/external/conscrypt/common/src/test/java/org/conscrypt/ct/ |
D | SerializationTest.java | 46 SignedCertificateTimestamp sct in test_decode_SignedCertificateTimestamp() local 49 assertEquals(SignedCertificateTimestamp.Version.V1, sct.getVersion()); in test_decode_SignedCertificateTimestamp() 50 assertEquals(0x0102030405060708L, sct.getTimestamp()); in test_decode_SignedCertificateTimestamp() 51 assertEquals(0, sct.getExtensions().length); in test_decode_SignedCertificateTimestamp() 53 sct.getSignature().getHashAlgorithm()); in test_decode_SignedCertificateTimestamp() 55 sct.getSignature().getSignatureAlgorithm()); in test_decode_SignedCertificateTimestamp() 57 sct.getSignature().getSignature())); in test_decode_SignedCertificateTimestamp() 58 assertEquals(SignedCertificateTimestamp.Origin.EMBEDDED, sct.getOrigin()); in test_decode_SignedCertificateTimestamp() 63 byte[] sct = new byte[] { in test_decode_invalid_SignedCertificateTimestamp() 76 SignedCertificateTimestamp.decode(sct, SignedCertificateTimestamp.Origin.EMBEDDED); in test_decode_invalid_SignedCertificateTimestamp() [all …]
|
D | CTVerifierTest.java | 171 result.getValidSCTs().get(0).sct.getOrigin()); in test_verifySignedCertificateTimestamps_withMultipleTimestamps() 173 result.getInvalidSCTs().get(0).sct.getOrigin()); in test_verifySignedCertificateTimestamps_withMultipleTimestamps()
|
/external/conscrypt/repackaged/common/src/test/java/com/android/org/conscrypt/ct/ |
D | SerializationTest.java | 50 SignedCertificateTimestamp sct in test_decode_SignedCertificateTimestamp() local 53 assertEquals(SignedCertificateTimestamp.Version.V1, sct.getVersion()); in test_decode_SignedCertificateTimestamp() 54 assertEquals(0x0102030405060708L, sct.getTimestamp()); in test_decode_SignedCertificateTimestamp() 55 assertEquals(0, sct.getExtensions().length); in test_decode_SignedCertificateTimestamp() 57 sct.getSignature().getHashAlgorithm()); in test_decode_SignedCertificateTimestamp() 59 sct.getSignature().getSignatureAlgorithm()); in test_decode_SignedCertificateTimestamp() 61 sct.getSignature().getSignature())); in test_decode_SignedCertificateTimestamp() 62 assertEquals(SignedCertificateTimestamp.Origin.EMBEDDED, sct.getOrigin()); in test_decode_SignedCertificateTimestamp() 67 byte[] sct = new byte[] { in test_decode_invalid_SignedCertificateTimestamp() 80 SignedCertificateTimestamp.decode(sct, SignedCertificateTimestamp.Origin.EMBEDDED); in test_decode_invalid_SignedCertificateTimestamp() [all …]
|
D | CTVerifierTest.java | 175 result.getValidSCTs().get(0).sct.getOrigin()); in test_verifySignedCertificateTimestamps_withMultipleTimestamps() 177 result.getInvalidSCTs().get(0).sct.getOrigin()); in test_verifySignedCertificateTimestamps_withMultipleTimestamps()
|
/external/conscrypt/common/src/main/java/org/conscrypt/ct/ |
