/dports/security/s2n/s2n-tls-1.1.2/tls/ |
H A D | s2n_x509_validator.h | 133 … const uint8_t *ocsp_response, uint32_t size);
|
/dports/www/chromium-legacy/chromium-88.0.4324.182/net/third_party/quiche/src/quic/core/crypto/ |
H A D | proof_verifier.h | 112 const std::string& ocsp_response,
|
/dports/www/chromium-legacy/chromium-88.0.4324.182/net/tools/testserver/ |
H A D | testserver.py | 158 fallback_scsv_enabled, ocsp_response, argument 177 self.ocsp_response = ocsp_response 242 ocspResponse = self.ocsp_response) 1542 self.ocsp_response = socket_server.ocsp_response 1551 response = self.ocsp_response 1849 self.__ocsp_server.ocsp_response = None 1894 self.__ocsp_server.ocsp_response = '30030a0103'.decode('hex') 1896 self.__ocsp_server.ocsp_response = ocsp_der
|
/dports/www/chromium-legacy/chromium-88.0.4324.182/net/test/embedded_test_server/ |
H A D | embedded_test_server.cc | 498 std::string ocsp_response; in GenerateCertAndKey() local 500 &ocsp_response)) { in GenerateCertAndKey() 503 if (!ocsp_response.empty()) { in GenerateCertAndKey() 508 "application/ocsp-response", ocsp_response)); in GenerateCertAndKey() 517 ssl_config_.ocsp_response = std::vector<uint8_t>( in GenerateCertAndKey()
|
/dports/www/chromium-legacy/chromium-88.0.4324.182/third_party/boringssl/src/ssl/ |
H A D | ssl_asn1.cc | 314 if (in->ocsp_response != nullptr) { in SSL_SESSION_to_bytes_full() 317 &child, CRYPTO_BUFFER_data(in->ocsp_response.get()), in SSL_SESSION_to_bytes_full() 318 CRYPTO_BUFFER_len(in->ocsp_response.get()))) { in SSL_SESSION_to_bytes_full() 678 !SSL_SESSION_parse_crypto_buffer(&session, &ret->ocsp_response, in SSL_SESSION_parse()
|
H A D | ssl_session.cc | 236 new_session->ocsp_response = UpRef(session->ocsp_response); in SSL_SESSION_dup() 955 if (session->ocsp_response) { in SSL_SESSION_get0_ocsp_response() 956 *out = CRYPTO_BUFFER_data(session->ocsp_response.get()); in SSL_SESSION_get0_ocsp_response() 957 *out_len = CRYPTO_BUFFER_len(session->ocsp_response.get()); in SSL_SESSION_get0_ocsp_response()
|
/dports/net/quiche/quiche-0.9.0/cargo-crates/boring-sys-1.1.1/deps/boringssl/src/ssl/ |
H A D | ssl_asn1.cc | 313 if (in->ocsp_response != nullptr) { in SSL_SESSION_to_bytes_full() 316 &child, CRYPTO_BUFFER_data(in->ocsp_response.get()), in SSL_SESSION_to_bytes_full() 317 CRYPTO_BUFFER_len(in->ocsp_response.get()))) { in SSL_SESSION_to_bytes_full() 677 !SSL_SESSION_parse_crypto_buffer(&session, &ret->ocsp_response, in SSL_SESSION_parse()
|
/dports/net/quiche/quiche-0.9.0/deps/boringssl/src/ssl/ |
H A D | ssl_asn1.cc | 313 if (in->ocsp_response != nullptr) { in SSL_SESSION_to_bytes_full() 316 &child, CRYPTO_BUFFER_data(in->ocsp_response.get()), in SSL_SESSION_to_bytes_full() 317 CRYPTO_BUFFER_len(in->ocsp_response.get()))) { in SSL_SESSION_to_bytes_full() 677 !SSL_SESSION_parse_crypto_buffer(&session, &ret->ocsp_response, in SSL_SESSION_parse()
|
/dports/devel/pecl-grpc/grpc-1.42.0/third_party/boringssl-with-bazel/src/ssl/ |
H A D | ssl_asn1.cc | 313 if (in->ocsp_response != nullptr) { in SSL_SESSION_to_bytes_full() 316 &child, CRYPTO_BUFFER_data(in->ocsp_response.get()), in SSL_SESSION_to_bytes_full() 317 CRYPTO_BUFFER_len(in->ocsp_response.get()))) { in SSL_SESSION_to_bytes_full() 677 !SSL_SESSION_parse_crypto_buffer(&session, &ret->ocsp_response, in SSL_SESSION_parse()
|
/dports/devel/py-grpcio/grpcio-1.43.0/third_party/boringssl-with-bazel/src/ssl/ |
H A D | ssl_asn1.cc | 313 if (in->ocsp_response != nullptr) { in SSL_SESSION_to_bytes_full() 316 &child, CRYPTO_BUFFER_data(in->ocsp_response.get()), in SSL_SESSION_to_bytes_full() 317 CRYPTO_BUFFER_len(in->ocsp_response.get()))) { in SSL_SESSION_to_bytes_full() 677 !SSL_SESSION_parse_crypto_buffer(&session, &ret->ocsp_response, in SSL_SESSION_parse()
|
/dports/net/haproxy21/haproxy-2.1.12/src/ |
