| /src/crypto/external/apache2/openssl/dist/fuzz/ |
| ct.c | 32 STACK_OF(SCT) *scts = d2i_SCT_LIST(NULL, pp, len); 33 if (scts != NULL) { 35 SCT_LIST_print(scts, bio, 4, "\n", NULL); 38 if (i2d_SCT_LIST(scts, &der)) { 43 SCT_LIST_free(scts);
|
| /src/crypto/external/bsd/openssl/dist/fuzz/ |
| ct.c | 32 STACK_OF(SCT) *scts = d2i_SCT_LIST(NULL, pp, len); 33 if (scts != NULL) { 35 SCT_LIST_print(scts, bio, 4, "\n", NULL); 38 if (i2d_SCT_LIST(scts, &der)) { 43 SCT_LIST_free(scts);
|
| /src/crypto/external/bsd/openssl.old/dist/fuzz/ |
| ct.c | 32 STACK_OF(SCT) *scts = d2i_SCT_LIST(NULL, pp, len); 33 if (scts != NULL) { 35 SCT_LIST_print(scts, bio, 4, "\n", NULL); 38 if (i2d_SCT_LIST(scts, &der)) { 43 SCT_LIST_free(scts);
|
| /src/crypto/external/bsd/openssl.old/dist/test/ssl-tests/ |
| 12-ct.conf | 5 test-0 = 0-ct-permissive-without-scts 6 test-1 = 1-ct-permissive-with-scts 7 test-2 = 2-ct-strict-without-scts 8 test-3 = 3-ct-strict-with-scts 13 [0-ct-permissive-without-scts] 14 ssl_conf = 0-ct-permissive-without-scts-ssl 16 [0-ct-permissive-without-scts-ssl] 17 server = 0-ct-permissive-without-scts-server 18 client = 0-ct-permissive-without-scts-client 20 [0-ct-permissive-without-scts-server [all...] |
| /src/crypto/external/apache2/openssl/dist/test/ |
| ct_test.c | 37 /* Set the following to test handling of SCTs in X509 certificates */ 41 /* Expected number of SCTs */ 43 /* Expected number of valid SCTS */ 45 /* Set the following to test handling of SCTs in TLS format */ 183 static int assert_validity(CT_TEST_FIXTURE *fixture, STACK_OF(SCT) *scts, 190 if (!TEST_int_ge(SCT_LIST_validate(scts, policy_ctx), 0)) 193 for (i = 0; i < sk_SCT_num(scts); ++i) { 194 SCT *sct_i = sk_SCT_value(scts, i); 213 int unverified_sct_count = sk_SCT_num(scts) - invalid_sct_count - valid_sct_count; 215 TEST_info("%d SCTs failed, %d SCTs unverified" [all...] |
| /src/crypto/external/bsd/openssl/dist/test/ |
| ct_test.c | 37 /* Set the following to test handling of SCTs in X509 certificates */ 41 /* Expected number of SCTs */ 43 /* Expected number of valid SCTS */ 45 /* Set the following to test handling of SCTs in TLS format */ 183 static int assert_validity(CT_TEST_FIXTURE *fixture, STACK_OF(SCT) *scts, 190 if (!TEST_int_ge(SCT_LIST_validate(scts, policy_ctx), 0)) 193 for (i = 0; i < sk_SCT_num(scts); ++i) { 194 SCT *sct_i = sk_SCT_value(scts, i); 213 int unverified_sct_count = sk_SCT_num(scts) - 216 TEST_info("%d SCTs failed, %d SCTs unverified" [all...] |
| /src/crypto/external/bsd/openssl.old/dist/test/ |
| ct_test.c | 36 /* Set the following to test handling of SCTs in X509 certificates */ 40 /* Expected number of SCTs */ 42 /* Expected number of valid SCTS */ 44 /* Set the following to test handling of SCTs in TLS format */ 178 static int assert_validity(CT_TEST_FIXTURE *fixture, STACK_OF(SCT) *scts, 185 if (!TEST_int_ge(SCT_LIST_validate(scts, policy_ctx), 0)) 188 for (i = 0; i < sk_SCT_num(scts); ++i) { 189 SCT *sct_i = sk_SCT_value(scts, i); 208 int unverified_sct_count = sk_SCT_num(scts) - 211 TEST_info("%d SCTs failed, %d SCTs unverified" [all...] |
| /src/crypto/external/apache2/openssl/dist/crypto/ct/ |
| ct_sct.c | 337 * associated with the shared (by all SCTs) policy eval ctx. 342 * mark the SCTs invalid, rather than report a failure to determine the 365 int SCT_LIST_validate(const STACK_OF(SCT) *scts, CT_POLICY_EVAL_CTX *ctx) 368 int sct_count = scts != NULL ? sk_SCT_num(scts) : 0; 373 SCT *sct = sk_SCT_value(scts, i);
|
| /src/crypto/external/bsd/openssl/dist/crypto/ct/ |
| ct_sct.c | 347 * associated with the shared (by all SCTs) policy eval ctx. 352 * mark the SCTs invalid, rather than report a failure to determine the 376 int SCT_LIST_validate(const STACK_OF(SCT) *scts, CT_POLICY_EVAL_CTX *ctx) 379 int sct_count = scts != NULL ? sk_SCT_num(scts) : 0; 384 SCT *sct = sk_SCT_value(scts, i);
|
| /src/crypto/external/bsd/openssl.old/dist/crypto/ct/ |
