/third_party/openssl/crypto/ct/ |
D | ct_sct.c | 24 SCT *sct = OPENSSL_zalloc(sizeof(*sct)); in SCT_new() local 26 if (sct == NULL) { in SCT_new() 31 sct->entry_type = CT_LOG_ENTRY_TYPE_NOT_SET; in SCT_new() 32 sct->version = SCT_VERSION_NOT_SET; in SCT_new() 33 return sct; in SCT_new() 36 void SCT_free(SCT *sct) in SCT_free() argument 38 if (sct == NULL) in SCT_free() 41 OPENSSL_free(sct->log_id); in SCT_free() 42 OPENSSL_free(sct->ext); in SCT_free() 43 OPENSSL_free(sct->sig); in SCT_free() [all …]
|
D | ct_oct.c | 24 int o2i_SCT_signature(SCT *sct, const unsigned char **in, size_t len) in o2i_SCT_signature() argument 30 if (sct->version != SCT_VERSION_V1) { in o2i_SCT_signature() 48 sct->hash_alg = *p++; in o2i_SCT_signature() 49 sct->sig_alg = *p++; in o2i_SCT_signature() 50 if (SCT_get_signature_nid(sct) == NID_undef) { in o2i_SCT_signature() 62 if (SCT_set1_signature(sct, p, siglen) != 1) in o2i_SCT_signature() 72 SCT *sct = NULL; in o2i_SCT() local 80 if ((sct = SCT_new()) == NULL) in o2i_SCT() 85 sct->version = *p; in o2i_SCT() 86 if (sct->version == SCT_VERSION_V1) { in o2i_SCT() [all …]
|
D | ct_prn.c | 19 static void SCT_signature_algorithms_print(const SCT *sct, BIO *out) in SCT_signature_algorithms_print() argument 21 int nid = SCT_get_signature_nid(sct); in SCT_signature_algorithms_print() 24 BIO_printf(out, "%02X%02X", sct->hash_alg, sct->sig_alg); in SCT_signature_algorithms_print() 50 const char *SCT_validation_status_string(const SCT *sct) in SCT_validation_status_string() argument 53 switch (SCT_get_validation_status(sct)) { in SCT_validation_status_string() 70 void SCT_print(const SCT *sct, BIO *out, int indent, in SCT_print() argument 76 log = CTLOG_STORE_get0_log_by_id(log_store, sct->log_id, in SCT_print() 77 sct->log_id_len); in SCT_print() 83 if (sct->version != SCT_VERSION_V1) { in SCT_print() 85 BIO_hex_string(out, indent + 16, 16, sct->sct, sct->sct_len); in SCT_print() [all …]
|
D | ct_vfy.c | 29 static int sct_ctx_update(EVP_MD_CTX *ctx, const SCT_CTX *sctx, const SCT *sct) in sct_ctx_update() argument 47 if (sct->entry_type == CT_LOG_ENTRY_TYPE_NOT_SET) in sct_ctx_update() 49 if (sct->entry_type == CT_LOG_ENTRY_TYPE_PRECERT && sctx->ihash == NULL) in sct_ctx_update() 53 *p++ = sct->version; in sct_ctx_update() 55 l2n8(sct->timestamp, p); in sct_ctx_update() 56 s2n(sct->entry_type, p); in sct_ctx_update() 61 if (sct->entry_type == CT_LOG_ENTRY_TYPE_X509) { in sct_ctx_update() 86 s2n(sct->ext_len, p); in sct_ctx_update() 90 if (sct->ext_len && !EVP_DigestUpdate(ctx, sct->ext, sct->ext_len)) in sct_ctx_update() 96 int SCT_CTX_verify(const SCT_CTX *sctx, const SCT *sct) in SCT_CTX_verify() argument [all …]
|
D | ct_b64.c | 68 SCT *sct = SCT_new(); in SCT_new_from_base64() local 73 if (sct == NULL) { in SCT_new_from_base64() 82 if (!SCT_set_version(sct, version)) { in SCT_new_from_base64() 92 if (!SCT_set0_log_id(sct, dec, declen)) in SCT_new_from_base64() 101 SCT_set0_extensions(sct, dec, declen); in SCT_new_from_base64() 111 if (o2i_SCT_signature(sct, &p, declen) <= 0) in SCT_new_from_base64() 116 SCT_set_timestamp(sct, timestamp); in SCT_new_from_base64() 118 if (!SCT_set_log_entry_type(sct, entry_type)) in SCT_new_from_base64() 121 return sct; in SCT_new_from_base64() 125 SCT_free(sct); in SCT_new_from_base64()
|
