Home
last modified time | relevance | path

Searched refs:response (Results 1 – 25 of 66) sorted by relevance

123

/openssl-master/doc/man3/
A DSSL_CTX_set_tlsext_status_cb.pod38 A client application may request that a server send back an OCSP status response
49 with the returned OCSP response by calling SSL_CTX_set_tlsext_status_cb(). The
50 callback function should determine whether the returned OCSP response is
66 The response returned by the server can be obtained via a call to
68 to the OCSP response data and the return value will be the length of that data.
71 response data then B<*resp> will be NULL and the return value from
78 obtain the OCSP response to be sent back; and then set that response data by
86 error; 0 if the response is not acceptable (in which case the handshake will
90 SSL_TLSEXT_ERR_OK (meaning that the OCSP response that has been set should be
91 returned), SSL_TLSEXT_ERR_NOACK (meaning that an OCSP response should not be
[all …]
A DOSSL_HTTP_REQ_CTX.pod64 the B<BIO> to read/receive the response from (I<rbio>, which may be equal to
65 I<wbio>), and the maximum expected response header line length I<buf_size>.
89 of the HTTP client on the response.
94 is included in the HTTP header of the response and return an error if not.
130 and to gather the response via HTTP, using the I<wbio> and I<rbio>
143 If an ASN.1-encoded response was expected, this is the BIO
147 and this BIO has been read past the end of the response headers,
148 such that the actual response body can be read via this BIO,
156 reading the response headers. If the response was expected to be ASN.1 encoded,
164 response content length for I<rctx> to I<len>. If not set or I<len> is 0
[all …]
A DOCSP_response_status.pod9 - OCSP response functions
36 OCSP_response_status() returns the OCSP response status of I<resp>. It returns
46 I<status> and optionally including basic response I<bs>.
48 OCSP_RESPONSE_free() frees up OCSP response I<resp>.
75 OCSP_basic_sign() signs OCSP response I<brsp> using certificate I<signer>, private key
77 I<OCSP_NOCERTS> is set then no certificates will be included in the response. If the
79 rather than by name. OCSP_basic_sign_ctx() also signs OCSP response I<brsp> but
103 OCSP_response_get1_basic() is only called if the status of a response is
A DOSSL_HTTP_transfer.pod63 and for exchanging one or more request and response.
69 a response or indicate a waiting condition via I<rbio>.
149 and expectations on the response using the following parameters.
160 a structure in ASN.1 encoding will be expected as response content.
162 response content length, where the value 0 indicates no limit.
170 after receiving a response, which is the default behavior for HTTP 1.0.
175 OSSL_HTTP_exchange() exchanges any form of HTTP request and response
187 and for not exceeding any given maximum response length.
188 If an ASN.1-encoded response is expected, the function returns on success
191 which allows a response of indefinite length and may support streaming.
[all …]
A DOCSP_sendreq_new.pod39 These functions perform an OCSP POST request / response transfer over HTTP,
44 optionally the OCSP request I<req>, and a response header maximum line length
55 and to gather the response via HTTP, using the BIO I<io> and I<path>
57 If the operation gets completed it assigns the response,
65 response header maximum line length 4k. It waits indefinitely on a response.
A DOCSP_request_add1_nonce.pod23 it adds a nonce to OCSP basic response B<resp>.
40 returned. If a nonce is present in the response only 3 is returned. If nonces
50 by checking the same nonce value appears in the response.
55 Some responders cache OCSP responses and do not sign each response for
60 and match, both absent or present in the response only. A nonzero return
A DOCSP_resp_find_status.pod12 - OCSP response utility functions
59 OCSP_resp_find_status() searches I<bs> for an OCSP response for I<id>. If it is
60 successful the fields of the response are returned in I<*status>, I<*reason>,
84 single response I<bs>.
96 is included in the B<certs> field of the response, so additional certificates
98 signed the response are known via some out-of-band mechanism.
115 OCSP_basic_verify() checks that the basic response message I<bs> is correctly
118 The function first tries to find the signer certificate of the response
188 An OCSP response for a certificate contains B<thisUpdate> and B<nextUpdate>
192 would otherwise mean an ancient response would be considered valid: the
A DBIO_meth_new.pod83 will be called in response to the application calling BIO_write_ex() or
92 be called in response to the application calling BIO_read_ex() or BIO_read().
101 called in response to the application calling BIO_puts(). The parameters for
106 page for more information). This function will be called in response to the
112 more information. This function will be called in response to the application
118 called in response to the application calling BIO_new() and passing
125 called in response to the application calling BIO_free(). A pointer to the BIO
133 in response to the application calling BIO_callback_ctrl(). The parameters for
A DTS_VERIFY_CTX_set_certs.pod6 - set certificates for TS response verification
25 In TSP, when a server is sending a response to a client, the server normally
26 needs to sign the response data - the TimeStampToken (TST) - with its private
A DDSA_meth_new.pod131 called in response to the application calling DSA_do_sign() (or DSA_sign()). The
136 will be called in response to the application calling DSA_sign_setup(). The
141 response to the application calling DSA_do_verify() (or DSA_verify()). The
