/openssl-master/doc/man3/ |
A D | SCT_new.pod | 38 SCT *SCT_new(void); 46 void SCT_free(SCT *sct); 47 void SCT_LIST_free(STACK_OF(SCT) *a); 59 uint64_t SCT_get_timestamp(const SCT *sct); 62 int SCT_get_signature_nid(const SCT *sct); 73 sct_source_t SCT_get_source(const SCT *sct); 91 SCT_set_version() to set the SCT version. 157 The SCT extensions, base64 encoded. 161 The SCT signature, base64 encoded. 167 required for verifying the SCT. [all …]
|
A D | SCT_validate.pod | 21 int SCT_validate(SCT *sct, const CT_POLICY_EVAL_CTX *ctx); 22 int SCT_LIST_validate(const STACK_OF(SCT) *scts, CT_POLICY_EVAL_CTX *ctx); 23 sct_validation_status_t SCT_get_validation_status(const SCT *sct); 27 SCT_validate() will check that an SCT is valid and verify its signature. 29 The result of the validation checks can be obtained by passing the SCT to 38 The certificate the SCT was issued for. 47 This is only required if the SCT was issued for a pre-certificate 53 A CTLOG_STORE that contains the CT log that issued this SCT. 72 failure. At a minimum, only one valid SCT may provide sufficient confidence 78 SCT fails validation, or 1 if the SCT passes validation. [all …]
|
A D | SCT_print.pod | 12 void SCT_print(const SCT *sct, BIO *out, int indent, const CTLOG_STORE *logs); 13 void SCT_LIST_print(const STACK_OF(SCT) *sct_list, BIO *out, int indent, 15 const char *SCT_validation_status_string(const SCT *sct); 19 SCT_print() prints a single Signed Certificate Timestamp (SCT) to a B<BIO> in 21 similar way. A separator can be specified to delimit each SCT in the output. 25 each SCT (if that log is in the CTLOG_STORE). Alternatively, NULL can be passed 28 SCT_validation_status_string() will return the validation status of an SCT as 30 beforehand in order to set the validation status of an SCT first. 35 the validation status of an B<SCT> object.
|
A D | o2i_SCT_LIST.pod | 12 STACK_OF(SCT) *o2i_SCT_LIST(STACK_OF(SCT) **a, const unsigned char **pp, 14 int i2o_SCT_LIST(const STACK_OF(SCT) *a, unsigned char **pp); 15 SCT *o2i_SCT(SCT **psct, const unsigned char **in, size_t len); 16 int i2o_SCT(const SCT *sct, unsigned char **out); 20 The SCT_LIST and SCT functions are very similar to the i2d and d2i family of
|
A D | CT_POLICY_EVAL_CTX_new.pod | 35 This policy may be, for example, that at least one valid SCT is available. To 36 determine this, an SCT's timestamp and signature must be verified. 43 the public key of the log that issued the SCT 47 the certificate that the SCT was issued for 51 the issuer certificate (if the SCT was issued for a pre-certificate) 96 The SCT timestamp will be compared to this time to check whether the SCT was 115 found in the TLS SCT extension or OCSP response.
