HomeSort by: relevance | last modified time | path
    Searched refs:scts (Results 1 - 25 of 28) sorted by relevancy

1 2

  /src/crypto/external/apache2/openssl/dist/fuzz/
ct.c 32 STACK_OF(SCT) *scts = d2i_SCT_LIST(NULL, pp, len);
33 if (scts != NULL) {
35 SCT_LIST_print(scts, bio, 4, "\n", NULL);
38 if (i2d_SCT_LIST(scts, &der)) {
43 SCT_LIST_free(scts);
  /src/crypto/external/bsd/openssl/dist/fuzz/
ct.c 32 STACK_OF(SCT) *scts = d2i_SCT_LIST(NULL, pp, len);
33 if (scts != NULL) {
35 SCT_LIST_print(scts, bio, 4, "\n", NULL);
38 if (i2d_SCT_LIST(scts, &der)) {
43 SCT_LIST_free(scts);
  /src/crypto/external/bsd/openssl.old/dist/fuzz/
ct.c 32 STACK_OF(SCT) *scts = d2i_SCT_LIST(NULL, pp, len);
33 if (scts != NULL) {
35 SCT_LIST_print(scts, bio, 4, "\n", NULL);
38 if (i2d_SCT_LIST(scts, &der)) {
43 SCT_LIST_free(scts);
  /src/crypto/external/bsd/openssl.old/dist/test/ssl-tests/
12-ct.conf 5 test-0 = 0-ct-permissive-without-scts
6 test-1 = 1-ct-permissive-with-scts
7 test-2 = 2-ct-strict-without-scts
8 test-3 = 3-ct-strict-with-scts
13 [0-ct-permissive-without-scts]
14 ssl_conf = 0-ct-permissive-without-scts-ssl
16 [0-ct-permissive-without-scts-ssl]
17 server = 0-ct-permissive-without-scts-server
18 client = 0-ct-permissive-without-scts-client
20 [0-ct-permissive-without-scts-server
    [all...]
  /src/crypto/external/apache2/openssl/dist/test/
ct_test.c 37 /* Set the following to test handling of SCTs in X509 certificates */
41 /* Expected number of SCTs */
43 /* Expected number of valid SCTS */
45 /* Set the following to test handling of SCTs in TLS format */
183 static int assert_validity(CT_TEST_FIXTURE *fixture, STACK_OF(SCT) *scts,
190 if (!TEST_int_ge(SCT_LIST_validate(scts, policy_ctx), 0))
193 for (i = 0; i < sk_SCT_num(scts); ++i) {
194 SCT *sct_i = sk_SCT_value(scts, i);
213 int unverified_sct_count = sk_SCT_num(scts) - invalid_sct_count - valid_sct_count;
215 TEST_info("%d SCTs failed, %d SCTs unverified"
    [all...]
  /src/crypto/external/bsd/openssl/dist/test/
ct_test.c 37 /* Set the following to test handling of SCTs in X509 certificates */
41 /* Expected number of SCTs */
43 /* Expected number of valid SCTS */
45 /* Set the following to test handling of SCTs in TLS format */
183 static int assert_validity(CT_TEST_FIXTURE *fixture, STACK_OF(SCT) *scts,
190 if (!TEST_int_ge(SCT_LIST_validate(scts, policy_ctx), 0))
193 for (i = 0; i < sk_SCT_num(scts); ++i) {
194 SCT *sct_i = sk_SCT_value(scts, i);
213 int unverified_sct_count = sk_SCT_num(scts) -
216 TEST_info("%d SCTs failed, %d SCTs unverified"
    [all...]
  /src/crypto/external/bsd/openssl.old/dist/test/
ct_test.c 36 /* Set the following to test handling of SCTs in X509 certificates */
40 /* Expected number of SCTs */
42 /* Expected number of valid SCTS */
44 /* Set the following to test handling of SCTs in TLS format */
178 static int assert_validity(CT_TEST_FIXTURE *fixture, STACK_OF(SCT) *scts,
185 if (!TEST_int_ge(SCT_LIST_validate(scts, policy_ctx), 0))
188 for (i = 0; i < sk_SCT_num(scts); ++i) {
189 SCT *sct_i = sk_SCT_value(scts, i);
208 int unverified_sct_count = sk_SCT_num(scts) -
211 TEST_info("%d SCTs failed, %d SCTs unverified"
    [all...]
  /src/crypto/external/apache2/openssl/dist/crypto/ct/
ct_sct.c 337 * associated with the shared (by all SCTs) policy eval ctx.
342 * mark the SCTs invalid, rather than report a failure to determine the
365 int SCT_LIST_validate(const STACK_OF(SCT) *scts, CT_POLICY_EVAL_CTX *ctx)
368 int sct_count = scts != NULL ? sk_SCT_num(scts) : 0;
373 SCT *sct = sk_SCT_value(scts, i);
  /src/crypto/external/bsd/openssl/dist/crypto/ct/
ct_sct.c 347 * associated with the shared (by all SCTs) policy eval ctx.
