/dports/www/qt5-webengine/qtwebengine-everywhere-src-5.15.2/src/3rdparty/chromium/third_party/tlslite/patches/ |
H A D | status_request.patch | 22 + status_request = 5 # RFC 6066 / 4366 34 + self.status_request = False 42 + elif extType == ExtensionType.status_request: 54 + self.status_request = True 62 + self.status_request = False 70 + if self.status_request: 71 + w2.add(ExtensionType.status_request, 2) 134 + support for the status_request extension. 187 + if clientHello.status_request: 188 + serverHello.status_request = ocspResponse [all …]
|
H A D | renegotiation_indication.patch | 20 self.status_request = False 28 self.status_request = True 49 self.status_request = False 55 if self.status_request: 56 w2.add(ExtensionType.status_request, 2) 71 if clientHello.status_request: 72 serverHello.status_request = ocspResponse
|
H A D | token_binding_negotiation.patch | 57 self.status_request = False 81 self.status_request = False 115 if clientHello.status_request:
|
H A D | extended_master_secret.patch | 86 self.status_request = False 103 self.status_request = False 147 if clientHello.status_request:
|
/dports/www/chromium-legacy/chromium-88.0.4324.182/third_party/tlslite/patches/ |
H A D | status_request.patch | 22 + status_request = 5 # RFC 6066 / 4366 34 + self.status_request = False 42 + elif extType == ExtensionType.status_request: 54 + self.status_request = True 62 + self.status_request = False 70 + if self.status_request: 71 + w2.add(ExtensionType.status_request, 2) 134 + support for the status_request extension. 187 + if clientHello.status_request: 188 + serverHello.status_request = ocspResponse [all …]
|
H A D | renegotiation_indication.patch | 20 self.status_request = False 28 self.status_request = True 49 self.status_request = False 55 if self.status_request: 56 w2.add(ExtensionType.status_request, 2) 71 if clientHello.status_request: 72 serverHello.status_request = ocspResponse
|
H A D | token_binding_negotiation.patch | 57 self.status_request = False 81 self.status_request = False 115 if clientHello.status_request:
|
H A D | extended_master_secret.patch | 86 self.status_request = False 103 self.status_request = False 147 if clientHello.status_request:
|
/dports/java/bouncycastle15/crypto-169/tls/src/main/java/org/bouncycastle/tls/ |
H A D | ExtensionType.java | 13 public static final int status_request = 5; field in ExtensionType 150 case status_request: in getName() 237 case status_request: in isRecognized()
|
/dports/www/chromium-legacy/chromium-88.0.4324.182/chrome/browser/media/router/providers/cast/ |
H A D | app_activity.cc | 114 base::Value status_request(base::Value::Type::DICTIONARY); in CreateMediaController() local 115 status_request.SetStringKey( in CreateMediaController() 119 message_handler_->SendMediaRequest(cast_channel_id(), status_request, in CreateMediaController()
|
/dports/security/gnutls/gnutls-3.6.16/lib/ext/ |
H A D | Makefile.am | 42 status_request.h status_request.c dumbfw.c dumbfw.h \
|
/dports/devel/pecl-grpc/grpc-1.42.0/third_party/boringssl-with-bazel/src/ssl/ |
H A D | tls13_both.cc | 238 SSLExtension status_request( in tls13_process_certificate() local 245 if (!ssl_parse_extensions(&extensions, &alert, {&status_request, &sct}, in tls13_process_certificate() 253 if (status_request.present) { in tls13_process_certificate() 256 if (!CBS_get_u8(&status_request.data, &status_type) || in tls13_process_certificate() 258 !CBS_get_u24_length_prefixed(&status_request.data, &ocsp_response) || in tls13_process_certificate() 260 CBS_len(&status_request.data) != 0) { in tls13_process_certificate()
|
/dports/devel/py-grpcio/grpcio-1.43.0/third_party/boringssl-with-bazel/src/ssl/ |
H A D | tls13_both.cc | 238 SSLExtension status_request( in tls13_process_certificate() local 245 if (!ssl_parse_extensions(&extensions, &alert, {&status_request, &sct}, in tls13_process_certificate() 253 if (status_request.present) { in tls13_process_certificate() 256 if (!CBS_get_u8(&status_request.data, &status_type) || in tls13_process_certificate() 258 !CBS_get_u24_length_prefixed(&status_request.data, &ocsp_response) || in tls13_process_certificate() 260 CBS_len(&status_request.data) != 0) { in tls13_process_certificate()
|
/dports/www/domoticz/domoticz-2020.2/plugins/AwoxSMP/lib/ |
H A D | pySmartPlugSmpB16.py | 28 def status_request(self): member in SmartPlug 107 (state, power) = plug.status_request()
|
/dports/www/chromium-legacy/chromium-88.0.4324.182/third_party/boringssl/src/ssl/ |
