Lines Matching full:sct

97 \& SCT *SCT_new(void);
98 \& SCT *SCT_new_from_base64(unsigned char version,
105 \& void SCT_free(SCT *sct);
106 \& void SCT_LIST_free(STACK_OF(SCT) *a);
108 \& sct_version_t SCT_get_version(const SCT *sct);
109 \& int SCT_set_version(SCT *sct, sct_version_t version);
111 \& ct_log_entry_type_t SCT_get_log_entry_type(const SCT *sct);
112 \& int SCT_set_log_entry_type(SCT *sct, ct_log_entry_type_t entry_type);
114 \& size_t SCT_get0_log_id(const SCT *sct, unsigned char **log_id);
115 \& int SCT_set0_log_id(SCT *sct, unsigned char *log_id, size_t log_id_len);
116 \& int SCT_set1_log_id(SCT *sct, const unsigned char *log_id, size_t log_id_len);
118 \& uint64_t SCT_get_timestamp(const SCT *sct);
119 \& void SCT_set_timestamp(SCT *sct, uint64_t timestamp);
121 \& int SCT_get_signature_nid(const SCT *sct);
122 \& int SCT_set_signature_nid(SCT *sct, int nid);
124 \& size_t SCT_get0_signature(const SCT *sct, unsigned char **sig);
125 \& void SCT_set0_signature(SCT *sct, unsigned char *sig, size_t sig_len);
126 \& int SCT_set1_signature(SCT *sct, const unsigned char *sig, size_t sig_len);
128 \& size_t SCT_get0_extensions(const SCT *sct, unsigned char **ext);
129 \& void SCT_set0_extensions(SCT *sct, unsigned char *ext, size_t ext_len);
130 \& int SCT_set1_extensions(SCT *sct, const unsigned char *ext, size_t ext_len);
132 \& sct_source_t SCT_get_source(const SCT *sct);
133 \& int SCT_set_source(SCT *sct, sct_source_t source);
140 an SCT, some confidence can be gained that the certificate is publicly known.
142 An internal representation of an SCT can be created in one of two ways.
143 The first option is to create a blank SCT, using \fBSCT_new()\fR, and then populate
146 \&\fBSCT_set_version()\fR to set the SCT version.
150 \&\fBSCT_set_log_entry_type()\fR to set the type of certificate the SCT was issued for:
155 \&\fBSCT_set0_log_id()\fR or \fBSCT_set1_log_id()\fR to set the LogID of the CT log that the SCT ca…
160 \&\fBSCT_set_timestamp()\fR to set the time the SCT was issued (time in milliseconds
169 \&\fBSCT_set0_extensions()\fR or \fBSCT_set1_extensions\fR to provide SCT extensions.
173 Alternatively, the SCT can be pre-populated from the following data using
176 The SCT version (only SCT_VERSION_V1 is currently supported).
180 The type of certificate the SCT was issued for:
184 The time that the SCT was issued (time in milliseconds since the Unix Epoch).
186 The SCT extensions, base64 encoded.
188 The SCT signature, base64 encoded.
190 \&\fBSCT_set_source()\fR can be used to record where the SCT was found
192 required for verifying the SCT.
194 \&\fBSCT_free()\fR frees the specified SCT.
204 All of the setters will reset the validation status of the SCT to
208 certificate the SCT was issued for can be inferred from where the SCT was found.
209 For example, an SCT found in an X.509 extension must have been issued for a pre\-