164 called in response to the application calling DSA_new() (if the current default
172 called in response to the application calling DSA_free(). A pointer to the DSA
179 response to the application calling DSA_generate_parameters_ex() (or
185 called in response to the application calling DSA_generate_key(). The parameter
A DTS_RESP_CTX_new.pod6 TS_RESP_CTX_free - Timestamp response context object creation
18 Creates a response context that can be used for generating responses.
A DRSA_meth_new.pod170 called in response to the application calling RSA_sign(). The
175 function will be called in response to the application calling
194 be called in response to the application calling RSA_new() (if the
203 This function will be called in response to the application calling
211 function will be called in response to the application calling
217 respectively. This function will be called in response to the application calling
226 These functions will be called in response to the application calling
A DOSSL_CMP_MSG_http_perform.pod6 - client-side HTTP(S) transfer of a CMP request-response pair
22 On success the function returns the server's response PKIMessage.
A DDH_meth_new.pod102 be called in response to the application calling DH_generate_key(). The
107 will be called in response to the application calling DH_compute_key(). The
122 called in response to the application calling DH_new() (if the current default
130 called in response to the application calling DH_free(). A pointer to the DH
137 called in response to the application calling DH_generate_parameters_ex() (or
A DX509_load_http.pod31 internal one for connecting, writing the request, and reading the response.
34 B<bio> is used for writing the request, and B<rbio> for reading the response.
A DSSL_CTX_set_stateless_cookie_generate_cb.pod43 provided to clients in the HelloRetryRequest transmitted as a response to a
59 as a response to a ClientHello with a missing or invalid cookie.
A DSSL_get0_peer_scts.pod17 a given B<SSL> instance, it will examine the TLS extensions, OCSP response and
/openssl-master/doc/man1/
A Dopenssl-ts.pod.in39 [B<-in> I<response.tsr>]
41 [B<-out> I<response.tsr>]
51 [B<-in> I<response.tsr>]
173 response. (Optional)
198 A timestamp response (TimeStampResp) consists of a response status
264 =item B<-in> I<response.tsr>
280 =item B<-out> I<response.tsr>
329 =item B<-in> I<response.tsr>
405 each response. If the file does not exist at the time of response
507 in the response:
[all …]
A Dopenssl-ocsp.pod.in153 Write out the DER encoded certificate request or response to I<file>.
229 Don't attempt to verify the OCSP response signature or the nonce
241 Don't check the signature on the OCSP response. Since this option
253 Do not use certificates in the response as additional untrusted CA
270 in an OCSP response. Each certificate status response includes a B<notBefore>
344 Additional certificates to include in the OCSP response.
354 The digest to use when signing the response.
363 Don't include any certificates in the OCSP response.
393 each child is willing to wait for the client's OCSP response.
473 response to a file, print it out in text form, and verify the response:
[all …]
A Dtsget.pod28 timestamp response in a file. It cannot be used for creating the requests
45 It expects a response of type application/timestamp-reply, which is
65 server. The timestamp response will be written to the given output file. '-'
144 Get a timestamp response for F<file1.tsq> over HTTP, output is written to
149 Get a timestamp response for F<file1.tsq> and F<file2.tsq> over HTTP showing
156 write the response to F<file3.tsr>:
162 Get a timestamp response for F<file1.tsq> over HTTPS without client
168 Get a timestamp response for F<file1.tsq> over HTTPS with certificate-based
/openssl-master/apps/
A Dts.c591 TS_RESP *response = NULL; in reply_command() local
602 response = read_PKCS7(in_bio); in reply_command()
609 if (response != NULL) in reply_command()
614 if (response == NULL) in reply_command()
651 TS_RESP_free(response); in reply_command()
698 TS_RESP *response = NULL; in create_response() local
752 TS_RESP_free(response); in create_response()
753 response = NULL; in create_response()
757 return response; in create_response()
854 TS_RESP *response = NULL; in verify_command() local
[all …]
/openssl-master/crypto/ts/
A Dts_rsp_sign.c318 if (!TS_RESP_set_status_info(ctx->response, si)) in TS_RESP_CTX_set_status_info()
378 TS_RESP *response; in TS_RESP_create_response() local
383 if ((ctx->response = TS_RESP_new()) == NULL) { in TS_RESP_create_response()
410 if (ctx->response != NULL) { in TS_RESP_create_response()
415 TS_RESP_free(ctx->response); in TS_RESP_create_response()
416 ctx->response = NULL; in TS_RESP_create_response()
420 response = ctx->response; in TS_RESP_create_response()
423 return response; in TS_RESP_create_response()
430 ctx->response = NULL; in ts_RESP_CTX_init()
439 TS_RESP_free(ctx->response); in ts_RESP_CTX_cleanup()
[all …]
A Dts_rsp_verify.c26 static int ts_check_status_info(TS_RESP *response);
249 int TS_RESP_verify_response(TS_VERIFY_CTX *ctx, TS_RESP *response) in TS_RESP_verify_response() argument
251 PKCS7 *token = response->token; in TS_RESP_verify_response()
252 TS_TST_INFO *tst_info = response->tst_info; in TS_RESP_verify_response()
255 if (!ts_check_status_info(response)) in TS_RESP_verify_response()
351 static int ts_check_status_info(TS_RESP *response) in ts_check_status_info() argument
353 TS_STATUS_INFO *info = response->status_info; in ts_check_status_info()
A Dts_local.h125 TS_RESP *response; member
/openssl-master/crypto/ocsp/
A Docsp_local.h84 ASN1_OCTET_STRING *response; member

Completed in 28 milliseconds

123