HomeSort by: relevance | last modified time | path
    Searched defs:ocsp (Results 1 - 9 of 9) sorted by relevancy

  /src/crypto/external/bsd/heimdal/lib/libhx509/
Makefile 28 HEIMSRCS = hx509_err.et ocsp.asn1 pkcs10.asn1
69 ASN1_FILES.ocsp.asn1 = \
  /src/external/bsd/wpa/dist/src/eap_peer/
eap_config.h 271 * ocsp - Whether to use/require OCSP to check server certificate
273 * 0 = do not use OCSP stapling (TLS certificate status extension)
274 * 1 = try to use OCSP stapling, but not require response
275 * 2 = require valid OCSP stapling response
277 int ocsp; member in struct:eap_peer_cert_config
  /src/crypto/external/bsd/heimdal/dist/lib/hx509/
revoke.c 39 * There are two revocation method for PKIX/X.509: CRL and OCSP.
47 * OCSP is an online checking method where the requestor sends a list
48 * of certificates to the OCSP server to return a signed reply if they
49 * are valid or not. Some services sends a OCSP reply as part of the
67 OCSPBasicOCSPResponse ocsp; member in struct:revoke_ocsp
126 free_ocsp(struct revoke_ocsp *ocsp)
128 free(ocsp->path);
129 free_OCSPBasicOCSPResponse(&ocsp->ocsp);
130 hx509_certs_free(&ocsp->certs)
727 struct revoke_ocsp *ocsp = &ctx->ocsps.val[i]; local
1208 struct revoke_ocsp *ocsp = &ctx->ocsps.val[n]; local
1249 struct revoke_ocsp ocsp; local
    [all...]
  /src/crypto/external/bsd/heimdal/dist/kdc/
pkinit.c 88 } ocsp; variable in typeref:struct:__anon795
1465 if (ocsp.expire == 0 && ocsp.next_update > kdc_time) {
1469 krb5_data_free(&ocsp.data);
1471 ocsp.expire = 0;
1472 ocsp.next_update = kdc_time + 60 * 5;
1477 "PK-INIT failed to open ocsp data file %d", errno);
1485 "PK-INIT failed to stat ocsp data %d", ret);
1489 ret = krb5_data_alloc(&ocsp.data, sb.st_size);
1493 "PK-INIT failed to stat ocsp data %d", ret)
    [all...]
  /src/external/bsd/wpa/dist/src/utils/
http_curl.c 21 #include <openssl/ocsp.h>
61 } ocsp; member in struct:http_ctx
1018 if (depth == 0 && ctx->ocsp != NO_OCSP && preverify_ok) {
1025 wpa_printf(MSG_INFO, "OCSP: certificate revoked");
1029 } else if (res != OCSP_GOOD && (ctx->ocsp == MANDATORY_OCSP)) {
1032 "OCSP: bad certificate status response");
1068 wpa_printf(MSG_MSGDUMP, "OpenSSL: OCSP Response\n%s", txt);
1103 wpa_printf(MSG_DEBUG, "OpenSSL: No OCSP response received");
1104 if (ctx->ocsp == MANDATORY_OCSP)
1105 ctx->last_err = "No OCSP response received"
    [all...]
  /src/external/bsd/wpa/dist/wpa_supplicant/
config.h 403 * ocsp - Whether to use/require OCSP to check server certificate
405 * 0 = do not use OCSP stapling (TLS certificate status extension)
406 * 1 = try to use OCSP stapling, but not require response
407 * 2 = require valid OCSP stapling response
409 int ocsp; member in struct:wpa_cred
  /src/crypto/external/apache2/openssl/dist/ssl/
ssl_local.h 1014 /* ext status type used for CSR extension (OCSP Stapling) */
1631 /* Expect OCSP CertificateStatus message */
1635 /* OCSP status request only */
1638 /* OCSP response received or to be sent */
1641 } ocsp; member in struct:ssl_connection_st::__anon629
  /src/crypto/external/bsd/openssl/dist/ssl/
ssl_local.h 1058 /* ext status type used for CSR extension (OCSP Stapling) */
1594 /* Expect OCSP CertificateStatus message */
1598 /* OCSP status request only */
1601 /* OCSP response received or to be sent */
1604 } ocsp; member in struct:ssl_st::__anon1660
  /src/crypto/external/bsd/openssl.old/dist/ssl/
ssl_local.h 941 /* ext status type used for CSR extension (OCSP Stapling) */
1278 /* Expect OCSP CertificateStatus message */
1282 /* OCSP status request only */
1285 /* OCSP response received or to be sent */
1288 } ocsp; member in struct:ssl_st::__anon2194

Completed in 41 milliseconds