D | ct_local.h | 60 unsigned char *sct; member 171 __owur int SCT_CTX_verify(const SCT_CTX *sctx, const SCT *sct); 177 __owur int SCT_is_complete(const SCT *sct); 185 __owur int SCT_signature_is_complete(const SCT *sct); 200 __owur int i2o_SCT_signature(const SCT *sct, unsigned char **out); 211 __owur int o2i_SCT_signature(SCT *sct, const unsigned char **in, size_t len);
|
/third_party/openssl/include/openssl/ |
D | ct.h | 141 void SCT_free(SCT *sct); 152 sct_version_t SCT_get_version(const SCT *sct); 158 __owur int SCT_set_version(SCT *sct, sct_version_t version); 163 ct_log_entry_type_t SCT_get_log_entry_type(const SCT *sct); 169 __owur int SCT_set_log_entry_type(SCT *sct, ct_log_entry_type_t entry_type); 176 size_t SCT_get0_log_id(const SCT *sct, unsigned char **log_id); 183 __owur int SCT_set0_log_id(SCT *sct, unsigned char *log_id, size_t log_id_len); 190 __owur int SCT_set1_log_id(SCT *sct, const unsigned char *log_id, 196 uint64_t SCT_get_timestamp(const SCT *sct); 201 void SCT_set_timestamp(SCT *sct, uint64_t timestamp); [all …]
|
/third_party/openssl/doc/man3/ |
D | SCT_new.pod | 46 void SCT_free(SCT *sct); 49 sct_version_t SCT_get_version(const SCT *sct); 50 int SCT_set_version(SCT *sct, sct_version_t version); 52 ct_log_entry_type_t SCT_get_log_entry_type(const SCT *sct); 53 int SCT_set_log_entry_type(SCT *sct, ct_log_entry_type_t entry_type); 55 size_t SCT_get0_log_id(const SCT *sct, unsigned char **log_id); 56 int SCT_set0_log_id(SCT *sct, unsigned char *log_id, size_t log_id_len); 57 int SCT_set1_log_id(SCT *sct, const unsigned char *log_id, size_t log_id_len); 59 uint64_t SCT_get_timestamp(const SCT *sct); 60 void SCT_set_timestamp(SCT *sct, uint64_t timestamp); [all …]
|
D | SCT_print.pod | 12 void SCT_print(const SCT *sct, BIO *out, int indent, const CTLOG_STORE *logs); 15 const char *SCT_validation_status_string(const SCT *sct);
|
D | SCT_validate.pod | 21 int SCT_validate(SCT *sct, const CT_POLICY_EVAL_CTX *ctx); 23 sct_validation_status_t SCT_get_validation_status(const SCT *sct);
|
D | o2i_SCT_LIST.pod | 16 int i2o_SCT(const SCT *sct, unsigned char **out);
|
/third_party/toybox/toys/pending/ |
D | man.c | 35 char any, cell, ex, *f, k_done, *line, *m, **sct, **scts, **sufs; 142 if (*++TT.sct) return 0; in manpath() 144 TT.sct = TT.scts; in manpath() 152 char *s = xmprintf("%s/man%s/%s.%s.bz2", TT.m, *TT.sct, name, *TT.sct), **suf; in tryfile() 168 TT.sct = TT.scts - 1; // First manpath() read increments. in man_main() 181 d = xmprintf("%s/man%s", TT.m, *TT.sct); in man_main() 207 TT.scts = (char *[]){*toys.optargs, 0}, TT.sct = TT.scts - 1; in man_main() 209 if (fd == -1) error_exit("section %s no %s", *--TT.sct, toys.optargs[1]); in man_main()
|
/third_party/openssl/test/ |
D | ct_test.c | 125 static int compare_sct_list_printout(STACK_OF(SCT) *sct, in compare_sct_list_printout() argument 135 SCT_LIST_print(sct, text_buffer, 0, "\n", NULL); in compare_sct_list_printout() 224 SCT *sct = NULL; in execute_cert_test() local 322 SCT_free(sct); in execute_cert_test() 456 SCT *sct = NULL; in test_encode_tls_sct() local 463 if (!TEST_ptr(sct = SCT_new_from_base64(SCT_VERSION_V1, log_id, in test_encode_tls_sct() 469 sk_SCT_push(fixture->sct_list, sct); in test_encode_tls_sct()
|
/third_party/f2fs-tools/tools/sg_write_buffer/include/ |
D | freebsd_nvme_ioctl.h | 73 uint16_t sct : 3; /* status code type */ member 153 ((cpl)->status.sc != 0 || (cpl)->status.sct != 0)
