Searched refs:OCSP (Results 1 – 25 of 86) sorted by relevance
1234
/third_party/openssl/doc/man1/ |
D | openssl-ocsp.pod.in | 10 =head2 OCSP Client 53 =head2 OCSP Server 79 The Online Certificate Status Protocol (OCSP) enables applications to 82 This command performs many common OCSP tasks. It can be used 84 to an OCSP responder and behave like a mini OCSP server itself. 91 =head2 OCSP Client Options 128 Sign the OCSP request using the certificate specified in the B<-signer> 132 the OCSP request is not signed. 141 Add an OCSP nonce extension to a request or disable OCSP nonce addition. 142 Normally if an OCSP request is input using the B<-reqin> option no [all …]
|
/third_party/openssl/doc/man3/ |
D | SSL_CTX_set_tlsext_status_cb.pod | 15 - OCSP Certificate Status Request functions 38 A client application may request that a server send back an OCSP status response 39 (also known as OCSP stapling). To do so the client should call the 49 with the returned OCSP response by calling SSL_CTX_set_tlsext_status_cb(). The 50 callback function should determine whether the returned OCSP response is 63 requested OCSP stapling. If the client requested it then this function will 68 to the OCSP response data and the return value will be the length of that data. 75 if it wants to be able to provide clients with OCSP Certificate Status 78 obtain the OCSP response to be sent back; and then set that response data by 90 SSL_TLSEXT_ERR_OK (meaning that the OCSP response that has been set should be [all …]
|
D | OCSP_request_add1_nonce.pod | 5 OCSP_request_add1_nonce, OCSP_basic_add1_nonce, OCSP_check_nonce, OCSP_copy_nonce - OCSP nonce func… 19 OCSP request B<req>. If B<val> is B<NULL> a random nonce is used. If B<len> 23 it adds a nonce to OCSP basic response B<resp>. 49 An OCSP nonce is typically added to an OCSP request to thwart replay attacks 55 Some responders cache OCSP responses and do not sign each response for
|
D | OCSP_response_status.pod | 9 - OCSP response functions 36 OCSP_response_status() returns the OCSP response status of I<resp>. It returns 48 OCSP_RESPONSE_free() frees up OCSP response I<resp>. 51 subject name in the supplied X509 certificate I<cert> for the OCSP responder. 54 key in the supplied X509 certificate I<cert> for the OCSP responder. The key is 75 OCSP_basic_sign() signs OCSP response I<brsp> using certificate I<signer>, private key 79 rather than by name. OCSP_basic_sign_ctx() also signs OCSP response I<brsp> but
|
D | OCSP_REQUEST_new.pod | 7 OCSP_request_onereq_get0 - OCSP request functions 38 OCSP_request_sign() signs OCSP request B<req> using certificate 72 An OCSP request structure contains one or more B<OCSP_ONEREQ> structures 76 OCSP responders.
|
D | X509V3_get_d2i.pod | 184 =head2 OCSP Extensions 186 OCSP Nonce NID_id_pkix_OCSP_Nonce 187 OCSP CRL ID NID_id_pkix_OCSP_CrlID 188 Acceptable OCSP Responses NID_id_pkix_OCSP_acceptableResponses 189 OCSP No Check NID_id_pkix_OCSP_noCheck 190 OCSP Archive Cutoff NID_id_pkix_OCSP_archiveCutoff 191 OCSP Service Locator NID_id_pkix_OCSP_serviceLocator
|
D | OCSP_resp_find_status.pod | 12 - OCSP response utility functions 59 OCSP_resp_find_status() searches I<bs> for an OCSP response for I<id>. If it is 95 signed I<bs>. The OCSP protocol does not require that this certificate 138 Otherwise it verifies that the signer certificate meets the OCSP issuer 141 trust for OCSP signing in the root CA certificate. 188 An OCSP response for a certificate contains B<thisUpdate> and B<nextUpdate>
|
D | OCSP_sendreq_new.pod | 14 - OCSP responder query functions 39 These functions perform an OCSP POST request / response transfer over HTTP, 44 optionally the OCSP request I<req>, and a response header maximum line length
|
D | SSL_get_certificate.pod | 47 example for the purpose of identifying a certificate's OCSP responder URL so 48 that an OCSP response can be obtained.
|
D | OCSP_cert_to_id.pod | 6 OCSP_id_cmp, OCSP_id_get0_info - OCSP certificate ID utility functions 64 OCSP clients will typically only use OCSP_cert_to_id() or OCSP_cert_id_new():
|
D | X509_STORE_CTX_get_error.pod | 428 =item B<X509_V_ERR_OCSP_VERIFY_NEEDED: OCSP verification needed> 430 Returned by the verify callback to indicate an OCSP verification is needed. 432 =item B<X509_V_ERR_OCSP_VERIFY_FAILED: OCSP verification failed> 434 Returned by the verify callback to indicate OCSP verification failed. 436 =item B<X509_V_ERR_OCSP_CERT_UNKNOWN: OCSP unknown cert> 439 recognized by the OCSP responder.
