| /src/crypto/external/bsd/heimdal/lib/libhx509/ |
| Makefile | 28 HEIMSRCS = hx509_err.et ocsp.asn1 pkcs10.asn1 69 ASN1_FILES.ocsp.asn1 = \
|
| /src/external/bsd/wpa/dist/src/eap_peer/ |
| eap_config.h | 271 * ocsp - Whether to use/require OCSP to check server certificate 273 * 0 = do not use OCSP stapling (TLS certificate status extension) 274 * 1 = try to use OCSP stapling, but not require response 275 * 2 = require valid OCSP stapling response 277 int ocsp; member in struct:eap_peer_cert_config
|
| /src/crypto/external/bsd/heimdal/dist/lib/hx509/ |
| revoke.c | 39 * There are two revocation method for PKIX/X.509: CRL and OCSP. 47 * OCSP is an online checking method where the requestor sends a list 48 * of certificates to the OCSP server to return a signed reply if they 49 * are valid or not. Some services sends a OCSP reply as part of the 67 OCSPBasicOCSPResponse ocsp; member in struct:revoke_ocsp 126 free_ocsp(struct revoke_ocsp *ocsp) 128 free(ocsp->path); 129 free_OCSPBasicOCSPResponse(&ocsp->ocsp); 130 hx509_certs_free(&ocsp->certs) 727 struct revoke_ocsp *ocsp = &ctx->ocsps.val[i]; local 1208 struct revoke_ocsp *ocsp = &ctx->ocsps.val[n]; local 1249 struct revoke_ocsp ocsp; local [all...] |
| /src/crypto/external/bsd/heimdal/dist/kdc/ |
| pkinit.c | 88 } ocsp; variable in typeref:struct:__anon795 1465 if (ocsp.expire == 0 && ocsp.next_update > kdc_time) { 1469 krb5_data_free(&ocsp.data); 1471 ocsp.expire = 0; 1472 ocsp.next_update = kdc_time + 60 * 5; 1477 "PK-INIT failed to open ocsp data file %d", errno); 1485 "PK-INIT failed to stat ocsp data %d", ret); 1489 ret = krb5_data_alloc(&ocsp.data, sb.st_size); 1493 "PK-INIT failed to stat ocsp data %d", ret) [all...] |
| /src/external/bsd/wpa/dist/src/utils/ |
| http_curl.c | 21 #include <openssl/ocsp.h> 61 } ocsp; member in struct:http_ctx 1018 if (depth == 0 && ctx->ocsp != NO_OCSP && preverify_ok) { 1025 wpa_printf(MSG_INFO, "OCSP: certificate revoked"); 1029 } else if (res != OCSP_GOOD && (ctx->ocsp == MANDATORY_OCSP)) { 1032 "OCSP: bad certificate status response"); 1068 wpa_printf(MSG_MSGDUMP, "OpenSSL: OCSP Response\n%s", txt); 1103 wpa_printf(MSG_DEBUG, "OpenSSL: No OCSP response received"); 1104 if (ctx->ocsp == MANDATORY_OCSP) 1105 ctx->last_err = "No OCSP response received" [all...] |
| /src/external/bsd/wpa/dist/wpa_supplicant/ |
| config.h | 403 * ocsp - Whether to use/require OCSP to check server certificate 405 * 0 = do not use OCSP stapling (TLS certificate status extension) 406 * 1 = try to use OCSP stapling, but not require response 407 * 2 = require valid OCSP stapling response 409 int ocsp; member in struct:wpa_cred
|
| /src/crypto/external/apache2/openssl/dist/ssl/ |
| ssl_local.h | 1014 /* ext status type used for CSR extension (OCSP Stapling) */ 1631 /* Expect OCSP CertificateStatus message */ 1635 /* OCSP status request only */ 1638 /* OCSP response received or to be sent */ 1641 } ocsp; member in struct:ssl_connection_st::__anon629
|
| /src/crypto/external/bsd/openssl/dist/ssl/ |
| ssl_local.h | 1058 /* ext status type used for CSR extension (OCSP Stapling) */ 1594 /* Expect OCSP CertificateStatus message */ 1598 /* OCSP status request only */ 1601 /* OCSP response received or to be sent */ 1604 } ocsp; member in struct:ssl_st::__anon1660
|
| /src/crypto/external/bsd/openssl.old/dist/ssl/ |
| ssl_local.h | 941 /* ext status type used for CSR extension (OCSP Stapling) */ 1278 /* Expect OCSP CertificateStatus message */ 1282 /* OCSP status request only */ 1285 /* OCSP response received or to be sent */ 1288 } ocsp; member in struct:ssl_st::__anon2194
|