Home
last modified time | relevance | path

Searched full:sct (Results 1 – 25 of 73) sorted by relevance

123

/freebsd/crypto/openssl/crypto/ct/
H A Dct_sct.c22 SCT *SCT_new(void) in SCT_new()
24 SCT *sct = OPENSSL_zalloc(sizeof(*sct)); in SCT_new() local
26 if (sct == NULL) in SCT_new()
29 sct->entry_type = CT_LOG_ENTRY_TYPE_NOT_SET; in SCT_new()
30 sct->version = SCT_VERSION_NOT_SET; in SCT_new()
31 return sct; in SCT_new()
34 void SCT_free(SCT *sct) in SCT_free() argument
36 if (sct == NULL) in SCT_free()
39 OPENSSL_free(sct->log_id); in SCT_free()
40 OPENSSL_free(sct->ext); in SCT_free()
[all …]
H A Dct_oct.c24 int o2i_SCT_signature(SCT *sct, const unsigned char **in, size_t len) in o2i_SCT_signature() argument
30 if (sct->version != SCT_VERSION_V1) { in o2i_SCT_signature()
48 sct->hash_alg = *p++; in o2i_SCT_signature()
49 sct->sig_alg = *p++; in o2i_SCT_signature()
50 if (SCT_get_signature_nid(sct) == NID_undef) { in o2i_SCT_signature()
62 if (SCT_set1_signature(sct, p, siglen) != 1) in o2i_SCT_signature()
70 SCT *o2i_SCT(SCT **psct, const unsigned char **in, size_t len) in o2i_SCT()
72 SCT *sct = NULL; in o2i_SCT() local
80 if ((sct = SCT_new()) == NULL) in o2i_SCT()
85 sct->version = *p; in o2i_SCT()
[all …]
H A Dct_prn.c19 static void SCT_signature_algorithms_print(const SCT *sct, BIO *out) in SCT_signature_algorithms_print() argument
21 int nid = SCT_get_signature_nid(sct); in SCT_signature_algorithms_print()
24 BIO_printf(out, "%02X%02X", sct->hash_alg, sct->sig_alg); in SCT_signature_algorithms_print()
50 const char *SCT_validation_status_string(const SCT *sct) in SCT_validation_status_string() argument
53 switch (SCT_get_validation_status(sct)) { in SCT_validation_status_string()
70 void SCT_print(const SCT *sct, BIO *out, int indent, in SCT_print() argument
76 log = CTLOG_STORE_get0_log_by_id(log_store, sct->log_id, in SCT_print()
77 sct->log_id_len); in SCT_print()
83 if (sct->version != SCT_VERSION_V1) { in SCT_print()
85 BIO_hex_string(out, indent + 16, 16, sct->sct, sct->sct_len); in SCT_print()
[all …]
H A Dct_vfy.c26 * Update encoding for SCT signature verification/generation to supplied
29 static int sct_ctx_update(EVP_MD_CTX *ctx, const SCT_CTX *sctx, const SCT *sct) in sct_ctx_update() argument
44 * (2 bytes + sct->ext_len) CtExtensions extensions; in sct_ctx_update()
47 if (sct->entry_type == CT_LOG_ENTRY_TYPE_NOT_SET) in sct_ctx_update()
49 if (sct->entry_type == CT_LOG_ENTRY_TYPE_PRECERT && sctx->ihash == NULL) in sct_ctx_update()
53 *p++ = sct->version; in sct_ctx_update()
55 l2n8(sct->timestamp, p); in sct_ctx_update()
56 s2n(sct->entry_type, p); in sct_ctx_update()
61 if (sct->entry_type == CT_LOG_ENTRY_TYPE_X509) { in sct_ctx_update()
86 s2n(sct->ext_len, p); in sct_ctx_update()
[all …]
H A Dct_local.h59 /* If version is not SCT_VERSION_V1, this contains the encoded SCT */
60 unsigned char *sct; member
62 /* If version is SCT_VERSION_V1, fields below contain components of the SCT */
68 * SCT should ever be set as such.
79 /* Where this SCT was found, e.g. certificate, OCSP response, etc. */
81 /* The result of the last attempt to validate this SCT. */
85 /* Miscellaneous data that is useful when verifying an SCT */
101 /* milliseconds since epoch (to check that the SCT isn't from the future) */
121 * Creates a new context for verifying an SCT.
125 * Deletes an SCT verification context.
