Home
last modified time | relevance | path

Searched refs:sct (Results 1 – 25 of 29) sorted by relevance

12

/third_party/openssl/crypto/ct/
Dct_sct.c24 SCT *sct = OPENSSL_zalloc(sizeof(*sct)); in SCT_new() local
26 if (sct == NULL) { in SCT_new()
31 sct->entry_type = CT_LOG_ENTRY_TYPE_NOT_SET; in SCT_new()
32 sct->version = SCT_VERSION_NOT_SET; in SCT_new()
33 return sct; in SCT_new()
36 void SCT_free(SCT *sct) in SCT_free() argument
38 if (sct == NULL) in SCT_free()
41 OPENSSL_free(sct->log_id); in SCT_free()
42 OPENSSL_free(sct->ext); in SCT_free()
43 OPENSSL_free(sct->sig); in SCT_free()
[all …]
Dct_oct.c24 int o2i_SCT_signature(SCT *sct, const unsigned char **in, size_t len) in o2i_SCT_signature() argument
30 if (sct->version != SCT_VERSION_V1) { in o2i_SCT_signature()
48 sct->hash_alg = *p++; in o2i_SCT_signature()
49 sct->sig_alg = *p++; in o2i_SCT_signature()
50 if (SCT_get_signature_nid(sct) == NID_undef) { in o2i_SCT_signature()
62 if (SCT_set1_signature(sct, p, siglen) != 1) in o2i_SCT_signature()
72 SCT *sct = NULL; in o2i_SCT() local
80 if ((sct = SCT_new()) == NULL) in o2i_SCT()
85 sct->version = *p; in o2i_SCT()
86 if (sct->version == SCT_VERSION_V1) { in o2i_SCT()
[all …]
Dct_prn.c19 static void SCT_signature_algorithms_print(const SCT *sct, BIO *out) in SCT_signature_algorithms_print() argument
21 int nid = SCT_get_signature_nid(sct); in SCT_signature_algorithms_print()
24 BIO_printf(out, "%02X%02X", sct->hash_alg, sct->sig_alg); in SCT_signature_algorithms_print()
50 const char *SCT_validation_status_string(const SCT *sct) in SCT_validation_status_string() argument
53 switch (SCT_get_validation_status(sct)) { in SCT_validation_status_string()
70 void SCT_print(const SCT *sct, BIO *out, int indent, in SCT_print() argument
76 log = CTLOG_STORE_get0_log_by_id(log_store, sct->log_id, in SCT_print()
77 sct->log_id_len); in SCT_print()
83 if (sct->version != SCT_VERSION_V1) { in SCT_print()
85 BIO_hex_string(out, indent + 16, 16, sct->sct, sct->sct_len); in SCT_print()
[all …]
Dct_vfy.c29 static int sct_ctx_update(EVP_MD_CTX *ctx, const SCT_CTX *sctx, const SCT *sct) in sct_ctx_update() argument
47 if (sct->entry_type == CT_LOG_ENTRY_TYPE_NOT_SET) in sct_ctx_update()
49 if (sct->entry_type == CT_LOG_ENTRY_TYPE_PRECERT && sctx->ihash == NULL) in sct_ctx_update()
53 *p++ = sct->version; in sct_ctx_update()
55 l2n8(sct->timestamp, p); in sct_ctx_update()
56 s2n(sct->entry_type, p); in sct_ctx_update()
61 if (sct->entry_type == CT_LOG_ENTRY_TYPE_X509) { in sct_ctx_update()
86 s2n(sct->ext_len, p); in sct_ctx_update()
90 if (sct->ext_len && !EVP_DigestUpdate(ctx, sct->ext, sct->ext_len)) in sct_ctx_update()
96 int SCT_CTX_verify(const SCT_CTX *sctx, const SCT *sct) in SCT_CTX_verify() argument
[all …]
Dct_b64.c68 SCT *sct = SCT_new(); in SCT_new_from_base64() local
73 if (sct == NULL) { in SCT_new_from_base64()
82 if (!SCT_set_version(sct, version)) { in SCT_new_from_base64()
92 if (!SCT_set0_log_id(sct, dec, declen)) in SCT_new_from_base64()
101 SCT_set0_extensions(sct, dec, declen); in SCT_new_from_base64()
111 if (o2i_SCT_signature(sct, &p, declen) <= 0) in SCT_new_from_base64()
116 SCT_set_timestamp(sct, timestamp); in SCT_new_from_base64()
118 if (!SCT_set_log_entry_type(sct, entry_type)) in SCT_new_from_base64()
121 return sct; in SCT_new_from_base64()
