/third_party/openssl/test/ssl-tests/ |
D | 12-ct.cnf | 5 test-0 = 0-ct-permissive-without-scts 6 test-1 = 1-ct-permissive-with-scts 7 test-2 = 2-ct-strict-without-scts 8 test-3 = 3-ct-strict-with-scts 13 [0-ct-permissive-without-scts] 14 ssl_conf = 0-ct-permissive-without-scts-ssl 16 [0-ct-permissive-without-scts-ssl] 17 server = 0-ct-permissive-without-scts-server 18 client = 0-ct-permissive-without-scts-client 20 [0-ct-permissive-without-scts-server] [all …]
|
D | 12-ct.cnf.in | 20 name => "ct-permissive-without-scts", 33 name => "ct-permissive-with-scts", 49 name => "ct-strict-without-scts", 63 name => "ct-strict-with-scts",
|
/third_party/openssl/test/ |
D | ct_test.c | 183 static int assert_validity(CT_TEST_FIXTURE *fixture, STACK_OF(SCT) *scts, in assert_validity() argument 190 if (!TEST_int_ge(SCT_LIST_validate(scts, policy_ctx), 0)) in assert_validity() 193 for (i = 0; i < sk_SCT_num(scts); ++i) { in assert_validity() 194 SCT *sct_i = sk_SCT_value(scts, i); in assert_validity() 213 int unverified_sct_count = sk_SCT_num(scts) - in assert_validity() 228 STACK_OF(SCT) *scts = NULL; in execute_cert_test() 281 scts = X509V3_EXT_d2i(sct_extension); in execute_cert_test() 282 for (i = 0; i < sk_SCT_num(scts); ++i) { in execute_cert_test() 283 SCT *sct_i = sk_SCT_value(scts, i); in execute_cert_test() 292 if (!assert_validity(fixture, scts, ct_policy_ctx)) in execute_cert_test() [all …]
|
/third_party/openssl/fuzz/ |
D | ct.c | 32 STACK_OF(SCT) *scts = d2i_SCT_LIST(NULL, pp, len); in FuzzerTestOneInput() 33 if (scts != NULL) { in FuzzerTestOneInput() 35 SCT_LIST_print(scts, bio, 4, "\n", NULL); in FuzzerTestOneInput() 38 if (i2d_SCT_LIST(scts, &der)) { in FuzzerTestOneInput() 43 SCT_LIST_free(scts); in FuzzerTestOneInput()
|
/third_party/toybox/toys/pending/ |
D | man.c | 35 char any, cell, ex, *f, k_done, *line, *m, **sct, **scts, **sufs; 144 TT.sct = TT.scts; in manpath() 167 TT.scts = (char *[]) {"1", "8", "3", "2", "5", "4", "6", "7", 0}; in man_main() 168 TT.sct = TT.scts - 1; // First manpath() read increments. in man_main() 207 TT.scts = (char *[]){*toys.optargs, 0}, TT.sct = TT.scts - 1; in man_main()
|
/third_party/openssl/crypto/ct/ |
D | ct_sct.c | 376 int SCT_LIST_validate(const STACK_OF(SCT) *scts, CT_POLICY_EVAL_CTX *ctx) in SCT_LIST_validate() argument 379 int sct_count = scts != NULL ? sk_SCT_num(scts) : 0; in SCT_LIST_validate() 384 SCT *sct = sk_SCT_value(scts, i); in SCT_LIST_validate()
|
/third_party/openssl/ssl/ |
D | ssl_lib.c | 1231 SCT_LIST_free(s->scts); in SSL_free() 1232 OPENSSL_free(s->ext.scts); in SSL_free() 5014 if (s->ext.scts != NULL) { in ct_extract_tls_extension_scts() 5015 const unsigned char *p = s->ext.scts; in ct_extract_tls_extension_scts() 5016 STACK_OF(SCT) *scts = o2i_SCT_LIST(NULL, &p, s->ext.scts_len); in ct_extract_tls_extension_scts() 5018 scts_extracted = ct_move_scts(&s->scts, scts, SCT_SOURCE_TLS_EXTENSION); in ct_extract_tls_extension_scts() 5020 SCT_LIST_free(scts); in ct_extract_tls_extension_scts() 5041 STACK_OF(SCT) *scts = NULL; in ct_extract_ocsp_response_scts() 5062 scts = in ct_extract_ocsp_response_scts() 5065 ct_move_scts(&s->scts, scts, SCT_SOURCE_OCSP_STAPLED_RESPONSE); in ct_extract_ocsp_response_scts() [all …]
|
D | ssl_local.h | 1591 unsigned char *scts; member 1710 STACK_OF(SCT) *scts;
|
/third_party/openssl/ohos_lite/include/openssl/ |
D | ct.h | 315 __owur int SCT_LIST_validate(const STACK_OF(SCT) *scts,
|
D | ssl.h | 2182 const STACK_OF(SCT) *scts, void *arg);
|
/third_party/openssl/ssl/statem/ |
D | extensions_clnt.c | 1446 OPENSSL_free(s->ext.scts); in tls_parse_stoc_sct() 1447 s->ext.scts = NULL; in tls_parse_stoc_sct() 1451 s->ext.scts = OPENSSL_malloc(size); in tls_parse_stoc_sct() 1452 if (s->ext.scts == NULL) { in tls_parse_stoc_sct() 1457 if (!PACKET_copy_bytes(pkt, s->ext.scts, size)) { in tls_parse_stoc_sct()
|
/third_party/openssl/doc/man3/ |
D | SCT_validate.pod | 22 int SCT_LIST_validate(const STACK_OF(SCT) *scts, CT_POLICY_EVAL_CTX *ctx);
|
D | SSL_CTX_set_ct_validation_callback.pod | 16 const STACK_OF(SCT) *scts, void *arg);
|
/third_party/openssl/apps/ |
D | s_client.c | 3207 const STACK_OF(SCT) *scts = SSL_get0_peer_scts(s); in print_stuff() 3208 int sct_count = scts != NULL ? sk_SCT_num(scts) : 0; in print_stuff() 3216 SCT *sct = sk_SCT_value(scts, i); in print_stuff()
|
/third_party/toybox/generated/ |
D | globals.h | 765 char any, cell, ex, *f, k_done, *line, *m, **sct, **scts, **sufs; member
|
/third_party/openssl/include/openssl/ |
D | ct.h.in | 338 __owur int SCT_LIST_validate(const STACK_OF(SCT) *scts,
|
D | ssl.h.in | 2269 const STACK_OF(SCT) *scts, void *arg);
|
/third_party/openssl/crypto/err/ |
D | openssl.txt | 1420 SSL_R_NO_VALID_SCTS:216:no valid scts
|