H A D | ssl_sock.c | 766 ocsp_response->data); in ssl_sock_load_ocsp_response() 943 ocsp_response = calloc(1, sizeof(*ocsp_response)); in ssl_sock_load_ocsp_response_from_file() 945 free(ocsp_response); in ssl_sock_load_ocsp_response_from_file() 946 ocsp_response = NULL; in ssl_sock_load_ocsp_response_from_file() 950 if (ckch->ocsp_response) { in ssl_sock_load_ocsp_response_from_file() 955 ckch->ocsp_response = ocsp_response; in ssl_sock_load_ocsp_response_from_file() 3077 ocsp_response = calloc(1, sizeof(*ocsp_response)); 3078 if (!chunk_dup(ocsp_response, src->ocsp_response)) { 3079 free(ocsp_response); 3080 ocsp_response = NULL; [all …]
|
/dports/net/nuster/nuster-5.0.4.21/src/ |
H A D | ssl_sock.c | 765 ocsp_response->data); in ssl_sock_load_ocsp_response() 942 ocsp_response = calloc(1, sizeof(*ocsp_response)); in ssl_sock_load_ocsp_response_from_file() 944 free(ocsp_response); in ssl_sock_load_ocsp_response_from_file() 945 ocsp_response = NULL; in ssl_sock_load_ocsp_response_from_file() 949 if (ckch->ocsp_response) { in ssl_sock_load_ocsp_response_from_file() 954 ckch->ocsp_response = ocsp_response; in ssl_sock_load_ocsp_response_from_file() 3021 ocsp_response = calloc(1, sizeof(*ocsp_response)); 3022 if (!chunk_dup(ocsp_response, src->ocsp_response)) { 3023 free(ocsp_response); 3024 ocsp_response = NULL; [all …]
|
/dports/net/haproxy18/haproxy-1.8.30/include/proto/ |
H A D | ssl_sock.h | 61 int ssl_sock_update_ocsp_response(struct chunk *ocsp_response, char **err);
|
/dports/lang/mono/mono-5.10.1.57/external/boringssl/ssl/test/ |
H A D | test_config.h | 90 std::string ocsp_response; member
|
/dports/www/qt5-webengine/qtwebengine-everywhere-src-5.15.2/src/3rdparty/chromium/net/cert/ |
H A D | coalescing_cert_verifier.cc | 77 if (!params.ocsp_response().empty()) { in CertVerifierParams() 78 dict.SetStringPath("ocsp_response", PEMEncode(params.ocsp_response(), in CertVerifierParams()
|
/dports/www/chromium-legacy/chromium-88.0.4324.182/net/cert/ |
H A D | coalescing_cert_verifier.cc | 77 if (!params.ocsp_response().empty()) { in CertVerifierParams() 78 dict.SetStringPath("ocsp_response", PEMEncode(params.ocsp_response(), in CertVerifierParams()
|
/dports/net/haproxy21/haproxy-2.1.12/include/proto/ |
H A D | ssl_sock.h | 70 int ssl_sock_update_ocsp_response(struct buffer *ocsp_response, char **err);
|
/dports/net/haproxy20/haproxy-2.0.26/include/proto/ |
H A D | ssl_sock.h | 70 int ssl_sock_update_ocsp_response(struct buffer *ocsp_response, char **err);
|
/dports/net/haproxy19/haproxy-1.9.16/include/proto/ |
H A D | ssl_sock.h | 67 int ssl_sock_update_ocsp_response(struct buffer *ocsp_response, char **err);
|
/dports/net/nuster/nuster-5.0.4.21/include/proto/ |
H A D | ssl_sock.h | 70 int ssl_sock_update_ocsp_response(struct buffer *ocsp_response, char **err);
|
/dports/www/chromium-legacy/chromium-88.0.4324.182/net/third_party/quiche/src/quic/quic_transport/ |
H A D | web_transport_fingerprint_proof_verifier.h | 98 const std::string& ocsp_response,
|
/dports/www/qt5-webengine/qtwebengine-everywhere-src-5.15.2/src/3rdparty/chromium/net/tools/testserver/ |
H A D | testserver.py | 161 fallback_scsv_enabled, ocsp_response, argument 180 self.ocsp_response = ocsp_response 245 ocspResponse = self.ocsp_response) 1628 self.ocsp_response = socket_server.ocsp_response 1637 response = self.ocsp_response 1981 self.__ocsp_server.ocsp_response = None 2026 self.__ocsp_server.ocsp_response = '30030a0103'.decode('hex') 2028 self.__ocsp_server.ocsp_response = ocsp_der
|
/dports/www/qt5-webengine/qtwebengine-everywhere-src-5.15.2/src/3rdparty/chromium/net/third_party/quiche/src/quic/quartc/ |
H A D | quartc_crypto_helpers.h | 91 const std::string& ocsp_response,
|
/dports/www/qt5-webengine/qtwebengine-everywhere-src-5.15.2/src/3rdparty/chromium/net/quic/crypto/ |
H A D | proof_verifier_chromium.h | 97 const std::string& ocsp_response,
|
/dports/www/trafficserver/trafficserver-9.1.1/iocore/net/ |
H A D | P_SSLCertLookup.h | 59 ats_scoped_str ocsp_response; ///< prefetched OCSP response member
|