D | CTVerifier.java | 102 for (SignedCertificateTimestamp sct: scts) { in verifyEmbeddedSCTs() 103 VerifiedSCT.Status status = verifySingleSCT(sct, precertEntry); in verifyEmbeddedSCTs() 104 result.add(new VerifiedSCT(sct, status)); in verifyEmbeddedSCTs() 129 for (SignedCertificateTimestamp sct: scts) { in verifyExternalSCTs() 130 VerifiedSCT.Status status = verifySingleSCT(sct, x509Entry); in verifyExternalSCTs() 131 result.add(new VerifiedSCT(sct, status)); in verifyExternalSCTs() 138 private VerifiedSCT.Status verifySingleSCT(SignedCertificateTimestamp sct, in verifySingleSCT() argument 140 CTLogInfo log = store.getKnownLog(sct.getLogID()); in verifySingleSCT() 145 return log.verifySingleSCT(sct, certEntry); in verifySingleSCT() 153 for (SignedCertificateTimestamp sct: scts) { in markSCTsAsInvalid() [all …]
|
D | VerifiedSCT.java | 33 public final SignedCertificateTimestamp sct; field in VerifiedSCT 36 public VerifiedSCT(SignedCertificateTimestamp sct, Status status) { in VerifiedSCT() argument 37 this.sct = sct; in VerifiedSCT()
|
D | CTLogInfo.java | 105 public VerifiedSCT.Status verifySingleSCT(SignedCertificateTimestamp sct, in verifySingleSCT() argument 107 if (!Arrays.equals(sct.getLogID(), getID())) { in verifySingleSCT() 113 toVerify = sct.encodeTBS(entry); in verifySingleSCT() 120 String algorithm = sct.getSignature().getAlgorithm(); in verifySingleSCT() 134 if (!signature.verify(sct.getSignature().getSignature())) { in verifySingleSCT()
|
/external/conscrypt/repackaged/common/src/main/java/com/android/org/conscrypt/ct/ |
D | CTVerifier.java | 106 for (SignedCertificateTimestamp sct: scts) { in verifyEmbeddedSCTs() 107 VerifiedSCT.Status status = verifySingleSCT(sct, precertEntry); in verifyEmbeddedSCTs() 108 result.add(new VerifiedSCT(sct, status)); in verifyEmbeddedSCTs() 133 for (SignedCertificateTimestamp sct: scts) { in verifyExternalSCTs() 134 VerifiedSCT.Status status = verifySingleSCT(sct, x509Entry); in verifyExternalSCTs() 135 result.add(new VerifiedSCT(sct, status)); in verifyExternalSCTs() 142 private VerifiedSCT.Status verifySingleSCT(SignedCertificateTimestamp sct, in verifySingleSCT() argument 144 CTLogInfo log = store.getKnownLog(sct.getLogID()); in verifySingleSCT() 149 return log.verifySingleSCT(sct, certEntry); in verifySingleSCT() 157 for (SignedCertificateTimestamp sct: scts) { in markSCTsAsInvalid() [all …]
|
D | VerifiedSCT.java | 38 public final SignedCertificateTimestamp sct; field in VerifiedSCT 41 public VerifiedSCT(SignedCertificateTimestamp sct, Status status) { in VerifiedSCT() argument 42 this.sct = sct; in VerifiedSCT()
|
D | CTLogInfo.java | 107 public VerifiedSCT.Status verifySingleSCT(SignedCertificateTimestamp sct, in verifySingleSCT() argument 109 if (!Arrays.equals(sct.getLogID(), getID())) { in verifySingleSCT() 115 toVerify = sct.encodeTBS(entry); in verifySingleSCT() 122 String algorithm = sct.getSignature().getAlgorithm(); in verifySingleSCT() 136 if (!signature.verify(sct.getSignature().getSignature())) { in verifySingleSCT()
|
/external/toybox/toys/pending/ |
D | man.c | 35 char any, cell, ex, *f, k_done, *line, *m, **sct, **scts, **sufs; 142 if (*++TT.sct) return 0; in manpath() 144 TT.sct = TT.scts; in manpath() 152 char *s = xmprintf("%s/man%s/%s.%s.bz2", TT.m, *TT.sct, name, *TT.sct), **suf; in tryfile() 168 TT.sct = TT.scts - 1; // First manpath() read increments. in man_main() 181 d = xmprintf("%s/man%s", TT.m, *TT.sct); in man_main() 207 TT.scts = (char *[]){*toys.optargs, 0}, TT.sct = TT.scts - 1; in man_main() 209 if (fd == -1) error_exit("section %s no %s", *--TT.sct, toys.optargs[1]); in man_main()
