HomeSort by relevance Sort by last modified time
    Searched defs:ocsp (Results 1 - 9 of 9) sorted by null

  /external/wpa_supplicant_8/src/eap_peer/
eap_config.h 665 * ocsp - Whether to use/require OCSP to check server certificate
667 * 0 = do not use OCSP stapling (TLS certificate status extension)
668 * 1 = try to use OCSP stapling, but not require response
669 * 2 = require valid OCSP stapling response
671 int ocsp; member in struct:eap_peer_config
  /external/chromium_org/third_party/tlslite/tlslite/
constants.py 49 ocsp = 1 variable in class:CertificateStatusType
  /prebuilts/devtools/tools/lib/
bcpkix-jdk15on-1.48.jar 
bcprov-jdk15on-1.48.jar 
  /prebuilts/tools/common/m2/repository/org/bouncycastle/bcpkix-jdk15on/1.48/
bcpkix-jdk15on-1.48.jar 
  /external/wpa_supplicant_8/src/utils/
http_curl.c 21 #include <openssl/ocsp.h>
50 } ocsp; member in struct:http_ctx
1012 wpa_printf(MSG_MSGDUMP, "OpenSSL: OCSP Response\n%s", txt);
1047 wpa_printf(MSG_DEBUG, "OpenSSL: No OCSP response received");
1048 if (ctx->ocsp == MANDATORY_OCSP)
1049 ctx->last_err = "No OCSP response received";
1050 return (ctx->ocsp == MANDATORY_OCSP) ? 0 : 1;
1053 wpa_hexdump(MSG_DEBUG, "OpenSSL: OCSP response", p, len);
1057 wpa_printf(MSG_INFO, "OpenSSL: Failed to parse OCSP response");
1058 ctx->last_err = "Failed to parse OCSP response"
    [all...]
  /external/wpa_supplicant_8/wpa_supplicant/
config.h 287 * ocsp - Whether to use/require OCSP to check server certificate
289 * 0 = do not use OCSP stapling (TLS certificate status extension)
290 * 1 = try to use OCSP stapling, but not require response
291 * 2 = require valid OCSP stapling response
293 int ocsp; member in struct:wpa_cred
    [all...]
  /external/google-tv-pairing-protocol/java/jar/
bcprov-jdk15-143.jar 
  /prebuilts/tools/common/m2/repository/org/bouncycastle/bcprov-jdk15on/1.48/
bcprov-jdk15on-1.48.jar 

Completed in 249 milliseconds