/third_party/openssl/test/ssl-tests/ |
D | 12-ct.conf | 5 test-0 = 0-ct-permissive-without-scts 6 test-1 = 1-ct-permissive-with-scts 7 test-2 = 2-ct-strict-without-scts 8 test-3 = 3-ct-strict-with-scts 13 [0-ct-permissive-without-scts] 14 ssl_conf = 0-ct-permissive-without-scts-ssl 16 [0-ct-permissive-without-scts-ssl] 17 server = 0-ct-permissive-without-scts-server 18 client = 0-ct-permissive-without-scts-client 20 [0-ct-permissive-without-scts-server] [all …]
|
D | 12-ct.conf.in | 20 name => "ct-permissive-without-scts", 32 name => "ct-permissive-with-scts", 48 name => "ct-strict-without-scts", 61 name => "ct-strict-with-scts",
|
/third_party/openssl/fuzz/ |
D | ct.c | 32 STACK_OF(SCT) *scts = d2i_SCT_LIST(NULL, pp, len); in FuzzerTestOneInput() 33 if (scts != NULL) { in FuzzerTestOneInput() 35 SCT_LIST_print(scts, bio, 4, "\n", NULL); in FuzzerTestOneInput() 38 if (i2d_SCT_LIST(scts, &der)) { in FuzzerTestOneInput() 43 SCT_LIST_free(scts); in FuzzerTestOneInput()
|
/third_party/openssl/test/ |
D | ct_test.c | 178 static int assert_validity(CT_TEST_FIXTURE *fixture, STACK_OF(SCT) *scts, in assert_validity() argument 185 if (!TEST_int_ge(SCT_LIST_validate(scts, policy_ctx), 0)) in assert_validity() 188 for (i = 0; i < sk_SCT_num(scts); ++i) { in assert_validity() 189 SCT *sct_i = sk_SCT_value(scts, i); in assert_validity() 208 int unverified_sct_count = sk_SCT_num(scts) - in assert_validity() 223 STACK_OF(SCT) *scts = NULL; in execute_cert_test() 276 scts = X509V3_EXT_d2i(sct_extension); in execute_cert_test() 277 for (i = 0; i < sk_SCT_num(scts); ++i) { in execute_cert_test() 278 SCT *sct_i = sk_SCT_value(scts, i); in execute_cert_test() 287 if (!assert_validity(fixture, scts, ct_policy_ctx)) in execute_cert_test() [all …]
|
/third_party/toybox/toys/pending/ |
D | man.c | 35 char any, cell, ex, *f, k_done, *line, *m, **sct, **scts, **sufs; 144 TT.sct = TT.scts; in manpath() 167 TT.scts = (char *[]) {"1", "8", "3", "2", "5", "4", "6", "7", 0}; in man_main() 168 TT.sct = TT.scts - 1; // First manpath() read increments. in man_main() 207 TT.scts = (char *[]){*toys.optargs, 0}, TT.sct = TT.scts - 1; in man_main()
|
/third_party/openssl/crypto/ct/ |
D | ct_sct.c | 376 int SCT_LIST_validate(const STACK_OF(SCT) *scts, CT_POLICY_EVAL_CTX *ctx) in SCT_LIST_validate() argument 379 int sct_count = scts != NULL ? sk_SCT_num(scts) : 0; in SCT_LIST_validate() 384 SCT *sct = sk_SCT_value(scts, i); in SCT_LIST_validate()
|
/third_party/openssl/ssl/ |
D | ssl_lib.c | 1203 SCT_LIST_free(s->scts); in SSL_free() 1204 OPENSSL_free(s->ext.scts); in SSL_free() 4768 if (s->ext.scts != NULL) { in ct_extract_tls_extension_scts() 4769 const unsigned char *p = s->ext.scts; in ct_extract_tls_extension_scts() 4770 STACK_OF(SCT) *scts = o2i_SCT_LIST(NULL, &p, s->ext.scts_len); in ct_extract_tls_extension_scts() 4772 scts_extracted = ct_move_scts(&s->scts, scts, SCT_SOURCE_TLS_EXTENSION); in ct_extract_tls_extension_scts() 4774 SCT_LIST_free(scts); in ct_extract_tls_extension_scts() 4795 STACK_OF(SCT) *scts = NULL; in ct_extract_ocsp_response_scts() 4816 scts = in ct_extract_ocsp_response_scts() 4819 ct_move_scts(&s->scts, scts, SCT_SOURCE_OCSP_STAPLED_RESPONSE); in ct_extract_ocsp_response_scts() [all …]
|
D | ssl_local.h | 1275 unsigned char *scts; member 1394 STACK_OF(SCT) *scts;
|
/third_party/openssl/include/openssl/ |
D | ct.h | 315 __owur int SCT_LIST_validate(const STACK_OF(SCT) *scts,
|
D | ssl.h | 2182 const STACK_OF(SCT) *scts, void *arg);
|
/third_party/openssl/ssl/statem/ |
D | extensions_clnt.c | 1491 OPENSSL_free(s->ext.scts); in tls_parse_stoc_sct() 1492 s->ext.scts = NULL; in tls_parse_stoc_sct() 1496 s->ext.scts = OPENSSL_malloc(size); in tls_parse_stoc_sct() 1497 if (s->ext.scts == NULL) { in tls_parse_stoc_sct() 1503 if (!PACKET_copy_bytes(pkt, s->ext.scts, size)) { in tls_parse_stoc_sct()
|
/third_party/openssl/doc/man3/ |
D | SCT_validate.pod | 22 int SCT_LIST_validate(const STACK_OF(SCT) *scts, CT_POLICY_EVAL_CTX *ctx);
|
D | SSL_CTX_set_ct_validation_callback.pod | 16 const STACK_OF(SCT) *scts, void *arg);
|
/third_party/openssl/apps/ |
D | s_client.c | 3248 const STACK_OF(SCT) *scts = SSL_get0_peer_scts(s); in print_stuff() 3249 int sct_count = scts != NULL ? sk_SCT_num(scts) : 0; in print_stuff() 3257 SCT *sct = sk_SCT_value(scts, i); in print_stuff()
|
/third_party/toybox/generated/ |
D | globals.h | 722 char any, cell, ex, *f, k_done, *line, *m, **sct, **scts, **sufs; member
|
/third_party/openssl/crypto/err/ |
D | openssl.txt | 2788 SSL_R_NO_VALID_SCTS:216:no valid scts
|