352 * mark the SCTs invalid, rather than report a failure to determine the
376 int SCT_LIST_validate(const STACK_OF(SCT) *scts, CT_POLICY_EVAL_CTX *ctx)
379 int sct_count = scts != NULL ? sk_SCT_num(scts) : 0;
384 SCT *sct = sk_SCT_value(scts, i);
  /src/crypto/external/bsd/openssl.old/dist/crypto/ct/
ct_sct.c 347 * associated with the shared (by all SCTs) policy eval ctx.
352 * mark the SCTs invalid, rather than report a failure to determine the
376 int SCT_LIST_validate(const STACK_OF(SCT) *scts, CT_POLICY_EVAL_CTX *ctx)
379 int sct_count = scts != NULL ? sk_SCT_num(scts) : 0;
384 SCT *sct = sk_SCT_value(scts, i);
  /src/crypto/external/bsd/openssl/dist/ssl/
ssl_lib.c 1244 SCT_LIST_free(s->scts);
1245 OPENSSL_free(s->ext.scts);
5007 * Moves SCTs from the |src| stack to the |dst| stack.
5011 * Returns the number of SCTs moved, or a negative integer if an error occurs.
5046 * Returns the number of SCTs extracted.
5052 if (s->ext.scts != NULL) {
5053 const unsigned char *p = s->ext.scts;
5054 STACK_OF(SCT) *scts = o2i_SCT_LIST(NULL, &p, s->ext.scts_len);
5056 scts_extracted = ct_move_scts(&s->scts, scts, SCT_SOURCE_TLS_EXTENSION)
    [all...]
ssl_local.h 1000 * Validates that the SCTs (Signed Certificate Timestamps) are sufficient.
1591 unsigned char *scts; member in struct:ssl_st::__anon1660
1700 * Validates that the SCTs (Signed Certificate Timestamps) are sufficient.
1707 * Consolidated stack of SCTs from all sources.
1710 STACK_OF(SCT) *scts; member in struct:ssl_st
1711 /* Have we attempted to find/parse SCTs yet? */
  /src/crypto/external/bsd/openssl.old/dist/ssl/
ssl_lib.c 1203 SCT_LIST_free(s->scts);
1204 OPENSSL_free(s->ext.scts);
4740 * Moves SCTs from the |src| stack to the |dst| stack.
4744 * Returns the number of SCTs moved, or a negative integer if an error occurs.
4778 * Returns the number of SCTs extracted.
4784 if (s->ext.scts != NULL) {
4785 const unsigned char *p = s->ext.scts;
4786 STACK_OF(SCT) *scts = o2i_SCT_LIST(NULL, &p, s->ext.scts_len);
4788 scts_extracted = ct_move_scts(&s->scts, scts, SCT_SOURCE_TLS_EXTENSION)
    [all...]
ssl_local.h 889 * Validates that the SCTs (Signed Certificate Timestamps) are sufficient.
1275 unsigned char *scts; member in struct:ssl_st::__anon2194
1384 * Validates that the SCTs (Signed Certificate Timestamps) are sufficient.
1391 * Consolidated stack of SCTs from all sources.
1394 STACK_OF(SCT) *scts; member in struct:ssl_st
1395 /* Have we attempted to find/parse SCTs yet? */
  /src/crypto/external/apache2/openssl/dist/include/openssl/
ct.h.in 100 /* Gets the peer certificate that the SCTs are for */
104 * Sets the certificate associated with the received SCTs.
114 * Sets the issuer of the certificate associated with the received SCTs.
120 /* Gets the CT logs that are trusted sources of SCTs */
130 * Such SCTs will fail validation, as required by RFC6962.
135 * Sets the time to evaluate SCTs against, in milliseconds since the Unix epoch.
137 * been issued in the future. RFC6962 states that "TLS clients MUST reject SCTs
169 * Free a stack of SCTs, and the underlying SCTs themselves.
311 * SCTs will be delimited by |separator|
    [all...]
  /src/crypto/external/bsd/openssl/dist/include/openssl/
ct.h.in 98 /* Gets the peer certificate that the SCTs are for */
102 * Sets the certificate associated with the received SCTs.
112 * Sets the issuer of the certificate associated with the received SCTs.
118 /* Gets the CT logs that are trusted sources of SCTs */
128 * Such SCTs will fail validation, as required by RFC6962.
133 * Sets the time to evaluate SCTs against, in milliseconds since the Unix epoch.
135 * been issued in the future. RFC6962 states that "TLS clients MUST reject SCTs
167 * Free a stack of SCTs, and the underlying SCTs themselves.
309 * SCTs will be delimited by |separator|
    [all...]
  /src/crypto/external/bsd/openssl.old/dist/include/openssl/
ct.h 75 /* Gets the peer certificate that the SCTs are for */
79 * Sets the certificate associated with the received SCTs.
89 * Sets the issuer of the certificate associated with the received SCTs.
95 /* Gets the CT logs that are trusted sources of SCTs */
105 * Such SCTs will fail validation, as required by RFC6962.
110 * Sets the time to evaluate SCTs against, in milliseconds since the Unix epoch.
