/third_party/node/test/parallel/ |
D | test-tls-ocsp-callback.js | 51 if (!testOptions.ocsp) 72 if (!testOptions.ocsp) 87 requestOCSP: testOptions.ocsp, 88 secureOptions: testOptions.ocsp ? 0 : SSL_OP_NO_TICKET, 99 }, testOptions.ocsp === false ? 0 : 1)); 107 test({ ocsp: true, response: false }); property 108 test({ ocsp: true, response: 'hello world' }); property 109 test({ ocsp: false }); property 112 test({ ocsp: true, response: 'hello pfx', pfx: pfx, passphrase: 'sample' }); property
|
/third_party/openssl/demos/certs/ |
D | ocspquery.sh | 11 $OPENSSL ocsp -issuer intca.pem -cert client.pem -CAfile root.pem \ 13 $OPENSSL ocsp -issuer intca.pem -cert server.pem -CAfile root.pem \ 15 $OPENSSL ocsp -issuer intca.pem -cert rev.pem -CAfile root.pem \ 19 $OPENSSL ocsp -issuer intca.pem \
|
D | ocsprun.sh | 13 $OPENSSL ocsp -port $PORT -index index.txt -CA intca.pem \
|
/third_party/nghttp2/script/ |
D | README.rst | 1 fetch-ocsp-response is a Python script which performs OCSP query and 5 fetch-ocsp-response is a translation from original fetch-ocsp-response 9 fetch-ocsp-response is usually installed under $(pkgdatadir), which is
|
D | Makefile.am | 25 dist_pkgdata_SCRIPTS = fetch-ocsp-response
|
D | CMakeLists.txt | 3 PROGRAMS fetch-ocsp-response
|
/third_party/node/test/fixtures/x509-escaping/ |
D | create-certs.js | 17 ocsp: [1, 3, 6, 1, 5, 5, 7, 48, 1], property 353 accessMethod: oid.ocsp, 369 accessMethod: oid.ocsp, 387 accessMethod: oid.ocsp, 397 accessMethod: oid.ocsp, 407 accessMethod: oid.ocsp, 419 accessMethod: oid.ocsp,
|
/third_party/nghttp2/doc/bash_completion/ |
D | nghttpx | 11 …memcached-private-key-file --fetch-ocsp-response-file --ocsp-update-interval --ocsp-startup --no-v…
|
/third_party/rust/crates/rust-openssl/openssl-sys/src/handwritten/ |
D | mod.rs | 17 pub use self::ocsp::*; 53 mod ocsp; module
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/utils/ |
D | http_curl.c | 61 } ocsp; member 1039 if (depth == 0 && ctx->ocsp != NO_OCSP && preverify_ok) { in curl_cb_ssl_verify() 1050 } else if (res != OCSP_GOOD && (ctx->ocsp == MANDATORY_OCSP)) { in curl_cb_ssl_verify() 1125 if (ctx->ocsp == MANDATORY_OCSP) in ocsp_resp_cb() 1127 return (ctx->ocsp == MANDATORY_OCSP) ? 0 : 1; in ocsp_resp_cb() 1250 (ctx->ocsp == MANDATORY_OCSP) ? "" : in ocsp_resp_cb() 1255 if (ctx->ocsp == MANDATORY_OCSP) in ocsp_resp_cb() 1258 return (ctx->ocsp == MANDATORY_OCSP) ? 0 : 1; in ocsp_resp_cb() 1282 if (ctx->ocsp == MANDATORY_OCSP) { in ocsp_resp_cb() 1324 if (ctx->ocsp != NO_OCSP) { in curl_cb_ssl() [all …]
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/utils/ |
D | http_curl.c | 61 } ocsp; member 1039 if (depth == 0 && ctx->ocsp != NO_OCSP && preverify_ok) { in curl_cb_ssl_verify() 1050 } else if (res != OCSP_GOOD && (ctx->ocsp == MANDATORY_OCSP)) { in curl_cb_ssl_verify() 1125 if (ctx->ocsp == MANDATORY_OCSP) in ocsp_resp_cb() 1127 return (ctx->ocsp == MANDATORY_OCSP) ? 0 : 1; in ocsp_resp_cb() 1250 (ctx->ocsp == MANDATORY_OCSP) ? "" : in ocsp_resp_cb() 1255 if (ctx->ocsp == MANDATORY_OCSP) in ocsp_resp_cb() 1258 return (ctx->ocsp == MANDATORY_OCSP) ? 0 : 1; in ocsp_resp_cb() 1282 if (ctx->ocsp == MANDATORY_OCSP) { in ocsp_resp_cb() 1324 if (ctx->ocsp != NO_OCSP) { in curl_cb_ssl() [all …]
|
/third_party/openssl/doc/man1/ |
