/external/boringssl/src/ssl/ |
tls13_both.cc | 194 CBS ocsp_response; local 197 !CBS_get_u24_length_prefixed(&status_request, &ocsp_response) || 198 CBS_len(&ocsp_response) == 0 || 205 CRYPTO_BUFFER_free(hs->new_session->ocsp_response); 206 hs->new_session->ocsp_response = 207 CRYPTO_BUFFER_new_from_CBS(&ocsp_response, ssl->ctx->pool); 208 if (hs->new_session->ocsp_response == nullptr) { 396 ssl->cert->ocsp_response != NULL) { 397 CBB contents, ocsp_response; local 401 !CBB_add_u24_length_prefixed(&contents, &ocsp_response) || [all...] |
ssl_cert.cc | 193 if (cert->ocsp_response != NULL) { 194 CRYPTO_BUFFER_up_ref(cert->ocsp_response); 195 ret->ocsp_response = cert->ocsp_response; 234 CRYPTO_BUFFER_free(cert->ocsp_response); 891 CRYPTO_BUFFER_free(ctx->cert->ocsp_response); 892 ctx->cert->ocsp_response = CRYPTO_BUFFER_new(response, response_len, NULL); 893 return ctx->cert->ocsp_response != NULL; 898 CRYPTO_BUFFER_free(ssl->cert->ocsp_response); 899 ssl->cert->ocsp_response = CRYPTO_BUFFER_new(response, response_len, NULL) [all...] |
ssl_asn1.cc | 307 if (in->ocsp_response != nullptr) { 310 CRYPTO_BUFFER_data(in->ocsp_response), 311 CRYPTO_BUFFER_len(in->ocsp_response))) { 650 !SSL_SESSION_parse_crypto_buffer(&session, &ret->ocsp_response,
|
handshake_server.cc | 769 CBB body, ocsp_response; local 773 !CBB_add_u24_length_prefixed(&body, &ocsp_response) || 774 !CBB_add_bytes(&ocsp_response, 775 CRYPTO_BUFFER_data(ssl->cert->ocsp_response), 776 CRYPTO_BUFFER_len(ssl->cert->ocsp_response)) || [all...] |
ssl_session.cc | 231 if (session->ocsp_response != NULL) { 232 new_session->ocsp_response = session->ocsp_response; 233 CRYPTO_BUFFER_up_ref(new_session->ocsp_response); 893 CRYPTO_BUFFER_free(session->ocsp_response); [all...] |
handshake_client.cc | 873 CBS certificate_status = msg.body, ocsp_response; local 877 !CBS_get_u24_length_prefixed(&certificate_status, &ocsp_response) || 878 CBS_len(&ocsp_response) == 0 || 885 CRYPTO_BUFFER_free(hs->new_session->ocsp_response); 886 hs->new_session->ocsp_response = 887 CRYPTO_BUFFER_new_from_CBS(&ocsp_response, ssl->ctx->pool); 888 if (hs->new_session->ocsp_response == nullptr) { [all...] |
handshake.cc | 320 set_crypto_buffer(&hs->new_session->ocsp_response, 321 prev_session->ocsp_response);
|
ssl_lib.cc | [all...] |
t1_lib.cc | [all...] |
internal.h | 1759 CRYPTO_BUFFER *ocsp_response; member in struct:bssl::CERT [all...] |
/external/conscrypt/platform/src/main/java/org/conscrypt/ct/ |
SignedCertificateTimestamp.java | 44 OCSP_RESPONSE
|
CTVerifier.java | 231 SignedCertificateTimestamp.Origin.OCSP_RESPONSE);
|
/external/boringssl/src/ssl/test/ |
test_config.h | 106 std::string ocsp_response; member in struct:TestConfig
|
test_config.cc | 171 { "-ocsp-response", &TestConfig::ocsp_response },
|
bssl_shim.cc | 497 if (!config->ocsp_response.empty() && 498 !SSL_set_ocsp_response(ssl, (const uint8_t *)config->ocsp_response.data(), 499 config->ocsp_response.size())) { [all...] |
/external/conscrypt/platform/src/test/java/org/conscrypt/ct/ |
CTVerifierTest.java | 157 assertEquals(SignedCertificateTimestamp.Origin.OCSP_RESPONSE,
|
/external/scapy/test/ |
x509.uts | 219 response = OCSP_Response(s)
|
/external/scapy/scapy/layers/tls/ |
handshake.py | 21 from scapy.layers.x509 import OCSP_Response [all...] |
/external/wpa_supplicant_8/src/utils/ |
http_curl.c | 1050 static void ocsp_debug_print_resp(OCSP_RESPONSE *rsp) 1098 OCSP_RESPONSE *rsp; [all...] |
/external/scapy/scapy/layers/ |
x509.py | [all...] |
/external/wpa_supplicant_8/src/crypto/ |
tls_openssl.c | [all...] |
/external/conscrypt/common/src/jni/main/cpp/conscrypt/ |
native_crypto.cc | 8965 CBS ocsp_response; local [all...] |
/external/curl/lib/vtls/ |
openssl.c | [all...] |
/prebuilts/gcc/linux-x86/host/x86_64-w64-mingw32-4.8/x86_64-w64-mingw32/include/ |
wincrypt.h | [all...] |
/external/boringssl/src/include/openssl/ |
ssl.h | 4204 CRYPTO_BUFFER *ocsp_response; member in struct:ssl_session_st [all...] |