H A D | tls13_both.cc | 239 CBS status_request, sct; in tls13_process_certificate() local 241 {TLSEXT_TYPE_status_request, &have_status_request, &status_request}, in tls13_process_certificate() 263 if (!CBS_get_u8(&status_request, &status_type) || in tls13_process_certificate() 265 !CBS_get_u24_length_prefixed(&status_request, &ocsp_response) || in tls13_process_certificate() 267 CBS_len(&status_request) != 0) { in tls13_process_certificate()
|
/dports/www/qt5-webengine/qtwebengine-everywhere-src-5.15.2/src/3rdparty/chromium/third_party/boringssl/src/ssl/ |
H A D | tls13_both.cc | 239 CBS status_request, sct; in tls13_process_certificate() local 241 {TLSEXT_TYPE_status_request, &have_status_request, &status_request}, in tls13_process_certificate() 264 if (!CBS_get_u8(&status_request, &status_type) || in tls13_process_certificate() 266 !CBS_get_u24_length_prefixed(&status_request, &ocsp_response) || in tls13_process_certificate() 268 CBS_len(&status_request) != 0) { in tls13_process_certificate()
|
/dports/net/quiche/quiche-0.9.0/cargo-crates/boring-sys-1.1.1/deps/boringssl/src/ssl/ |
H A D | tls13_both.cc | 239 CBS status_request, sct; in tls13_process_certificate() local 241 {TLSEXT_TYPE_status_request, &have_status_request, &status_request}, in tls13_process_certificate() 263 if (!CBS_get_u8(&status_request, &status_type) || in tls13_process_certificate() 265 !CBS_get_u24_length_prefixed(&status_request, &ocsp_response) || in tls13_process_certificate() 267 CBS_len(&status_request) != 0) { in tls13_process_certificate()
|
/dports/net/quiche/quiche-0.9.0/deps/boringssl/src/ssl/ |
H A D | tls13_both.cc | 239 CBS status_request, sct; in tls13_process_certificate() local 241 {TLSEXT_TYPE_status_request, &have_status_request, &status_request}, in tls13_process_certificate() 263 if (!CBS_get_u8(&status_request, &status_type) || in tls13_process_certificate() 265 !CBS_get_u24_length_prefixed(&status_request, &ocsp_response) || in tls13_process_certificate() 267 CBS_len(&status_request) != 0) { in tls13_process_certificate()
|
/dports/security/boringssl/boringssl-6a71840/ssl/ |
H A D | tls13_both.cc | 239 CBS status_request, sct; in tls13_process_certificate() local 241 {TLSEXT_TYPE_status_request, &have_status_request, &status_request}, in tls13_process_certificate() 264 if (!CBS_get_u8(&status_request, &status_type) || in tls13_process_certificate() 266 !CBS_get_u24_length_prefixed(&status_request, &ocsp_response) || in tls13_process_certificate() 268 CBS_len(&status_request) != 0) { in tls13_process_certificate()
|
/dports/net/apinger/apinger-0.6.1/src/ |
H A D | main.c | 106 volatile int status_request=0; variable 121 status_request=1; in signal_handler()
|
/dports/security/p5-Crypt-Perl/Crypt-Perl-0.34/lib/Crypt/Perl/X509/Extension/ |
H A D | tlsFeature.pm | 36 status_request => 5,
|
/dports/misc/libpri/libpri-1.6.0/ |
H A D | rose_etsi_cc.c | 135 const struct roseEtsiStatusRequest_ARG *status_request; in rose_enc_etsi_StatusRequest_ARG() local 140 status_request = &args->etsi.StatusRequest; in rose_enc_etsi_StatusRequest_ARG() 142 status_request->compatibility_mode)); in rose_enc_etsi_StatusRequest_ARG() 144 &status_request->q931ie)); in rose_enc_etsi_StatusRequest_ARG() 920 struct roseEtsiStatusRequest_ARG *status_request; in rose_dec_etsi_StatusRequest_ARG() local 933 status_request = &args->etsi.StatusRequest; in rose_dec_etsi_StatusRequest_ARG() 938 status_request->compatibility_mode = value; in rose_dec_etsi_StatusRequest_ARG() 943 &status_request->q931ie, sizeof(status_request->q931ie_contents))); in rose_dec_etsi_StatusRequest_ARG()
|
/dports/security/gnutls/gnutls-3.6.16/doc/functions/ |
H A D | gnutls_ocsp_status_request_enable_client | 15 from the server, using the "status_request" TLS extension. Only
|
/dports/net/wireshark/wireshark-3.6.1/epan/dissectors/ |
H A D | packet-netbios.c | 628 guint8 status_request = tvb_get_guint8( tvb, offset + NB_DATA1); in dissect_netb_status_query() local 630 switch (status_request) { in dissect_netb_status_query() 634 status_request, "NetBIOS 1.x or 2.0"); in dissect_netb_status_query() 639 status_request, "NetBIOS 2.1, initial status request"); in dissect_netb_status_query() 644 status_request, "NetBIOS 2.1, %u names received so far", in dissect_netb_status_query() 645 status_request); in dissect_netb_status_query()
|
/dports/net/wireshark-lite/wireshark-3.6.1/epan/dissectors/ |
H A D | packet-netbios.c | 628 guint8 status_request = tvb_get_guint8( tvb, offset + NB_DATA1); in dissect_netb_status_query() local 630 switch (status_request) { in dissect_netb_status_query() 634 status_request, "NetBIOS 1.x or 2.0"); in dissect_netb_status_query() 639 status_request, "NetBIOS 2.1, initial status request"); in dissect_netb_status_query() 644 status_request, "NetBIOS 2.1, %u names received so far", in dissect_netb_status_query() 645 status_request); in dissect_netb_status_query()
|