D | openssl-ocsp.pod.in | 6 openssl-ocsp - Online Certificate Status Protocol command 12 B<openssl> B<ocsp> 55 B<openssl> B<ocsp> 470 openssl ocsp -issuer issuer.pem -cert c1.pem -cert c2.pem -reqout req.der 472 Send a query to an OCSP responder with URL http://ocsp.myhost.com/ save the 475 openssl ocsp -issuer issuer.pem -cert c1.pem -cert c2.pem \ 476 -url http://ocsp.myhost.com/ -resp_text -respout resp.der 480 openssl ocsp -respin resp.der -text -noverify 485 openssl ocsp -index demoCA/index.txt -port 8888 -rsigner rcert.pem -CA demoCA/cacert.pem 490 openssl ocsp -index demoCA/index.txt -port 8888 -rsigner rcert.pem -CA demoCA/cacert.pem [all …]
|
D | openssl-cmds.pod.in | 31 ocsp, 112 L<openssl-ocsp(1)>,
|
/third_party/openssl/doc/man3/ |
D | OCSP_sendreq_new.pod | 18 #include <openssl/ocsp.h> 71 OSSL_HTTP_REQ_CTX_set1_req(rctx, "application/ocsp-request", it, req) 75 OSSL_HTTP_REQ_CTX_set1_req(rctx, "application/ocsp-request",
|
/third_party/node/deps/openssl/openssl/ |
D | build.info | 33 include/openssl/ocsp.h \ 62 GENERATE[include/openssl/ocsp.h]=include/openssl/ocsp.h.in
|
/third_party/openssl/ |
D | build.info | 33 include/openssl/ocsp.h \ 62 GENERATE[include/openssl/ocsp.h]=include/openssl/ocsp.h.in
|
/third_party/rust/crates/rust-openssl/openssl-sys/src/ |
D | lib.rs | 56 pub use self::ocsp::*; 86 mod ocsp; module
|
/third_party/node/deps/openssl/config/ |
D | Makefile_VC-WIN64-ARM | 19 …l/ess.h include/openssl/fipskey.h include/openssl/lhash.h include/openssl/ocsp.h include/openssl/o… 193 include/openssl/ocsp.h: include/openssl/ocsp.h.in configdata.pm 195 "-omakefile" "include/openssl/ocsp.h.in" > $@ 196 include/openssl/ocsp.h: include/openssl/ocsp.h.in configdata.pm 198 "-omakefile" "include/openssl/ocsp.h.in" > $@
|
/third_party/node/deps/openssl/openssl/apps/ |
D | build.info | 25 IF[{- !$disabled{'ocsp'} -}] 26 $OPENSSLSRC=$OPENSSLSRC ocsp.c
|
/third_party/openssl/apps/ |
D | build.info | 25 IF[{- !$disabled{'ocsp'} -}] 26 $OPENSSLSRC=$OPENSSLSRC ocsp.c
|
/third_party/node/test/fixtures/keys/ |
D | agent1.cnf | 25 OCSP;URI.0 = http://ocsp.nodejs.org/
|
/third_party/openssl/ssl/statem/ |
D | extensions_srvr.c | 336 sk_OCSP_RESPID_pop_free(s->ext.ocsp.ids, OCSP_RESPID_free); in tls_parse_ctos_status_request() 338 s->ext.ocsp.ids = sk_OCSP_RESPID_new_null(); in tls_parse_ctos_status_request() 339 if (s->ext.ocsp.ids == NULL) { in tls_parse_ctos_status_request() 344 s->ext.ocsp.ids = NULL; in tls_parse_ctos_status_request() 373 if (!sk_OCSP_RESPID_push(s->ext.ocsp.ids, id)) { in tls_parse_ctos_status_request() 390 sk_X509_EXTENSION_pop_free(s->ext.ocsp.exts, in tls_parse_ctos_status_request() 392 s->ext.ocsp.exts = in tls_parse_ctos_status_request() 394 if (s->ext.ocsp.exts == NULL || ext_data != PACKET_end(&exts)) { in tls_parse_ctos_status_request()
|
/third_party/node/deps/openssl/openssl/fuzz/ |
D | build.info | 26 IF[{- !$disabled{"ocsp"} -}] 94 IF[{- !$disabled{"ocsp"} -}]
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_peer/ |
D | eap_config.h | 773 int ocsp; member
|
/third_party/node/deps/openssl/openssl/ssl/statem/ |
D | extensions_srvr.c | 336 sk_OCSP_RESPID_pop_free(s->ext.ocsp.ids, OCSP_RESPID_free); in tls_parse_ctos_status_request() 338 s->ext.ocsp.ids = sk_OCSP_RESPID_new_null(); in tls_parse_ctos_status_request() 339 if (s->ext.ocsp.ids == NULL) { in tls_parse_ctos_status_request() 344 s->ext.ocsp.ids = NULL; in tls_parse_ctos_status_request() 373 if (!sk_OCSP_RESPID_push(s->ext.ocsp.ids, id)) { in tls_parse_ctos_status_request() 390 sk_X509_EXTENSION_pop_free(s->ext.ocsp.exts, in tls_parse_ctos_status_request() 392 s->ext.ocsp.exts = in tls_parse_ctos_status_request() 394 if (s->ext.ocsp.exts == NULL || ext_data != PACKET_end(&exts)) { in tls_parse_ctos_status_request()
|