/third_party/node/test/parallel/ |
H A D | test-tls-ocsp-callback.js | 51 if (!testOptions.ocsp) 72 if (!testOptions.ocsp) 87 requestOCSP: testOptions.ocsp, 88 secureOptions: testOptions.ocsp ? 0 : SSL_OP_NO_TICKET, 99 }, testOptions.ocsp === false ? 0 : 1)); 107 test({ ocsp: true, response: false }); 108 test({ ocsp: true, response: 'hello world' }); 109 test({ ocsp: false }); 112 test({ ocsp: true, response: 'hello pfx', pfx: pfx, passphrase: 'sample' });
|
/third_party/node/test/fixtures/x509-escaping/ |
H A D | create-certs.js | 17 ocsp: [1, 3, 6, 1, 5, 5, 7, 48, 1], 353 accessMethod: oid.ocsp, 369 accessMethod: oid.ocsp, 387 accessMethod: oid.ocsp, 397 accessMethod: oid.ocsp, 407 accessMethod: oid.ocsp, 419 accessMethod: oid.ocsp,
|
/third_party/rust/crates/rust-openssl/openssl-sys/src/handwritten/ |
H A D | mod.rs | 17 pub use self::ocsp::*; 53 mod ocsp; modules
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/utils/ |
H A D | http_curl.c | 21 #include <openssl/ocsp.h> 61 } ocsp; member 1039 if (depth == 0 && ctx->ocsp != NO_OCSP && preverify_ok) { in curl_cb_ssl_verify() 1050 } else if (res != OCSP_GOOD && (ctx->ocsp == MANDATORY_OCSP)) { in curl_cb_ssl_verify() 1125 if (ctx->ocsp == MANDATORY_OCSP) in ocsp_resp_cb() 1127 return (ctx->ocsp == MANDATORY_OCSP) ? 0 : 1; in ocsp_resp_cb() 1250 (ctx->ocsp == MANDATORY_OCSP) ? "" : in ocsp_resp_cb() 1255 if (ctx->ocsp == MANDATORY_OCSP) in ocsp_resp_cb() 1258 return (ctx->ocsp == MANDATORY_OCSP) ? 0 : 1; in ocsp_resp_cb() 1282 if (ctx->ocsp in ocsp_resp_cb() [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/utils/ |
H A D | http_curl.c | 21 #include <openssl/ocsp.h> 61 } ocsp; member 1039 if (depth == 0 && ctx->ocsp != NO_OCSP && preverify_ok) { in curl_cb_ssl_verify() 1050 } else if (res != OCSP_GOOD && (ctx->ocsp == MANDATORY_OCSP)) { in curl_cb_ssl_verify() 1125 if (ctx->ocsp == MANDATORY_OCSP) in ocsp_resp_cb() 1127 return (ctx->ocsp == MANDATORY_OCSP) ? 0 : 1; in ocsp_resp_cb() 1250 (ctx->ocsp == MANDATORY_OCSP) ? "" : in ocsp_resp_cb() 1255 if (ctx->ocsp == MANDATORY_OCSP) in ocsp_resp_cb() 1258 return (ctx->ocsp == MANDATORY_OCSP) ? 0 : 1; in ocsp_resp_cb() 1282 if (ctx->ocsp in ocsp_resp_cb() [all...] |
/third_party/rust/crates/rust-openssl/openssl-sys/src/ |
H A D | lib.rs | 56 pub use self::ocsp::*; 86 mod ocsp; modules
|
/third_party/node/deps/openssl/openssl/crypto/asn1/ |
H A D | asn1_item_list.c | 19 #include <openssl/ocsp.h>
|
/third_party/openssl/crypto/asn1/ |
H A D | asn1_item_list.c | 19 #include <openssl/ocsp.h>
|
/third_party/node/deps/openssl/openssl/crypto/ocsp/ |
H A D | ocsp_http.c | 10 #include <openssl/ocsp.h> 40 && !OSSL_HTTP_REQ_CTX_set1_req(rctx, "application/ocsp-request", in OCSP_sendreq_new()
|
H A D | ocsp_lib.c | 16 #include <openssl/ocsp.h>
|
/third_party/openssl/crypto/ocsp/ |
H A D | ocsp_http.c | 10 #include <openssl/ocsp.h> 40 && !OSSL_HTTP_REQ_CTX_set1_req(rctx, "application/ocsp-request", in OCSP_sendreq_new()
|
H A D | ocsp_lib.c | 16 #include <openssl/ocsp.h>
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_peer/ |
H A D | eap_config.h | 767 * ocsp - Whether to use/require OCSP to check server certificate 773 int ocsp; member
|
H A D | eap_tls_common.c | 245 if (config->ocsp) in eap_tls_init_connection() 247 if (config->ocsp >= 2) in eap_tls_init_connection() 249 if (config->ocsp == 3) in eap_tls_init_connection()
|
/third_party/rust/crates/rust-openssl/openssl/src/ |
H A D | lib.rs | 167 pub mod ocsp; modules
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_peer/ |
H A D | eap_config.h | 289 * ocsp - Whether to use/require OCSP to check server certificate 295 int ocsp; member
|
H A D | eap_tls_common.c | 128 if (config->ocsp) in eap_tls_cert_params_from_conf() 130 if (config->ocsp >= 2) in eap_tls_cert_params_from_conf() 132 if (config->ocsp == 3) in eap_tls_cert_params_from_conf()
|
/third_party/node/deps/openssl/openssl/ssl/statem/ |
