Searched refs:OCSP (Results 1 – 25 of 39) sorted by relevance
12
1 OCSP title97 OCSP (Online Certificate Status Protocol) is a method of checking the109 Deserialize an OCSP request from DER encoded data.111 :param bytes data: The DER encoded OCSP request data.147 instance. For OCSP only190 Deserialize an OCSP response from DER encoded data.192 :param bytes data: The DER encoded OCSP response data.212 objects. You cannot set ``produced_at`` on OCSP responses at this time.230 instance. For OCSP only260 utilizes an OCSP delegate.[all …]
1704 This presence of this extension indicates that an OCSP client can trust a1710 extension is only relevant when the certificate is an authorized OCSP1727 certificates for OCSP Must-Staple. The object is iterable to get every1750 a stapled OCSP response in the TLS handshake. Commonly known as OCSP1756 commonly used and if you want to enable OCSP Must-Staple you should2091 validation services (such as OCSP) and issuer data. It is an iterable,2117 :attr:`~cryptography.x509.oid.AuthorityInformationAccessOID.OCSP` or2120 :attr:`~cryptography.x509.oid.AuthorityInformationAccessOID.OCSP`2121 the access location will be where to obtain OCSP2602 OCSP Extensions[all …]
215 ############ OCSP class ###############################################217 = OCSP class : OCSP Response import221 = OCSP class : OCSP Response global checks231 = OCSP class : OCSP ResponseData checks241 = OCSP class : OCSP SingleResponse checks253 = OCSP class : OCSP Response reconstruction
495 # From OCSP spec RFC2560496 !Cname OCSP-sign497 id-kp 9 : OCSPSigning : OCSP Signing598 !Cname ad-OCSP599 id-ad 1 : OCSP : OCSP609 !Alias id-pkix-OCSP ad-OCSP610 !module id-pkix-OCSP612 id-pkix-OCSP 1 : basicOCSPResponse : Basic OCSP Response613 id-pkix-OCSP 2 : Nonce : OCSP Nonce614 id-pkix-OCSP 3 : CrlID : OCSP CRL ID[all …]
211 (commonly known as OCSP Must-Staple).304 containing an authority information access extension with two OCSP and one307 containing an authority information access extension with an OCSP entry.463 X.509 OCSP Test Vectors465 * ``x509/ocsp/resp-sha256.der`` - An OCSP response for ``cryptography.io`` with467 * ``x509/ocsp/resp-unauthorized.der`` - An OCSP response with an unauthorized469 * ``x509/ocsp/resp-revoked.der`` - An OCSP response for ``revoked.badssl.com``471 * ``x509/ocsp/resp-delegate-unknown-cert.der`` - An OCSP response for an474 * ``x509/ocsp/resp-responder-key-hash.der`` - An OCSP response from the475 ``DigiCert`` OCSP responder that uses a key hash for the responder ID.[all …]
120 authorityInfoAccess = OCSP;URI:@OCSP_URI@187 authorityInfoAccess = OCSP;URI:@OCSP_URI@197 authorityInfoAccess = OCSP;URI:@OCSP_URI@
132 OCSP = ObjectIdentifier("1.3.6.1.5.5.7.48.1") variable in AuthorityInformationAccessOID220 AuthorityInformationAccessOID.OCSP: "OCSP",
112 OID_OCSP = AuthorityInformationAccessOID.OCSP
8 Certificate Status Request (aka. OCSP stapling) TLS extension.
2672 AuthorityInformationAccessOID.OCSP,2690 AuthorityInformationAccessOID.OCSP,2694 AuthorityInformationAccessOID.OCSP,2701 AuthorityInformationAccessOID.OCSP,2709 AuthorityInformationAccessOID.OCSP,2718 AuthorityInformationAccessOID.OCSP,2722 AuthorityInformationAccessOID.OCSP,2816 AuthorityInformationAccessOID.OCSP,2827 AuthorityInformationAccessOID.OCSP,2839 AuthorityInformationAccessOID.OCSP,[all …]
18 - [Online certificate status protocol (OCSP)](../asn1crypto/ocsp.py), `asn1crypto.ocsp`
22 - ocsp-response.der: OCSP response for cert.pem, containing an SCT for cert.pem signed by the test
10 - Added RFC6960 providing Online Certificate Status Protocol (OCSP)183 - OCSP response blob fixed in test184 - Fixed wrong OCSP ResponderID components tagging282 - OCSP request & response dumping tool added
335 - Added a collection of functions for working with OCSP stapling.336 …None of these functions make it possible to validate OCSP assertions, only to staple them into the…337 Users will need to write their own code to handle OCSP assertions.
77 Some SSL backends may do certificate revocation checks (CRL, OCSP, etc)
160 disabled. Secure Transport on iOS will run OCSP checks on certificates unless161 peer verification is disabled. Secure Transport on OS X will run either OCSP
49 OCSP - URI:http://testca.pythontest.net/testca/ocsp/
101 OCSP - URI:http://testca.pythontest.net/testca/ocsp/
282 # ocsp: Whether to use/require OCSP to check server certificate283 # 0 = do not use OCSP stapling (TLS certificate status extension)284 # 1 = try to use OCSP stapling, but not require response285 # 2 = require valid OCSP stapling response
81 OCSP - URI:http://testca.pythontest.net/testca/ocsp/
34 | OCSP | [`asn1crypto.ocsp`](asn1crypto/ocsp.py) | [RFC 6960](https://tools.i…149 - [Online certificate status protocol (OCSP)](asn1crypto/ocsp.py), `asn1crypto.ocsp`
197 // Bouncycastle OCSP classes in the original org.bouncycastle package for use