125 SCT_free(sct); in SCT_new_from_base64()
Dct_local.h60 unsigned char *sct; member
171 __owur int SCT_CTX_verify(const SCT_CTX *sctx, const SCT *sct);
177 __owur int SCT_is_complete(const SCT *sct);
185 __owur int SCT_signature_is_complete(const SCT *sct);
200 __owur int i2o_SCT_signature(const SCT *sct, unsigned char **out);
211 __owur int o2i_SCT_signature(SCT *sct, const unsigned char **in, size_t len);
/third_party/openssl/include/openssl/
Dct.h141 void SCT_free(SCT *sct);
152 sct_version_t SCT_get_version(const SCT *sct);
158 __owur int SCT_set_version(SCT *sct, sct_version_t version);
163 ct_log_entry_type_t SCT_get_log_entry_type(const SCT *sct);
169 __owur int SCT_set_log_entry_type(SCT *sct, ct_log_entry_type_t entry_type);
176 size_t SCT_get0_log_id(const SCT *sct, unsigned char **log_id);
183 __owur int SCT_set0_log_id(SCT *sct, unsigned char *log_id, size_t log_id_len);
190 __owur int SCT_set1_log_id(SCT *sct, const unsigned char *log_id,
196 uint64_t SCT_get_timestamp(const SCT *sct);
201 void SCT_set_timestamp(SCT *sct, uint64_t timestamp);
[all …]
/third_party/openssl/doc/man3/
DSCT_new.pod46 void SCT_free(SCT *sct);
49 sct_version_t SCT_get_version(const SCT *sct);
50 int SCT_set_version(SCT *sct, sct_version_t version);
52 ct_log_entry_type_t SCT_get_log_entry_type(const SCT *sct);
53 int SCT_set_log_entry_type(SCT *sct, ct_log_entry_type_t entry_type);
55 size_t SCT_get0_log_id(const SCT *sct, unsigned char **log_id);
56 int SCT_set0_log_id(SCT *sct, unsigned char *log_id, size_t log_id_len);
57 int SCT_set1_log_id(SCT *sct, const unsigned char *log_id, size_t log_id_len);
59 uint64_t SCT_get_timestamp(const SCT *sct);
60 void SCT_set_timestamp(SCT *sct, uint64_t timestamp);
[all …]
DSCT_print.pod12 void SCT_print(const SCT *sct, BIO *out, int indent, const CTLOG_STORE *logs);
15 const char *SCT_validation_status_string(const SCT *sct);
DSCT_validate.pod21 int SCT_validate(SCT *sct, const CT_POLICY_EVAL_CTX *ctx);
23 sct_validation_status_t SCT_get_validation_status(const SCT *sct);
Do2i_SCT_LIST.pod16 int i2o_SCT(const SCT *sct, unsigned char **out);
/third_party/toybox/toys/pending/
Dman.c35 char any, cell, ex, *f, k_done, *line, *m, **sct, **scts, **sufs;
142 if (*++TT.sct) return 0; in manpath()
144 TT.sct = TT.scts; in manpath()
152 char *s = xmprintf("%s/man%s/%s.%s.bz2", TT.m, *TT.sct, name, *TT.sct), **suf; in tryfile()
168 TT.sct = TT.scts - 1; // First manpath() read increments. in man_main()
181 d = xmprintf("%s/man%s", TT.m, *TT.sct); in man_main()
207 TT.scts = (char *[]){*toys.optargs, 0}, TT.sct = TT.scts - 1; in man_main()
209 if (fd == -1) error_exit("section %s no %s", *--TT.sct, toys.optargs[1]); in man_main()
/third_party/openssl/test/
Dct_test.c125 static int compare_sct_list_printout(STACK_OF(SCT) *sct, in compare_sct_list_printout() argument
135 SCT_LIST_print(sct, text_buffer, 0, "\n", NULL); in compare_sct_list_printout()
224 SCT *sct = NULL; in execute_cert_test() local
322 SCT_free(sct); in execute_cert_test()
456 SCT *sct = NULL; in test_encode_tls_sct() local
463 if (!TEST_ptr(sct = SCT_new_from_base64(SCT_VERSION_V1, log_id, in test_encode_tls_sct()
469 sk_SCT_push(fixture->sct_list, sct); in test_encode_tls_sct()
/third_party/f2fs-tools/tools/sg_write_buffer/include/
Dfreebsd_nvme_ioctl.h73 uint16_t sct : 3; /* status code type */ member
