HomeSort by relevance Sort by last modified time
    Searched defs:ocsp (Results 1 - 10 of 10) sorted by null

  /external/wpa_supplicant_8/src/eap_peer/
eap_config.h 704 * ocsp - Whether to use/require OCSP to check server certificate
706 * 0 = do not use OCSP stapling (TLS certificate status extension)
707 * 1 = try to use OCSP stapling, but not require response
708 * 2 = require valid OCSP stapling response
710 int ocsp; member in struct:eap_peer_config
  /prebuilts/devtools/tools/lib/
bcpkix-jdk15on-1.48.jar 
bcprov-jdk15on-1.48.jar 
  /prebuilts/tools/common/m2/repository/org/bouncycastle/bcpkix-jdk15on/1.48/
bcpkix-jdk15on-1.48.jar 
  /prebuilts/tools/common/offline-m2/org/bouncycastle/bcpkix-jdk15on/1.48/
bcpkix-jdk15on-1.48.jar 
  /external/wpa_supplicant_8/src/utils/
http_curl.c 21 #include <openssl/ocsp.h>
50 } ocsp; member in struct:http_ctx
1015 wpa_printf(MSG_MSGDUMP, "OpenSSL: OCSP Response\n%s", txt);
1050 wpa_printf(MSG_DEBUG, "OpenSSL: No OCSP response received");
1051 if (ctx->ocsp == MANDATORY_OCSP)
1052 ctx->last_err = "No OCSP response received";
1053 return (ctx->ocsp == MANDATORY_OCSP) ? 0 : 1;
1056 wpa_hexdump(MSG_DEBUG, "OpenSSL: OCSP response", p, len);
1060 wpa_printf(MSG_INFO, "OpenSSL: Failed to parse OCSP response");
1061 ctx->last_err = "Failed to parse OCSP response"
    [all...]
  /external/wpa_supplicant_8/wpa_supplicant/
config.h 294 * ocsp - Whether to use/require OCSP to check server certificate
296 * 0 = do not use OCSP stapling (TLS certificate status extension)
297 * 1 = try to use OCSP stapling, but not require response
298 * 2 = require valid OCSP stapling response
300 int ocsp; member in struct:wpa_cred
    [all...]
  /external/google-tv-pairing-protocol/java/jar/
bcprov-jdk15-143.jar 
  /prebuilts/tools/common/m2/repository/org/bouncycastle/bcprov-jdk15on/1.48/
bcprov-jdk15on-1.48.jar 
  /prebuilts/tools/common/offline-m2/org/bouncycastle/bcprov-jdk15on/1.48/
bcprov-jdk15on-1.48.jar 

Completed in 1430 milliseconds