[all …]
H A Dct_b64.c61 SCT *SCT_new_from_base64(unsigned char version, const char *logid_base64, in SCT_new_from_base64()
66 SCT *sct = SCT_new(); in SCT_new_from_base64() local
71 if (sct == NULL) { in SCT_new_from_base64()
78 * can only construct SCT versions that have been defined. in SCT_new_from_base64()
80 if (!SCT_set_version(sct, version)) { in SCT_new_from_base64()
90 if (!SCT_set0_log_id(sct, dec, declen)) in SCT_new_from_base64()
99 SCT_set0_extensions(sct, dec, declen); in SCT_new_from_base64()
109 if (o2i_SCT_signature(sct, &p, declen) <= 0) in SCT_new_from_base64()
114 SCT_set_timestamp(sct, timestamp); in SCT_new_from_base64()
116 if (!SCT_set_log_entry_type(sct, entry_type)) in SCT_new_from_base64()
[all …]
H A Dct_x509v3.c26 static int i2r_SCT_LIST(X509V3_EXT_METHOD *method, STACK_OF(SCT) *sct_list, in i2r_SCT_LIST()
33 static int set_sct_list_source(STACK_OF(SCT) *s, sct_source_t source) in set_sct_list_source()
49 static STACK_OF(SCT) *x509_ext_d2i_SCT_LIST(STACK_OF(SCT) **a, in STACK_OF() argument
53 STACK_OF(SCT) *s = d2i_SCT_LIST(a, pp, len); in STACK_OF()
63 static STACK_OF(SCT) *ocsp_ext_d2i_SCT_LIST(STACK_OF(SCT) **a, in STACK_OF() argument
67 STACK_OF(SCT) *s = d2i_SCT_LIST(a, pp, len); in STACK_OF()
H A Dct_err.c32 "sct future timestamp"},
33 {ERR_PACK(ERR_LIB_CT, 0, CT_R_SCT_INVALID), "sct invalid"},
35 "sct invalid signature"},
36 {ERR_PACK(ERR_LIB_CT, 0, CT_R_SCT_LIST_INVALID), "sct list invalid"},
37 {ERR_PACK(ERR_LIB_CT, 0, CT_R_SCT_LOG_ID_MISMATCH), "sct log id mismatch"},
38 {ERR_PACK(ERR_LIB_CT, 0, CT_R_SCT_NOT_SET), "sct not set"},
40 "sct unsupported version"},
/freebsd/crypto/openssl/doc/man3/
H A DSCT_new.pod38 SCT *SCT_new(void);
39 SCT *SCT_new_from_base64(unsigned char version,
46 void SCT_free(SCT *sct);
47 void SCT_LIST_free(STACK_OF(SCT) *a);
49 sct_version_t SCT_get_version(const SCT *sct);
50 int SCT_set_version(SCT *sct, sct_version_t version);
52 ct_log_entry_type_t SCT_get_log_entry_type(const SCT *sct);
53 int SCT_set_log_entry_type(SCT *sct, ct_log_entry_type_t entry_type);
55 size_t SCT_get0_log_id(const SCT *sct, unsigned char **log_id);
56 int SCT_set0_log_id(SCT *sct, unsigned char *log_id, size_t log_id_len);
[all …]
H A DSCT_validate.pod21 int SCT_validate(SCT *sct, const CT_POLICY_EVAL_CTX *ctx);
22 int SCT_LIST_validate(const STACK_OF(SCT) *scts, CT_POLICY_EVAL_CTX *ctx);
23 sct_validation_status_t SCT_get_validation_status(const SCT *sct);
27 SCT_validate() will check that an SCT is valid and verify its signature.
29 The result of the validation checks can be obtained by passing the SCT to
38 The certificate the SCT was issued for.
47 This is only required if the SCT was issued for a pre-certificate
53 A CTLOG_STORE that contains the CT log that issued this SCT.
55 If the SCT was issued by a log that is not in this CTLOG_STORE, the validation
60 If the SCT is of an unsupported version (only v1 is currently supported), the
[all …]
H A DSCT_print.pod12 void SCT_print(const SCT *sct, BIO *out, int indent, const CTLOG_STORE *logs);
13 void SCT_LIST_print(const STACK_OF(SCT) *sct_list, BIO *out, int indent,
15 const char *SCT_validation_status_string(const SCT *sct);
19 SCT_print() prints a single Signed Certificate Timestamp (SCT) to a B<BIO> in
21 similar way. A separator can be specified to delimit each SCT in the output.
25 each SCT (if that log is in the CTLOG_STORE). Alternatively, NULL can be passed
28 SCT_validation_status_string() will return the validation status of an SCT as
30 beforehand in order to set the validation status of an SCT first.