| ct_sct.c | 347 * associated with the shared (by all SCTs) policy eval ctx. 352 * mark the SCTs invalid, rather than report a failure to determine the 376 int SCT_LIST_validate(const STACK_OF(SCT) *scts, CT_POLICY_EVAL_CTX *ctx) 379 int sct_count = scts != NULL ? sk_SCT_num(scts) : 0; 384 SCT *sct = sk_SCT_value(scts, i);
|
| /src/crypto/external/bsd/openssl/dist/ssl/ |
| ssl_lib.c | 1244 SCT_LIST_free(s->scts); 1245 OPENSSL_free(s->ext.scts); 5007 * Moves SCTs from the |src| stack to the |dst| stack. 5011 * Returns the number of SCTs moved, or a negative integer if an error occurs. 5046 * Returns the number of SCTs extracted. 5052 if (s->ext.scts != NULL) { 5053 const unsigned char *p = s->ext.scts; 5054 STACK_OF(SCT) *scts = o2i_SCT_LIST(NULL, &p, s->ext.scts_len); 5056 scts_extracted = ct_move_scts(&s->scts, scts, SCT_SOURCE_TLS_EXTENSION) [all...] |
| ssl_local.h | 1000 * Validates that the SCTs (Signed Certificate Timestamps) are sufficient. 1591 unsigned char *scts; member in struct:ssl_st::__anon1660 1700 * Validates that the SCTs (Signed Certificate Timestamps) are sufficient. 1707 * Consolidated stack of SCTs from all sources. 1710 STACK_OF(SCT) *scts; member in struct:ssl_st 1711 /* Have we attempted to find/parse SCTs yet? */
|
| /src/crypto/external/bsd/openssl.old/dist/ssl/ |
| ssl_lib.c | 1203 SCT_LIST_free(s->scts); 1204 OPENSSL_free(s->ext.scts); 4740 * Moves SCTs from the |src| stack to the |dst| stack. 4744 * Returns the number of SCTs moved, or a negative integer if an error occurs. 4778 * Returns the number of SCTs extracted. 4784 if (s->ext.scts != NULL) { 4785 const unsigned char *p = s->ext.scts; 4786 STACK_OF(SCT) *scts = o2i_SCT_LIST(NULL, &p, s->ext.scts_len); 4788 scts_extracted = ct_move_scts(&s->scts, scts, SCT_SOURCE_TLS_EXTENSION) [all...] |
| ssl_local.h | 889 * Validates that the SCTs (Signed Certificate Timestamps) are sufficient. 1275 unsigned char *scts; member in struct:ssl_st::__anon2194 1384 * Validates that the SCTs (Signed Certificate Timestamps) are sufficient. 1391 * Consolidated stack of SCTs from all sources. 1394 STACK_OF(SCT) *scts; member in struct:ssl_st 1395 /* Have we attempted to find/parse SCTs yet? */
|
| /src/crypto/external/apache2/openssl/dist/include/openssl/ |
| ct.h.in | 100 /* Gets the peer certificate that the SCTs are for */ 104 * Sets the certificate associated with the received SCTs. 114 * Sets the issuer of the certificate associated with the received SCTs. 120 /* Gets the CT logs that are trusted sources of SCTs */ 130 * Such SCTs will fail validation, as required by RFC6962. 135 * Sets the time to evaluate SCTs against, in milliseconds since the Unix epoch. 137 * been issued in the future. RFC6962 states that "TLS clients MUST reject SCTs 169 * Free a stack of SCTs, and the underlying SCTs themselves. 311 * SCTs will be delimited by |separator| [all...] |
| /src/crypto/external/bsd/openssl/dist/include/openssl/ |
| ct.h.in | 98 /* Gets the peer certificate that the SCTs are for */ 102 * Sets the certificate associated with the received SCTs. 112 * Sets the issuer of the certificate associated with the received SCTs. 118 /* Gets the CT logs that are trusted sources of SCTs */ 128 * Such SCTs will fail validation, as required by RFC6962. 133 * Sets the time to evaluate SCTs against, in milliseconds since the Unix epoch. 135 * been issued in the future. RFC6962 states that "TLS clients MUST reject SCTs 167 * Free a stack of SCTs, and the underlying SCTs themselves. 309 * SCTs will be delimited by |separator| [all...] |
| /src/crypto/external/bsd/openssl.old/dist/include/openssl/ |
| ct.h | 75 /* Gets the peer certificate that the SCTs are for */ 79 * Sets the certificate associated with the received SCTs. 89 * Sets the issuer of the certificate associated with the received SCTs. 95 /* Gets the CT logs that are trusted sources of SCTs */ 105 * Such SCTs will fail validation, as required by RFC6962. 110 * Sets the time to evaluate SCTs against, in milliseconds since the Unix epoch. 112 * been issued in the future. RFC6962 states that "TLS clients MUST reject SCTs 144 * Free a stack of SCTs, and the underlying SCTs themselves. 286 * SCTs will be delimited by |separator| [all...] |