|
/third_party/boringssl/src/ssl/ |
D | tls13_both.cc | 239 CBS status_request, sct; in tls13_process_certificate() local 242 {TLSEXT_TYPE_certificate_timestamp, &have_sct, &sct}, in tls13_process_certificate() 290 if (!ssl_is_sct_list_valid(&sct)) { in tls13_process_certificate() 298 CRYPTO_BUFFER_new_from_CBS(&sct, ssl->ctx->pool)); in tls13_process_certificate()
|
/third_party/flutter/skia/tests/ |
D | ReadPixelsTest.cpp | 662 for (int sct = 0; sct <= kLastEnum_SkColorType; ++sct) { in DEF_GPUTEST_FOR_RENDERING_CONTEXTS() local 663 auto surfCT = static_cast<SkColorType>(sct); in DEF_GPUTEST_FOR_RENDERING_CONTEXTS()
|
/third_party/skia/tests/ |
D | ReadWritePixelsGpuTest.cpp | 410 for (int sct = 0; sct <= kLastEnum_SkColorType; ++sct) { in gpu_read_pixels_test_driver() local 411 const auto srcCT = static_cast<SkColorType>(sct); in gpu_read_pixels_test_driver() 461 srcCTTestedThoroughly[sct] && readCTTestedThoroughly[rct] in gpu_read_pixels_test_driver() 470 srcCTTestedThoroughly[sct] = true; in gpu_read_pixels_test_driver()
|
/third_party/nghttp2/doc/bash_completion/ |
D | nghttpx | 11 …-mruby-error --ecdh-curves --no-kqueue --help --frontend-frame-debug --tls-sct-dir --pid-file --fr…
|
/third_party/nghttp2/doc/ |
D | nghttpx.1.rst | 678 available <PARAM> is "sct-dir=<DIR>". 680 "sct-dir=<DIR>" specifies the path to directory which 681 contains \*.sct files for TLS 684 :option:`--tls-sct-dir` option. 942 .. option:: --tls-sct-dir=<DIR> 944 Specifies the directory where \*.sct files exist. All 945 \*.sct files in <DIR> are read, and sent as 947 6962) to client. These \*.sct files are for the 1843 are :option:`--tls-sct-dir` and ``sct-dir`` parameter in 1845 files whose extension is ``.sct`` under the directory. The ``*.sct``
|
D | nghttpx.h2r | 264 are :option:`--tls-sct-dir` and ``sct-dir`` parameter in 266 files whose extension is ``.sct`` under the directory. The ``*.sct``
|
/third_party/openssl/ssl/ |
D | ssl_lib.c | 4687 SCT *sct = NULL; in ct_move_scts() local 4697 while ((sct = sk_SCT_pop(src)) != NULL) { in ct_move_scts() 4698 if (SCT_set_source(sct, origin) != 1) in ct_move_scts() 4701 if (sk_SCT_push(*dst, sct) <= 0) in ct_move_scts() 4708 if (sct != NULL) in ct_move_scts() 4709 sk_SCT_push(src, sct); /* Put the SCT back */ in ct_move_scts() 4843 SCT *sct = sk_SCT_value(scts, i); in ct_strict() local 4844 int status = SCT_get_validation_status(sct); in ct_strict()
|
/third_party/openssl/crypto/err/ |
D | openssl.txt | 2070 CT_R_SCT_FUTURE_TIMESTAMP:116:sct future timestamp 2071 CT_R_SCT_INVALID:104:sct invalid 2072 CT_R_SCT_INVALID_SIGNATURE:107:sct invalid signature 2073 CT_R_SCT_LIST_INVALID:105:sct list invalid 2074 CT_R_SCT_LOG_ID_MISMATCH:114:sct log id mismatch 2075 CT_R_SCT_NOT_SET:106:sct not set 2076 CT_R_SCT_UNSUPPORTED_VERSION:115:sct unsupported version 2818 SSL_R_SCT_VERIFICATION_FAILED:208:sct verification failed
|
/third_party/e2fsprogs/doc/RelNotes/ |
D | v1.20.txt | 179 Added build-rpm script from sct.
|
/third_party/toybox/generated/ |
D | globals.h | 722 char any, cell, ex, *f, k_done, *line, *m, **sct, **scts, **sufs; member
|
/third_party/openssl/apps/ |
D | s_client.c | 3244 SCT *sct = sk_SCT_value(scts, i); in print_stuff() local 3247 SCT_validation_status_string(sct)); in print_stuff() 3248 SCT_print(sct, bio, 0, log_store); in print_stuff()
|