35 the validation status of an B<SCT> object.
H A Do2i_SCT_LIST.pod12 STACK_OF(SCT) *o2i_SCT_LIST(STACK_OF(SCT) **a, const unsigned char **pp,
14 int i2o_SCT_LIST(const STACK_OF(SCT) *a, unsigned char **pp);
15 SCT *o2i_SCT(SCT **psct, const unsigned char **in, size_t len);
16 int i2o_SCT(const SCT *sct, unsigned char **out);
20 The SCT_LIST and SCT functions are very similar to the i2d and d2i family of
H A DCT_POLICY_EVAL_CTX_new.pod35 This policy may be, for example, that at least one valid SCT is available. To
36 determine this, an SCT's timestamp and signature must be verified.
43 the public key of the log that issued the SCT
47 the certificate that the SCT was issued for
51 the issuer certificate (if the SCT was issued for a pre-certificate)
96 The SCT timestamp will be compared to this time to check whether the SCT was
116 found in the TLS SCT extension or OCSP response.
H A DSSL_CTX_set_ct_validation_callback.pod16 const STACK_OF(SCT) *scts, void *arg);
60 Therefore, in applications that delay SCT policy enforcement until after
61 handshake completion, such delayed SCT checks should only be performed when the
101 When SCT processing is enabled, OCSP stapling will be enabled. This is because
110 be set if a custom client extension handler has been registered to handle SCT
/freebsd/secure/lib/libcrypto/man/man3/
H A DSCT_new.397 \& SCT *SCT_new(void);
98 \& SCT *SCT_new_from_base64(unsigned char version,
105 \& void SCT_free(SCT *sct);
106 \& void SCT_LIST_free(STACK_OF(SCT) *a);
108 \& sct_version_t SCT_get_version(const SCT *sct);
109 \& int SCT_set_version(SCT *sct, sct_version_t version);
111 \& ct_log_entry_type_t SCT_get_log_entry_type(const SCT *sct);
112 \& int SCT_set_log_entry_type(SCT *sct, ct_log_entry_type_t entry_type);
114 \& size_t SCT_get0_log_id(const SCT *sct, unsigned char **log_id);
115 \& int SCT_set0_log_id(SCT *sct, unsigned char *log_id, size_t log_id_len);
[all …]
H A DSCT_validate.380 \& int SCT_validate(SCT *sct, const CT_POLICY_EVAL_CTX *ctx);
81 \& int SCT_LIST_validate(const STACK_OF(SCT) *scts, CT_POLICY_EVAL_CTX *ctx);
82 \& sct_validation_status_t SCT_get_validation_status(const SCT *sct);
86 \&\fBSCT_validate()\fR will check that an SCT is valid and verify its signature.
88 The result of the validation checks can be obtained by passing the SCT to
93 The certificate the SCT was issued for.
100 This is only required if the SCT was issued for a pre-certificate
104 A CTLOG_STORE that contains the CT log that issued this SCT.
106 If the SCT was issued by a log that is not in this CTLOG_STORE, the validation
109 If the SCT is of an unsupported version (only v1 is currently supported), the
[all …]
H A DSCT_print.371 \& void SCT_print(const SCT *sct, BIO *out, int indent, const CTLOG_STORE *logs);
72 \& void SCT_LIST_print(const STACK_OF(SCT) *sct_list, BIO *out, int indent,
74 \& const char *SCT_validation_status_string(const SCT *sct);
78 \&\fBSCT_print()\fR prints a single Signed Certificate Timestamp (SCT) to a \fBBIO\fR in
80 similar way. A separator can be specified to delimit each SCT in the output.
84 each SCT (if that log is in the CTLOG_STORE). Alternatively, NULL can be passed
87 \&\fBSCT_validation_status_string()\fR will return the validation status of an SCT as
89 beforehand in order to set the validation status of an SCT first.
93 the validation status of an \fBSCT\fR object.
H A Do2i_SCT_LIST.371 \& STACK_OF(SCT) *o2i_SCT_LIST(STACK_OF(SCT) **a, const unsigned char **pp,
73 \& int i2o_SCT_LIST(const STACK_OF(SCT) *a, unsigned char **pp);
74 \& SCT *o2i_SCT(SCT **psct, const unsigned char **in, size_t len);
75 \& int i2o_SCT(const SCT *sct, unsigned char **out);
79 The SCT_LIST and SCT functions are very similar to the i2d and d2i family of
H A DCT_POLICY_EVAL_CTX_new.394 This policy may be, for example, that at least one valid SCT is available. To
95 determine this, an SCT's timestamp and signature must be verified.