|
/external/f2fs-tools/tools/sg_write_buffer/include/ |
D | freebsd_nvme_ioctl.h | 73 uint16_t sct : 3; /* status code type */ member 153 ((cpl)->status.sc != 0 || (cpl)->status.sct != 0)
|
/external/conscrypt/platform/src/main/java/org/conscrypt/ct/ |
D | CTPolicyImpl.java | 39 CTLogInfo log = logStore.getKnownLog(verifiedSCT.sct.getLogID()); in doesResultConformToPolicy()
|
/external/conscrypt/repackaged/platform/src/main/java/com/android/org/conscrypt/ct/ |
D | CTPolicyImpl.java | 43 CTLogInfo log = logStore.getKnownLog(verifiedSCT.sct.getLogID()); in doesResultConformToPolicy()
|
/external/boringssl/src/ssl/ |
D | tls13_both.cc | 239 CBS status_request, sct; in tls13_process_certificate() local 242 {TLSEXT_TYPE_certificate_timestamp, &have_sct, &sct}, in tls13_process_certificate() 289 if (!ssl_is_sct_list_valid(&sct)) { in tls13_process_certificate() 297 CRYPTO_BUFFER_new_from_CBS(&sct, ssl->ctx->pool)); in tls13_process_certificate()
|
/external/rust/crates/quiche/deps/boringssl/src/ssl/ |
D | tls13_both.cc | 239 CBS status_request, sct; in tls13_process_certificate() local 242 {TLSEXT_TYPE_certificate_timestamp, &have_sct, &sct}, in tls13_process_certificate() 290 if (!ssl_is_sct_list_valid(&sct)) { in tls13_process_certificate() 298 CRYPTO_BUFFER_new_from_CBS(&sct, ssl->ctx->pool)); in tls13_process_certificate()
|
/external/conscrypt/openjdk/src/test/resources/ |
D | README | 25 - ocsp-response-sct-extension.der: The extension from ocsp-response.der which contains the SCT
|
/external/skia/tests/ |
D | ReadWritePixelsGpuTest.cpp | 407 for (int sct = 0; sct <= kLastEnum_SkColorType; ++sct) { in gpu_read_pixels_test_driver() local 408 const auto srcCT = static_cast<SkColorType>(sct); in gpu_read_pixels_test_driver() 458 srcCTTestedThoroughly[sct] && readCTTestedThoroughly[rct] in gpu_read_pixels_test_driver() 467 srcCTTestedThoroughly[sct] = true; in gpu_read_pixels_test_driver()
|
/external/ImageMagick/coders/ |
D | Make.com | 113 $call Make sct.c 160 sct,sfw,sgi,stegano,sun,svg,tga,thumbnail,tiff,tile,tim,tim2,ttf,txt,uil,url, -
|
D | Makefile.am | 296 coders/sct.c \ 297 coders/sct.h \ 490 coders/sct.h \ 615 coders/sct.la \ 1251 coders_sct_la_SOURCES = coders/sct.c
|
/external/python/cryptography/tests/x509/ |
D | test_x509_ext.py | 4907 sct = _load_cert( 4921 assert sct == sct2 4929 sct = _load_cert( 4943 assert sct != sct2 4944 assert sct != object() 4952 sct = _load_cert( 4973 assert hash(sct) == hash(sct2) 4974 assert hash(sct) != hash(sct3) 5079 [sct] = scts 5080 assert scts[0] == sct [all …]
|
/external/python/cryptography/src/cryptography/hazmat/backends/openssl/ |
D | x509.py | 503 def __init__(self, backend, sct_list, sct): argument 507 self._sct = sct
|
D | decode_asn1.py | 647 sct = backend._lib.sk_SCT_value(asn1_scts, i) 649 scts.append(_SignedCertificateTimestamp(backend, asn1_scts, sct))
|
/external/python/cryptography/src/cryptography/x509/ |
D | extensions.py | 1383 isinstance(sct, SignedCertificateTimestamp) 1384 for sct in signed_certificate_timestamps
|
/external/e2fsprogs/doc/RelNotes/ |
D | v1.20.txt | 179 Added build-rpm script from sct.
|