|
/third_party/node/deps/openssl/openssl/util/ |
D | libcrypto.num | 48 i2d_OCSP_RESPONSE 50 3_0_0 EXIST::FUNCTION:OCSP 56 OCSP_crl_reason_str 58 3_0_0 EXIST::FUNCTION:OCSP 67 OCSP_basic_sign 69 3_0_0 EXIST::FUNCTION:OCSP 87 d2i_OCSP_RESPBYTES 89 3_0_0 EXIST::FUNCTION:OCSP 90 OCSP_archive_cutoff_new 92 3_0_0 EXIST::FUNCTION:OCSP 109 OCSP_CERTID_dup 111 3_0_0 EXIST::FUNCTION:OCSP 120 OCSP_BASICRESP_add1_ext_i2d 122 3_0_0 EXIST::FUNCTION:OCSP 131 OCSP_basic_add1_nonce 133 3_0_0 EXIST::FUNCTION:OCSP 132 d2i_OCSP_BASICRESP 134 3_0_0 EXIST::FUNCTION:OCSP 178 OCSP_response_status 182 3_0_0 EXIST::FUNCTION:OCSP [all …]
|
/third_party/openssl/util/ |
D | libcrypto.num | 48 i2d_OCSP_RESPONSE 50 3_0_0 EXIST::FUNCTION:OCSP 56 OCSP_crl_reason_str 58 3_0_0 EXIST::FUNCTION:OCSP 67 OCSP_basic_sign 69 3_0_0 EXIST::FUNCTION:OCSP 87 d2i_OCSP_RESPBYTES 89 3_0_0 EXIST::FUNCTION:OCSP 90 OCSP_archive_cutoff_new 92 3_0_0 EXIST::FUNCTION:OCSP 109 OCSP_CERTID_dup 111 3_0_0 EXIST::FUNCTION:OCSP 120 OCSP_BASICRESP_add1_ext_i2d 122 3_0_0 EXIST::FUNCTION:OCSP 131 OCSP_basic_add1_nonce 133 3_0_0 EXIST::FUNCTION:OCSP 132 d2i_OCSP_BASICRESP 134 3_0_0 EXIST::FUNCTION:OCSP 178 OCSP_response_status 182 3_0_0 EXIST::FUNCTION:OCSP [all …]
|
/third_party/curl/docs/libcurl/opts/ |
D | CURLOPT_SSL_VERIFYSTATUS.md | 30 using the "Certificate Status Request" TLS extension (aka. OCSP stapling). 52 /* ask for OCSP stapling! */ 67 Returns CURLE_OK if OCSP stapling is supported by the SSL backend, otherwise
|
D | CURLOPT_DOH_SSL_VERIFYSTATUS.md | 32 extension (aka. OCSP stapling). 60 /* Ask for OCSP stapling when verifying the DoH server */ 75 Returns CURLE_OK if OCSP stapling is supported by the SSL backend, otherwise
|
/third_party/nghttp2/script/ |
D | README.rst | 1 fetch-ocsp-response is a Python script which performs OCSP query and 3 it to enable OCSP stapling feature.
|
/third_party/curl/docs/cmdline-opts/ |
D | cert-status.md | 7 Help: Verify the status of the server cert via OCSP-staple 19 Certificate Status Request (aka. OCSP stapling) TLS extension.
|
D | doh-cert-status.md | 5 Help: Verify the status of the DoH server cert via OCSP-staple
|
/third_party/openssl/crypto/objects/ |
D | objects.txt | 536 # From OCSP spec RFC2560 537 !Cname OCSP-sign 538 id-kp 9 : OCSPSigning : OCSP Signing 669 !Cname ad-OCSP 670 id-ad 1 : OCSP : OCSP 682 !Alias id-pkix-OCSP ad-OCSP 683 !module id-pkix-OCSP 685 id-pkix-OCSP 1 : basicOCSPResponse : Basic OCSP Response 686 id-pkix-OCSP 2 : Nonce : OCSP Nonce 687 id-pkix-OCSP 3 : CrlID : OCSP CRL ID [all …]
|
/third_party/node/deps/openssl/openssl/crypto/objects/ |
D | objects.txt | 536 # From OCSP spec RFC2560 537 !Cname OCSP-sign 538 id-kp 9 : OCSPSigning : OCSP Signing 669 !Cname ad-OCSP 670 id-ad 1 : OCSP : OCSP 682 !Alias id-pkix-OCSP ad-OCSP 683 !module id-pkix-OCSP 685 id-pkix-OCSP 1 : basicOCSPResponse : Basic OCSP Response 686 id-pkix-OCSP 2 : Nonce : OCSP Nonce 687 id-pkix-OCSP 3 : CrlID : OCSP CRL ID [all …]
|
/third_party/node/test/fixtures/keys/ |
D | agent1.cnf | 25 OCSP;URI.0 = http://ocsp.nodejs.org/
|
/third_party/nghttp2/doc/ |
D | nghttpx.h2r | 159 OCSP STAPLING 162 OCSP query is done using external Python script 171 If OCSP query is failed, previous OCSP response, if any, is continued 175 possibility to manage OCSP response. It can take an arbitrary script 178 valid DER encoded OCSP response on success. It must return exit code 181 for each server to perform OCSP query using ``fetch-ocsp-response``. 182 Instead, you can retrieve OCSP response in some way, and store it in a 185 This could provide a way to share the OCSP response between fleet of 186 servers, and also any OCSP query strategy can be applied which may be
|
/third_party/node/deps/openssl/openssl/crypto/err/ |
D | err_all_legacy.c | 92 IMPLEMENT_LEGACY_ERR_LOAD(OCSP)
|
/third_party/openssl/crypto/err/ |
D | err_all_legacy.c | 92 IMPLEMENT_LEGACY_ERR_LOAD(OCSP)
|
/third_party/openssl/doc/man5/ |
D | x509v3_config.pod | 156 OCSPSigning OCSP Signing 296 Possible values for access_id include B<OCSP> (OCSP responder), 304 …authorityInfoAccess = OCSP;URI:http://ocsp.example.com/,caIssuers;URI:http://myca.example.com/ca.c… 306 authorityInfoAccess = OCSP;URI:http://ocsp.example.com/ 499 =head2 OCSP No Check
|
1234