| /src/crypto/external/apache2/openssl/dist/ssl/ |
| ssl_lib.c | 1496 SCT_LIST_free(s->scts); 1497 OPENSSL_free(s->ext.scts); 6329 * Moves SCTs from the |src| stack to the |dst| stack. 6333 * Returns the number of SCTs moved, or a negative integer if an error occurs. 6368 * Returns the number of SCTs extracted. 6374 if (s->ext.scts != NULL) { 6375 const unsigned char *p = s->ext.scts; 6376 STACK_OF(SCT) *scts = o2i_SCT_LIST(NULL, &p, s->ext.scts_len); 6378 scts_extracted = ct_move_scts(&s->scts, scts, SCT_SOURCE_TLS_EXTENSION) [all...] |
| ssl_local.h | 952 * Validates that the SCTs (Signed Certificate Timestamps) are sufficient. 1628 unsigned char *scts; member in struct:ssl_connection_st::__anon629 1754 * Validates that the SCTs (Signed Certificate Timestamps) are sufficient. 1761 * Consolidated stack of SCTs from all sources. 1764 STACK_OF(SCT) *scts; member in struct:ssl_connection_st 1765 /* Have we attempted to find/parse SCTs yet? */
|
| /src/crypto/external/apache2/openssl/dist/ssl/statem/ |
| extensions_clnt.c | 1550 OPENSSL_free(s->ext.scts); 1551 s->ext.scts = NULL; 1555 s->ext.scts = OPENSSL_malloc(size); 1556 if (s->ext.scts == NULL) { 1561 if (!PACKET_copy_bytes(pkt, s->ext.scts, size)) {
|
| /src/crypto/external/bsd/openssl/dist/ssl/statem/ |
| extensions_clnt.c | 1446 OPENSSL_free(s->ext.scts); 1447 s->ext.scts = NULL; 1451 s->ext.scts = OPENSSL_malloc(size); 1452 if (s->ext.scts == NULL) { 1457 if (!PACKET_copy_bytes(pkt, s->ext.scts, size)) {
|
| /src/crypto/external/bsd/openssl.old/dist/ssl/statem/ |
| extensions_clnt.c | 1504 OPENSSL_free(s->ext.scts); 1505 s->ext.scts = NULL; 1509 s->ext.scts = OPENSSL_malloc(size); 1510 if (s->ext.scts == NULL) { 1516 if (!PACKET_copy_bytes(pkt, s->ext.scts, size)) {
|
| /src/crypto/external/bsd/openssl/dist/apps/ |
| s_client.c | 485 {"ct", OPT_CT, '-', "Request and parse SCTs (also enables OCSP stapling)"}, 486 {"noct", OPT_NOCT, '-', "Do not request or parse SCTs (default)"}, 1892 * can show the names of the logs any SCTs came from (SCTs may be seen 3199 * handshake, no SCTs are provided as part of the handshake. While in 3200 * a resumed session SCTs may be present in the session's certificate, 3202 * set of SCTs may be incomplete. Thus it makes little sense to 3203 * attempt to display SCTs from a resumed session's certificate, and of 3207 const STACK_OF(SCT) *scts = SSL_get0_peer_scts(s); 3208 int sct_count = scts != NULL ? sk_SCT_num(scts) : 0 [all...] |
| /src/crypto/external/bsd/openssl.old/dist/apps/ |
| s_client.c | 786 {"ct", OPT_CT, '-', "Request and parse SCTs (also enables OCSP stapling)"}, 787 {"noct", OPT_NOCT, '-', "Do not request or parse SCTs (default)"}, 1927 * can show the names of the logs any SCTs came from (SCTs may be seen 3240 * handshake, no SCTs are provided as part of the handshake. While in 3241 * a resumed session SCTs may be present in the session's certificate, 3243 * set of SCTs may be incomplete. Thus it makes little sense to 3244 * attempt to display SCTs from a resumed session's certificate, and of 3248 const STACK_OF(SCT) *scts = SSL_get0_peer_scts(s); 3249 int sct_count = scts != NULL ? sk_SCT_num(scts) : 0 [all...] |
| /src/crypto/external/apache2/openssl/dist/apps/ |
| s_client.c | 619 { "ct", OPT_CT, '-', "Request and parse SCTs (also enables OCSP stapling)" }, 620 { "noct", OPT_NOCT, '-', "Do not request or parse SCTs (default)" }, 2101 * can show the names of the logs any SCTs came from (SCTs may be seen 3543 * handshake, no SCTs are provided as part of the handshake. While in 3544 * a resumed session SCTs may be present in the session's certificate, 3546 * set of SCTs may be incomplete. Thus it makes little sense to 3547 * attempt to display SCTs from a resumed session's certificate, and of 3551 const STACK_OF(SCT) *scts = SSL_get0_peer_scts(s); 3552 int sct_count = scts != NULL ? sk_SCT_num(scts) : 0 [all...] |