112 * been issued in the future. RFC6962 states that "TLS clients MUST reject SCTs
144 * Free a stack of SCTs, and the underlying SCTs themselves.
286 * SCTs will be delimited by |separator|
    [all...]
  /src/crypto/external/apache2/openssl/dist/ssl/
ssl_lib.c 1496 SCT_LIST_free(s->scts);
1497 OPENSSL_free(s->ext.scts);
6329 * Moves SCTs from the |src| stack to the |dst| stack.
6333 * Returns the number of SCTs moved, or a negative integer if an error occurs.
6368 * Returns the number of SCTs extracted.
6374 if (s->ext.scts != NULL) {
6375 const unsigned char *p = s->ext.scts;
6376 STACK_OF(SCT) *scts = o2i_SCT_LIST(NULL, &p, s->ext.scts_len);
6378 scts_extracted = ct_move_scts(&s->scts, scts, SCT_SOURCE_TLS_EXTENSION)
    [all...]
ssl_local.h 952 * Validates that the SCTs (Signed Certificate Timestamps) are sufficient.
1628 unsigned char *scts; member in struct:ssl_connection_st::__anon629
1754 * Validates that the SCTs (Signed Certificate Timestamps) are sufficient.
1761 * Consolidated stack of SCTs from all sources.
1764 STACK_OF(SCT) *scts; member in struct:ssl_connection_st
1765 /* Have we attempted to find/parse SCTs yet? */
  /src/crypto/external/apache2/openssl/dist/ssl/statem/
extensions_clnt.c 1550 OPENSSL_free(s->ext.scts);
1551 s->ext.scts = NULL;
1555 s->ext.scts = OPENSSL_malloc(size);
1556 if (s->ext.scts == NULL) {
1561 if (!PACKET_copy_bytes(pkt, s->ext.scts, size)) {
  /src/crypto/external/bsd/openssl/dist/ssl/statem/
extensions_clnt.c 1446 OPENSSL_free(s->ext.scts);
1447 s->ext.scts = NULL;
1451 s->ext.scts = OPENSSL_malloc(size);
1452 if (s->ext.scts == NULL) {
1457 if (!PACKET_copy_bytes(pkt, s->ext.scts, size)) {
  /src/crypto/external/bsd/openssl.old/dist/ssl/statem/
extensions_clnt.c 1504 OPENSSL_free(s->ext.scts);
1505 s->ext.scts = NULL;
1509 s->ext.scts = OPENSSL_malloc(size);
1510 if (s->ext.scts == NULL) {
1516 if (!PACKET_copy_bytes(pkt, s->ext.scts, size)) {
  /src/crypto/external/bsd/openssl/dist/apps/
s_client.c 485 {"ct", OPT_CT, '-', "Request and parse SCTs (also enables OCSP stapling)"},
486 {"noct", OPT_NOCT, '-', "Do not request or parse SCTs (default)"},
1892 * can show the names of the logs any SCTs came from (SCTs may be seen
3199 * handshake, no SCTs are provided as part of the handshake. While in
3200 * a resumed session SCTs may be present in the session's certificate,
3202 * set of SCTs may be incomplete. Thus it makes little sense to
3203 * attempt to display SCTs from a resumed session's certificate, and of
3207 const STACK_OF(SCT) *scts = SSL_get0_peer_scts(s);
3208 int sct_count = scts != NULL ? sk_SCT_num(scts) : 0
    [all...]
  /src/crypto/external/bsd/openssl.old/dist/apps/
s_client.c 786 {"ct", OPT_CT, '-', "Request and parse SCTs (also enables OCSP stapling)"},
787 {"noct", OPT_NOCT, '-', "Do not request or parse SCTs (default)"},
1927 * can show the names of the logs any SCTs came from (SCTs may be seen
3240 * handshake, no SCTs are provided as part of the handshake. While in
3241 * a resumed session SCTs may be present in the session's certificate,
3243 * set of SCTs may be incomplete. Thus it makes little sense to
3244 * attempt to display SCTs from a resumed session's certificate, and of
3248 const STACK_OF(SCT) *scts = SSL_get0_peer_scts(s);
3249 int sct_count = scts != NULL ? sk_SCT_num(scts) : 0
    [all...]
  /src/crypto/external/apache2/openssl/dist/apps/
s_client.c 619 { "ct", OPT_CT, '-', "Request and parse SCTs (also enables OCSP stapling)" },
620 { "noct", OPT_NOCT, '-', "Do not request or parse SCTs (default)" },
2101 * can show the names of the logs any SCTs came from (SCTs may be seen
3543 * handshake, no SCTs are provided as part of the handshake. While in
3544 * a resumed session SCTs may be present in the session's certificate,
3546 * set of SCTs may be incomplete. Thus it makes little sense to
3547 * attempt to display SCTs from a resumed session's certificate, and of
3551 const STACK_OF(SCT) *scts = SSL_get0_peer_scts(s);
3552 int sct_count = scts != NULL ? sk_SCT_num(scts) : 0
    [all...]

Completed in 68 milliseconds

1 2