|
A D | SSL_CTX_set_ct_validation_callback.pod | 16 const STACK_OF(SCT) *scts, void *arg); 60 Therefore, in applications that delay SCT policy enforcement until after 61 handshake completion, such delayed SCT checks should only be performed when the 101 When SCT processing is enabled, OCSP stapling will be enabled. This is because 110 be set if a custom client extension handler has been registered to handle SCT
|
A D | SSL_get0_peer_scts.pod | 11 const STACK_OF(SCT) *SSL_get0_peer_scts(SSL *s);
|
A D | CTLOG_STORE_get0_log_by_id.pod | 18 A Signed Certificate Timestamp (SCT) identifies the Certificate Transparency
|
/openssl-master/include/openssl/ |
A D | ct.h.in | 44 generate_stack_macros("SCT") 141 * SCT functions * 145 * Creates a new, blank SCT. 148 SCT *SCT_new(void); 164 void SCT_free(SCT *sct); 178 * Set the version of an SCT. 209 * Set the log ID of an SCT. 370 STACK_OF(SCT) *o2i_SCT_LIST(STACK_OF(SCT) **a, const unsigned char **pp, 397 STACK_OF(SCT) *d2i_SCT_LIST(STACK_OF(SCT) **a, const unsigned char **pp, 419 * If the SCT is an unsupported version, only the SCT's 'sct' and 'sct_len' [all …]
|
A D | types.h | 206 typedef struct sct_st SCT; typedef
|
A D | ssl.h.in | 2255 const STACK_OF(SCT) *scts, void *arg); 2262 * If a NULL |callback| is provided, SCT validation is disabled. 2294 * least one valid SCT, or else handshake termination will be requested. The 2307 const STACK_OF(SCT) *SSL_get0_peer_scts(SSL *s);
|
/openssl-master/crypto/ct/ |
A D | ct_sct.c | 22 SCT *SCT_new(void) in SCT_new() 24 SCT *sct = OPENSSL_zalloc(sizeof(*sct)); in SCT_new() 36 void SCT_free(SCT *sct) in SCT_free() 48 void SCT_LIST_free(STACK_OF(SCT) *a) in SCT_LIST_free() 124 int SCT_set_signature_nid(SCT *sct, int nid) in SCT_set_signature_nid() 195 sct_version_t SCT_get_version(const SCT *sct) in SCT_get_version() 211 uint64_t SCT_get_timestamp(const SCT *sct) in SCT_get_timestamp() 216 int SCT_get_signature_nid(const SCT *sct) in SCT_get_signature_nid() 245 int SCT_is_complete(const SCT *sct) in SCT_is_complete() 263 sct_source_t SCT_get_source(const SCT *sct) in SCT_get_source() [all …]
|
A D | ct_x509v3.c | 26 static int i2r_SCT_LIST(X509V3_EXT_METHOD *method, STACK_OF(SCT) *sct_list, in i2r_SCT_LIST() 33 static int set_sct_list_source(STACK_OF(SCT) *s, sct_source_t source) in set_sct_list_source() 49 static STACK_OF(SCT) *x509_ext_d2i_SCT_LIST(STACK_OF(SCT) **a, in STACK_OF() argument 53 STACK_OF(SCT) *s = d2i_SCT_LIST(a, pp, len); in STACK_OF() 63 static STACK_OF(SCT) *ocsp_ext_d2i_SCT_LIST(STACK_OF(SCT) **a, in STACK_OF() argument 67 STACK_OF(SCT) *s = d2i_SCT_LIST(a, pp, len); in STACK_OF()
|
A D | ct_oct.c | 70 SCT *o2i_SCT(SCT **psct, const unsigned char **in, size_t len) in o2i_SCT() 72 SCT *sct = NULL; in o2i_SCT() 153 int i2o_SCT_signature(const SCT *sct, unsigned char **out) in i2o_SCT_signature() 200 int i2o_SCT(const SCT *sct, unsigned char **out) in i2o_SCT() 257 STACK_OF(SCT) *o2i_SCT_LIST(STACK_OF(SCT) **a, const unsigned char **pp, in STACK_OF() argument 260 STACK_OF(SCT) *sk = NULL; in STACK_OF() 279 SCT *sct; in STACK_OF() 288 SCT *sct; in STACK_OF() 321 int i2o_SCT_LIST(const STACK_OF(SCT) *a, unsigned char **pp) in i2o_SCT_LIST() 376 STACK_OF(SCT) *d2i_SCT_LIST(STACK_OF(SCT) **a, const unsigned char **pp, in STACK_OF() argument [all …]