H A D | extensions_srvr.c | 10 #include <openssl/ocsp.h> 336 sk_OCSP_RESPID_pop_free(s->ext.ocsp.ids, OCSP_RESPID_free); in tls_parse_ctos_status_request() 338 s->ext.ocsp.ids = sk_OCSP_RESPID_new_null(); in tls_parse_ctos_status_request() 339 if (s->ext.ocsp.ids == NULL) { in tls_parse_ctos_status_request() 344 s->ext.ocsp.ids = NULL; in tls_parse_ctos_status_request() 373 if (!sk_OCSP_RESPID_push(s->ext.ocsp.ids, id)) { in tls_parse_ctos_status_request() 390 sk_X509_EXTENSION_pop_free(s->ext.ocsp.exts, in tls_parse_ctos_status_request() 392 s->ext.ocsp.exts = in tls_parse_ctos_status_request() 394 if (s->ext.ocsp.exts == NULL || ext_data != PACKET_end(&exts)) { in tls_parse_ctos_status_request()
|
H A D | extensions_clnt.c | 10 #include <openssl/ocsp.h> 344 for (i = 0; i < sk_OCSP_RESPID_num(s->ext.ocsp.ids); i++) { in tls_construct_ctos_status_request() 346 OCSP_RESPID *id = sk_OCSP_RESPID_value(s->ext.ocsp.ids, i); in tls_construct_ctos_status_request() 362 if (s->ext.ocsp.exts) { in tls_construct_ctos_status_request() 364 int extlen = i2d_X509_EXTENSIONS(s->ext.ocsp.exts, NULL); in tls_construct_ctos_status_request() 371 || i2d_X509_EXTENSIONS(s->ext.ocsp.exts, &extbytes) in tls_construct_ctos_status_request()
|
/third_party/openssl/ssl/statem/ |
H A D | extensions_srvr.c | 10 #include <openssl/ocsp.h> 336 sk_OCSP_RESPID_pop_free(s->ext.ocsp.ids, OCSP_RESPID_free); in tls_parse_ctos_status_request() 338 s->ext.ocsp.ids = sk_OCSP_RESPID_new_null(); in tls_parse_ctos_status_request() 339 if (s->ext.ocsp.ids == NULL) { in tls_parse_ctos_status_request() 344 s->ext.ocsp.ids = NULL; in tls_parse_ctos_status_request() 373 if (!sk_OCSP_RESPID_push(s->ext.ocsp.ids, id)) { in tls_parse_ctos_status_request() 390 sk_X509_EXTENSION_pop_free(s->ext.ocsp.exts, in tls_parse_ctos_status_request() 392 s->ext.ocsp.exts = in tls_parse_ctos_status_request() 394 if (s->ext.ocsp.exts == NULL || ext_data != PACKET_end(&exts)) { in tls_parse_ctos_status_request()
|
H A D | extensions_clnt.c | 10 #include <openssl/ocsp.h> 344 for (i = 0; i < sk_OCSP_RESPID_num(s->ext.ocsp.ids); i++) { in tls_construct_ctos_status_request() 346 OCSP_RESPID *id = sk_OCSP_RESPID_value(s->ext.ocsp.ids, i); in tls_construct_ctos_status_request() 362 if (s->ext.ocsp.exts) { in tls_construct_ctos_status_request() 364 int extlen = i2d_X509_EXTENSIONS(s->ext.ocsp.exts, NULL); in tls_construct_ctos_status_request() 371 || i2d_X509_EXTENSIONS(s->ext.ocsp.exts, &extbytes) in tls_construct_ctos_status_request()
|
/third_party/node/deps/openssl/config/ |
H A D | Makefile | 41 ess fipskey lhash ocsp opensslv pkcs12 pkcs7 safestack srp ssl \
|
/third_party/node/deps/openssl/openssl/fuzz/ |
H A D | x509.c | 12 #include <openssl/ocsp.h>
|
/third_party/node/deps/openssl/openssl/ssl/ |
H A D | s3_lib.c | 3530 *(STACK_OF(X509_EXTENSION) **)parg = s->ext.ocsp.exts; in ssl3_ctrl() 3535 s->ext.ocsp.exts = parg; in ssl3_ctrl() 3540 *(STACK_OF(OCSP_RESPID) **)parg = s->ext.ocsp.ids; in ssl3_ctrl() 3545 s->ext.ocsp.ids = parg; in ssl3_ctrl() 3550 *(unsigned char **)parg = s->ext.ocsp.resp; in ssl3_ctrl() 3551 if (s->ext.ocsp.resp_len == 0 in ssl3_ctrl() 3552 || s->ext.ocsp.resp_len > LONG_MAX) in ssl3_ctrl() 3554 return (long)s->ext.ocsp.resp_len; in ssl3_ctrl() 3557 OPENSSL_free(s->ext.ocsp.resp); in ssl3_ctrl() 3558 s->ext.ocsp in ssl3_ctrl() [all...] |
/third_party/openssl/ssl/ |
H A D | s3_lib.c | 3530 *(STACK_OF(X509_EXTENSION) **)parg = s->ext.ocsp.exts; in ssl3_ctrl() 3535 s->ext.ocsp.exts = parg; in ssl3_ctrl() 3540 *(STACK_OF(OCSP_RESPID) **)parg = s->ext.ocsp.ids; in ssl3_ctrl() 3545 s->ext.ocsp.ids = parg; in ssl3_ctrl() 3550 *(unsigned char **)parg = s->ext.ocsp.resp; in ssl3_ctrl() 3551 if (s->ext.ocsp.resp_len == 0 in ssl3_ctrl() 3552 || s->ext.ocsp.resp_len > LONG_MAX) in ssl3_ctrl() 3554 return (long)s->ext.ocsp.resp_len; in ssl3_ctrl() 3557 OPENSSL_free(s->ext.ocsp.resp); in ssl3_ctrl() 3558 s->ext.ocsp in ssl3_ctrl() [all...] |