Searched refs:scts (Results 1 – 14 of 14) sorted by relevance
/openssl/test/ssl-tests/ |
H A D | 12-ct.cnf | 5 test-0 = 0-ct-permissive-without-scts 6 test-1 = 1-ct-permissive-with-scts 7 test-2 = 2-ct-strict-without-scts 8 test-3 = 3-ct-strict-with-scts 13 [0-ct-permissive-without-scts] 16 [0-ct-permissive-without-scts-ssl] 40 [1-ct-permissive-with-scts] 43 [1-ct-permissive-with-scts-ssl] 67 [2-ct-strict-without-scts] 95 [3-ct-strict-with-scts] [all …]
|
H A D | 12-ct.cnf.in | 20 name => "ct-permissive-without-scts", 33 name => "ct-permissive-with-scts", 49 name => "ct-strict-without-scts", 63 name => "ct-strict-with-scts",
|
/openssl/fuzz/ |
H A D | ct.c | 32 STACK_OF(SCT) *scts = d2i_SCT_LIST(NULL, pp, len); in FuzzerTestOneInput() 33 if (scts != NULL) { in FuzzerTestOneInput() 35 SCT_LIST_print(scts, bio, 4, "\n", NULL); in FuzzerTestOneInput() 38 if (i2d_SCT_LIST(scts, &der)) { in FuzzerTestOneInput() 43 SCT_LIST_free(scts); in FuzzerTestOneInput()
|
/openssl/test/ |
H A D | ct_test.c | 190 if (!TEST_int_ge(SCT_LIST_validate(scts, policy_ctx), 0)) in assert_validity() 193 for (i = 0; i < sk_SCT_num(scts); ++i) { in assert_validity() 194 SCT *sct_i = sk_SCT_value(scts, i); in assert_validity() 213 int unverified_sct_count = sk_SCT_num(scts) - in assert_validity() 228 STACK_OF(SCT) *scts = NULL; in execute_cert_test() 281 scts = X509V3_EXT_d2i(sct_extension); in execute_cert_test() 282 for (i = 0; i < sk_SCT_num(scts); ++i) { in execute_cert_test() 283 SCT *sct_i = sk_SCT_value(scts, i); in execute_cert_test() 307 if (!assert_validity(fixture, scts, ct_policy_ctx)) in execute_cert_test() 316 tls_sct_list_len = i2o_SCT_LIST(scts, &tls_sct_list); in execute_cert_test() [all …]
|
/openssl/crypto/ct/ |
H A D | ct_sct.c | 368 int SCT_LIST_validate(const STACK_OF(SCT) *scts, CT_POLICY_EVAL_CTX *ctx) in SCT_LIST_validate() argument 371 int sct_count = scts != NULL ? sk_SCT_num(scts) : 0; in SCT_LIST_validate() 376 SCT *sct = sk_SCT_value(scts, i); in SCT_LIST_validate()
|
/openssl/ssl/ |
H A D | ssl_lib.c | 1454 SCT_LIST_free(s->scts); in ossl_ssl_connection_free() 1455 OPENSSL_free(s->ext.scts); in ossl_ssl_connection_free() 6288 scts_extracted = ct_move_scts(&s->scts, scts, SCT_SOURCE_TLS_EXTENSION); in ct_extract_tls_extension_scts() 6290 SCT_LIST_free(scts); in ct_extract_tls_extension_scts() 6332 scts = in ct_extract_ocsp_response_scts() 6335 ct_move_scts(&s->scts, scts, SCT_SOURCE_OCSP_STAPLED_RESPONSE); in ct_extract_ocsp_response_scts() 6340 SCT_LIST_free(scts); in ct_extract_ocsp_response_scts() 6365 ct_move_scts(&s->scts, scts, SCT_SOURCE_X509V3_EXTENSION); in ct_extract_x509v3_extension_scts() 6367 SCT_LIST_free(scts); in ct_extract_x509v3_extension_scts() 6393 return sc->scts; in STACK_OF() [all …]
|
H A D | ssl_local.h | 1581 unsigned char *scts; member 1710 STACK_OF(SCT) *scts;
|
/openssl/doc/man3/ |
H A D | SCT_validate.pod | 22 int SCT_LIST_validate(const STACK_OF(SCT) *scts, CT_POLICY_EVAL_CTX *ctx);
|
H A D | SSL_CTX_set_ct_validation_callback.pod | 16 const STACK_OF(SCT) *scts, void *arg);
|
/openssl/ssl/statem/ |
H A D | extensions_clnt.c | 1509 OPENSSL_free(s->ext.scts); in tls_parse_stoc_sct() 1510 s->ext.scts = NULL; in tls_parse_stoc_sct() 1514 s->ext.scts = OPENSSL_malloc(size); in tls_parse_stoc_sct() 1515 if (s->ext.scts == NULL) { in tls_parse_stoc_sct() 1520 if (!PACKET_copy_bytes(pkt, s->ext.scts, size)) { in tls_parse_stoc_sct()
|
/openssl/apps/ |
H A D | s_client.c | 3457 const STACK_OF(SCT) *scts = SSL_get0_peer_scts(s); in print_stuff() 3458 int sct_count = scts != NULL ? sk_SCT_num(scts) : 0; in print_stuff() 3466 SCT *sct = sk_SCT_value(scts, i); in print_stuff()
|
/openssl/include/openssl/ |
H A D | ct.h.in | 338 __owur int SCT_LIST_validate(const STACK_OF(SCT) *scts,
|
H A D | ssl.h.in | 2543 const STACK_OF(SCT) *scts, void *arg);
|
/openssl/crypto/err/ |
H A D | openssl.txt | 1524 SSL_R_NO_VALID_SCTS:216:no valid scts
|
Completed in 81 milliseconds