|
A D | ct_local.h | 177 __owur int SCT_CTX_verify(const SCT_CTX *sctx, const SCT *sct); 183 __owur int SCT_is_complete(const SCT *sct); 191 __owur int SCT_signature_is_complete(const SCT *sct); 201 __owur int i2o_SCT_signature(const SCT *sct, unsigned char **out); 212 __owur int o2i_SCT_signature(SCT *sct, const unsigned char **in, size_t len);
|
A D | ct_prn.c | 19 static void SCT_signature_algorithms_print(const SCT *sct, BIO *out) in SCT_signature_algorithms_print() 50 const char *SCT_validation_status_string(const SCT *sct) in SCT_validation_status_string() 70 void SCT_print(const SCT *sct, BIO *out, int indent, in SCT_print() 114 void SCT_LIST_print(const STACK_OF(SCT) *sct_list, BIO *out, int indent, in SCT_LIST_print() 121 SCT *sct = sk_SCT_value(sct_list, i); in SCT_LIST_print()
|
A D | ct_vfy.c | 29 static int sct_ctx_update(EVP_MD_CTX *ctx, const SCT_CTX *sctx, const SCT *sct) in sct_ctx_update() 96 int SCT_CTX_verify(const SCT_CTX *sctx, const SCT *sct) in SCT_CTX_verify()
|
A D | ct_b64.c | 63 SCT *SCT_new_from_base64(unsigned char version, const char *logid_base64, in SCT_new_from_base64() 68 SCT *sct = SCT_new(); in SCT_new_from_base64()
|
/openssl-master/test/ |
A D | ct_test.c | 48 STACK_OF(SCT) *sct_list; 126 static int compare_sct_list_printout(STACK_OF(SCT) *sct, in compare_sct_list_printout() 183 static int assert_validity(CT_TEST_FIXTURE *fixture, STACK_OF(SCT) *scts, in assert_validity() 194 SCT *sct_i = sk_SCT_value(scts, i); in assert_validity() 228 STACK_OF(SCT) *scts = NULL; in execute_cert_test() 229 SCT *sct = NULL; in execute_cert_test() 283 SCT *sct_i = sk_SCT_value(scts, i); in execute_cert_test() 447 SCT *sct = NULL; in test_encode_tls_sct()
|
/openssl-master/fuzz/ |
A D | ct.c | 32 STACK_OF(SCT) *scts = d2i_SCT_LIST(NULL, pp, len); in FuzzerTestOneInput()
|
/openssl-master/ssl/ |
A D | ssl_lib.c | 4932 static int ct_move_scts(STACK_OF(SCT) **dst, STACK_OF(SCT) *src, in ct_move_scts() 4936 SCT *sct = NULL; in ct_move_scts() 4972 STACK_OF(SCT) *scts = o2i_SCT_LIST(NULL, &p, s->ext.scts_len); in ct_extract_tls_extension_scts() 4997 STACK_OF(SCT) *scts = NULL; in ct_extract_ocsp_response_scts() 5047 STACK_OF(SCT) *scts = in ct_extract_x509v3_extension_scts() 5064 const STACK_OF(SCT) *SSL_get0_peer_scts(SSL *s) in STACK_OF() argument 5080 const STACK_OF(SCT) *scts, void *unused_arg) in ct_permissive() 5086 const STACK_OF(SCT) *scts, void *unused_arg) in ct_strict() 5092 SCT *sct = sk_SCT_value(scts, i); in ct_strict() 5166 const STACK_OF(SCT) *scts; in ssl_validate_ct()
|
A D | ssl_local.h | 1704 STACK_OF(SCT) *scts;
|
/openssl-master/util/ |
A D | indent.pro | 370 -T SCT
|
/openssl-master/apps/ |
A D | s_client.c | 3159 const STACK_OF(SCT) *scts = SSL_get0_peer_scts(s); in print_stuff() 3168 SCT *sct = sk_SCT_value(scts, i); in print_stuff()
|