Home
last modified time | relevance | path

Searched refs:scts (Results 1 – 16 of 16) sorted by relevance

/third_party/openssl/test/ssl-tests/
D12-ct.conf5 test-0 = 0-ct-permissive-without-scts
6 test-1 = 1-ct-permissive-with-scts
7 test-2 = 2-ct-strict-without-scts
8 test-3 = 3-ct-strict-with-scts
13 [0-ct-permissive-without-scts]
14 ssl_conf = 0-ct-permissive-without-scts-ssl
16 [0-ct-permissive-without-scts-ssl]
17 server = 0-ct-permissive-without-scts-server
18 client = 0-ct-permissive-without-scts-client
20 [0-ct-permissive-without-scts-server]
[all …]
D12-ct.conf.in20 name => "ct-permissive-without-scts",
32 name => "ct-permissive-with-scts",
48 name => "ct-strict-without-scts",
61 name => "ct-strict-with-scts",
/third_party/openssl/fuzz/
Dct.c32 STACK_OF(SCT) *scts = d2i_SCT_LIST(NULL, pp, len); in FuzzerTestOneInput()
33 if (scts != NULL) { in FuzzerTestOneInput()
35 SCT_LIST_print(scts, bio, 4, "\n", NULL); in FuzzerTestOneInput()
38 if (i2d_SCT_LIST(scts, &der)) { in FuzzerTestOneInput()
43 SCT_LIST_free(scts); in FuzzerTestOneInput()
/third_party/openssl/test/
Dct_test.c178 static int assert_validity(CT_TEST_FIXTURE *fixture, STACK_OF(SCT) *scts, in assert_validity() argument
185 if (!TEST_int_ge(SCT_LIST_validate(scts, policy_ctx), 0)) in assert_validity()
188 for (i = 0; i < sk_SCT_num(scts); ++i) { in assert_validity()
189 SCT *sct_i = sk_SCT_value(scts, i); in assert_validity()
208 int unverified_sct_count = sk_SCT_num(scts) - in assert_validity()
223 STACK_OF(SCT) *scts = NULL; in execute_cert_test()
276 scts = X509V3_EXT_d2i(sct_extension); in execute_cert_test()
277 for (i = 0; i < sk_SCT_num(scts); ++i) { in execute_cert_test()
278 SCT *sct_i = sk_SCT_value(scts, i); in execute_cert_test()
287 if (!assert_validity(fixture, scts, ct_policy_ctx)) in execute_cert_test()
[all …]
/third_party/toybox/toys/pending/
Dman.c35 char any, cell, ex, *f, k_done, *line, *m, **sct, **scts, **sufs;
144 TT.sct = TT.scts; in manpath()
167 TT.scts = (char *[]) {"1", "8", "3", "2", "5", "4", "6", "7", 0}; in man_main()
168 TT.sct = TT.scts - 1; // First manpath() read increments. in man_main()
207 TT.scts = (char *[]){*toys.optargs, 0}, TT.sct = TT.scts - 1; in man_main()
/third_party/openssl/crypto/ct/
Dct_sct.c376 int SCT_LIST_validate(const STACK_OF(SCT) *scts, CT_POLICY_EVAL_CTX *ctx) in SCT_LIST_validate() argument
379 int sct_count = scts != NULL ? sk_SCT_num(scts) : 0; in SCT_LIST_validate()
384 SCT *sct = sk_SCT_value(scts, i); in SCT_LIST_validate()
/third_party/openssl/ssl/
Dssl_lib.c1203 SCT_LIST_free(s->scts); in SSL_free()
1204 OPENSSL_free(s->ext.scts); in SSL_free()
4768 if (s->ext.scts != NULL) { in ct_extract_tls_extension_scts()
4769 const unsigned char *p = s->ext.scts; in ct_extract_tls_extension_scts()
4770 STACK_OF(SCT) *scts = o2i_SCT_LIST(NULL, &p, s->ext.scts_len); in ct_extract_tls_extension_scts()
4772 scts_extracted = ct_move_scts(&s->scts, scts, SCT_SOURCE_TLS_EXTENSION); in ct_extract_tls_extension_scts()
4774 SCT_LIST_free(scts); in ct_extract_tls_extension_scts()
4795 STACK_OF(SCT) *scts = NULL; in ct_extract_ocsp_response_scts()
4816 scts = in ct_extract_ocsp_response_scts()
4819 ct_move_scts(&s->scts, scts, SCT_SOURCE_OCSP_STAPLED_RESPONSE); in ct_extract_ocsp_response_scts()
[all …]
Dssl_local.h1275 unsigned char *scts; member
1394 STACK_OF(SCT) *scts;
/third_party/openssl/include/openssl/
Dct.h315 __owur int SCT_LIST_validate(const STACK_OF(SCT) *scts,
Dssl.h2182 const STACK_OF(SCT) *scts, void *arg);
/third_party/openssl/ssl/statem/
Dextensions_clnt.c1491 OPENSSL_free(s->ext.scts); in tls_parse_stoc_sct()
1492 s->ext.scts = NULL; in tls_parse_stoc_sct()
1496 s->ext.scts = OPENSSL_malloc(size); in tls_parse_stoc_sct()
1497 if (s->ext.scts == NULL) { in tls_parse_stoc_sct()
1503 if (!PACKET_copy_bytes(pkt, s->ext.scts, size)) { in tls_parse_stoc_sct()
/third_party/openssl/doc/man3/
DSCT_validate.pod22 int SCT_LIST_validate(const STACK_OF(SCT) *scts, CT_POLICY_EVAL_CTX *ctx);
DSSL_CTX_set_ct_validation_callback.pod16 const STACK_OF(SCT) *scts, void *arg);
/third_party/openssl/apps/
Ds_client.c3248 const STACK_OF(SCT) *scts = SSL_get0_peer_scts(s); in print_stuff()
3249 int sct_count = scts != NULL ? sk_SCT_num(scts) : 0; in print_stuff()
3257 SCT *sct = sk_SCT_value(scts, i); in print_stuff()
/third_party/toybox/generated/
Dglobals.h722 char any, cell, ex, *f, k_done, *line, *m, **sct, **scts, **sufs; member
/third_party/openssl/crypto/err/
Dopenssl.txt2788 SSL_R_NO_VALID_SCTS:216:no valid scts