153 ((cpl)->status.sc != 0 || (cpl)->status.sct != 0)
/third_party/boringssl/src/ssl/
Dtls13_both.cc239 CBS status_request, sct; in tls13_process_certificate() local
242 {TLSEXT_TYPE_certificate_timestamp, &have_sct, &sct}, in tls13_process_certificate()
290 if (!ssl_is_sct_list_valid(&sct)) { in tls13_process_certificate()
298 CRYPTO_BUFFER_new_from_CBS(&sct, ssl->ctx->pool)); in tls13_process_certificate()
/third_party/flutter/skia/tests/
DReadPixelsTest.cpp662 for (int sct = 0; sct <= kLastEnum_SkColorType; ++sct) { in DEF_GPUTEST_FOR_RENDERING_CONTEXTS() local
663 auto surfCT = static_cast<SkColorType>(sct); in DEF_GPUTEST_FOR_RENDERING_CONTEXTS()
/third_party/skia/tests/
DReadWritePixelsGpuTest.cpp410 for (int sct = 0; sct <= kLastEnum_SkColorType; ++sct) { in gpu_read_pixels_test_driver() local
411 const auto srcCT = static_cast<SkColorType>(sct); in gpu_read_pixels_test_driver()
461 srcCTTestedThoroughly[sct] && readCTTestedThoroughly[rct] in gpu_read_pixels_test_driver()
470 srcCTTestedThoroughly[sct] = true; in gpu_read_pixels_test_driver()
/third_party/nghttp2/doc/bash_completion/
Dnghttpx11 …-mruby-error --ecdh-curves --no-kqueue --help --frontend-frame-debug --tls-sct-dir --pid-file --fr…
/third_party/nghttp2/doc/
Dnghttpx.1.rst678 available <PARAM> is "sct-dir=<DIR>".
680 "sct-dir=<DIR>" specifies the path to directory which
681 contains \*.sct files for TLS
684 :option:`--tls-sct-dir` option.
942 .. option:: --tls-sct-dir=<DIR>
944 Specifies the directory where \*.sct files exist. All
945 \*.sct files in <DIR> are read, and sent as
947 6962) to client. These \*.sct files are for the
1843 are :option:`--tls-sct-dir` and ``sct-dir`` parameter in
1845 files whose extension is ``.sct`` under the directory. The ``*.sct``
Dnghttpx.h2r264 are :option:`--tls-sct-dir` and ``sct-dir`` parameter in
266 files whose extension is ``.sct`` under the directory. The ``*.sct``
/third_party/openssl/ssl/
Dssl_lib.c4687 SCT *sct = NULL; in ct_move_scts() local
4697 while ((sct = sk_SCT_pop(src)) != NULL) { in ct_move_scts()
4698 if (SCT_set_source(sct, origin) != 1) in ct_move_scts()
4701 if (sk_SCT_push(*dst, sct) <= 0) in ct_move_scts()
4708 if (sct != NULL) in ct_move_scts()
4709 sk_SCT_push(src, sct); /* Put the SCT back */ in ct_move_scts()
4843 SCT *sct = sk_SCT_value(scts, i); in ct_strict() local
4844 int status = SCT_get_validation_status(sct); in ct_strict()
/third_party/openssl/crypto/err/
Dopenssl.txt2070 CT_R_SCT_FUTURE_TIMESTAMP:116:sct future timestamp
2071 CT_R_SCT_INVALID:104:sct invalid
2072 CT_R_SCT_INVALID_SIGNATURE:107:sct invalid signature
2073 CT_R_SCT_LIST_INVALID:105:sct list invalid
2074 CT_R_SCT_LOG_ID_MISMATCH:114:sct log id mismatch
2075 CT_R_SCT_NOT_SET:106:sct not set
2076 CT_R_SCT_UNSUPPORTED_VERSION:115:sct unsupported version
2818 SSL_R_SCT_VERIFICATION_FAILED:208:sct verification failed
/third_party/e2fsprogs/doc/RelNotes/
Dv1.20.txt179 Added build-rpm script from sct.
/third_party/toybox/generated/
Dglobals.h722 char any, cell, ex, *f, k_done, *line, *m, **sct, **scts, **sufs; member
/third_party/openssl/apps/
Ds_client.c3244 SCT *sct = sk_SCT_value(scts, i); in print_stuff() local
3247 SCT_validation_status_string(sct)); in print_stuff()
3248 SCT_print(sct, bio, 0, log_store); in print_stuff()

12