL_VERIFYSTATUS.md30 using the "Certificate Status Request" TLS extension (aka. OCSP stapling).
52 /* ask for OCSP stapling! */
67 Returns CURLE_OK if OCSP stapling is supported by the SSL backend, otherwise
DCURLOPT_DOH_SSL_VERIFYSTATUS.md32 extension (aka. OCSP stapling).
60 /* Ask for OCSP stapling when verifying the DoH server */
75 Returns CURLE_OK if OCSP stapling is supported by the SSL backend, otherwise
/third_party/nghttp2/script/
DREADME.rst1 fetch-ocsp-response is a Python script which performs OCSP query and
3 it to enable OCSP stapling feature.
/third_party/curl/docs/cmdline-opts/
Dcert-status.md7 Help: Verify the status of the server cert via OCSP-staple
19 Certificate Status Request (aka. OCSP stapling) TLS extension.
Ddoh-cert-status.md5 Help: Verify the status of the DoH server cert via OCSP-staple
/third_party/openssl/crypto/objects/
Dobjects.txt536 # From OCSP spec RFC2560
537 !Cname OCSP-sign
538 id-kp 9 : OCSPSigning : OCSP Signing
669 !Cname ad-OCSP
670 id-ad 1 : OCSP : OCSP
682 !Alias id-pkix-OCSP ad-OCSP
683 !module id-pkix-OCSP
685 id-pkix-OCSP 1 : basicOCSPResponse : Basic OCSP Response
686 id-pkix-OCSP 2 : Nonce : OCSP Nonce
687 id-pkix-OCSP 3 : CrlID : OCSP CRL ID
[all …]
/third_party/node/deps/openssl/openssl/crypto/objects/
Dobjects.txt536 # From OCSP spec RFC2560
537 !Cname OCSP-sign
538 id-kp 9 : OCSPSigning : OCSP Signing
669 !Cname ad-OCSP
670 id-ad 1 : OCSP : OCSP
682 !Alias id-pkix-OCSP ad-OCSP
683 !module id-pkix-OCSP
685 id-pkix-OCSP 1 : basicOCSPResponse : Basic OCSP Response
686 id-pkix-OCSP 2 : Nonce : OCSP Nonce
687 id-pkix-OCSP 3 : CrlID : OCSP CRL ID
[all …]
/third_party/node/test/fixtures/keys/
Dagent1.cnf25 OCSP;URI.0 = http://ocsp.nodejs.org/
/third_party/nghttp2/doc/
Dnghttpx.h2r159 OCSP STAPLING
162 OCSP query is done using external Python script
171 If OCSP query is failed, previous OCSP response, if any, is continued
175 possibility to manage OCSP response. It can take an arbitrary script
178 valid DER encoded OCSP response on success. It must return exit code
181 for each server to perform OCSP query using ``fetch-ocsp-response``.
182 Instead, you can retrieve OCSP response in some way, and store it in a
185 This could provide a way to share the OCSP response between fleet of
186 servers, and also any OCSP query strategy can be applied which may be
/third_party/node/deps/openssl/openssl/crypto/err/
Derr_all_legacy.c92 IMPLEMENT_LEGACY_ERR_LOAD(OCSP)
/third_party/openssl/crypto/err/
Derr_all_legacy.c92 IMPLEMENT_LEGACY_ERR_LOAD(OCSP)
/third_party/openssl/doc/man5/
Dx509v3_config.pod156 OCSPSigning OCSP Signing
296 Possible values for access_id include B<OCSP> (OCSP responder),
304 …authorityInfoAccess = OCSP;URI:http://ocsp.example.com/,caIssuers;URI:http://myca.example.com/ca.c…
306 authorityInfoAccess = OCSP;URI:http://ocsp.example.com/
499 =head2 OCSP No Check

1234