98 the public key of the log that issued the SCT
100 the certificate that the SCT was issued for
102 the issuer certificate (if the SCT was issued for a pre-certificate)
133 The SCT timestamp will be compared to this time to check whether the SCT was
150 found in the TLS SCT extension or OCSP response.
H A DSSL_CTX_set_ct_validation_callback.375 \& const STACK_OF(SCT) *scts, void *arg);
119 Therefore, in applications that delay SCT policy enforcement until after
120 handshake completion, such delayed SCT checks should only be performed when the
159 When SCT processing is enabled, OCSP stapling will be enabled. This is because
167 be set if a custom client extension handler has been registered to handle SCT
/freebsd/crypto/openssl/include/openssl/
H A Dct.h.in44 generate_stack_macros("SCT")
127 * current time when checking whether an SCT was issued in the future.
134 * If an SCT's timestamp is after this time, it will be interpreted as having
136 * whose timestamp is in the future", so an SCT will not validate in this case.
141 * SCT functions *
145 * Creates a new, blank SCT.
146 * The caller is responsible for calling SCT_free when finished with the SCT.
148 SCT *SCT_new(void);
151 * Creates a new SCT from some base64-encoded strings.
152 * The caller is responsible for calling SCT_free when finished with the SCT.
[all …]
H A Dct.h42 SKM_DEFINE_STACK_OF_INTERNAL(SCT, SCT, SCT)
44 #define sk_SCT_value(sk, idx) ((SCT *)OPENSSL_sk_value(ossl_check_const_SCT_sk_type(sk), (idx)))
45 #define sk_SCT_new(cmp) ((STACK_OF(SCT) *)OPENSSL_sk_new(ossl_check_SCT_compfunc_type(cmp)))
46 #define sk_SCT_new_null() ((STACK_OF(SCT) *)OPENSSL_sk_new_null())
47 #define sk_SCT_new_reserve(cmp, n) ((STACK_OF(SCT) *)OPENSSL_sk_new_reserve(ossl_check_SCT_compfunc…
51 #define sk_SCT_delete(sk, i) ((SCT *)OPENSSL_sk_delete(ossl_check_SCT_sk_type(sk), (i)))
52 #define sk_SCT_delete_ptr(sk, ptr) ((SCT *)OPENSSL_sk_delete_ptr(ossl_check_SCT_sk_type(sk), ossl_c…
55 #define sk_SCT_pop(sk) ((SCT *)OPENSSL_sk_pop(ossl_check_SCT_sk_type(sk)))
56 #define sk_SCT_shift(sk) ((SCT *)OPENSSL_sk_shift(ossl_check_SCT_sk_type(sk)))
59 #define sk_SCT_set(sk, idx, ptr) ((SCT *)OPENSSL_sk_set(ossl_check_SCT_sk_type(sk), (idx), ossl_che…
[all …]
/freebsd/crypto/openssl/test/
H A Dct_test.c48 STACK_OF(SCT) *sct_list;
50 * A file to load the expected SCT text from.
56 /* Whether to test the validity of the SCT(s) */
126 static int compare_sct_list_printout(STACK_OF(SCT) *sct, in compare_sct_list_printout() argument
136 SCT_LIST_print(sct, text_buffer, 0, "\n", NULL); in compare_sct_list_printout()
183 static int assert_validity(CT_TEST_FIXTURE *fixture, STACK_OF(SCT) *scts, in assert_validity()
194 SCT *sct_i = sk_SCT_value(scts, i); in assert_validity()
228 STACK_OF(SCT) *scts = NULL; in execute_cert_test()
229 SCT *sct = NULL; in execute_cert_test() local
283 SCT *sct_i = sk_SCT_value(scts, i); in execute_cert_test()
[all …]
/freebsd/sys/contrib/device-tree/Bindings/pwm/
H A Dnxp,lpc1850-sct-pwm.yaml4 $id: http://devicetree.org/schemas/pwm/nxp,lpc1850-sct-pwm.yaml#
14 const: nxp,lpc1850-sct-pwm
49 compatible = "nxp,lpc1850-sct-pwm";
/freebsd/sys/dev/nvme/
H A Dnvme_util.c218 uint16_t status, sc, sct; in nvme_sc_sbuf() local
222 sct = NVME_STATUS_GET_SCT(status); in nvme_sc_sbuf()
223 switch (sct) { in nvme_sc_sbuf()
251 sbuf_printf(sb, "RESERVED (%02x/%02x)", sct, sc); in nvme_sc_sbuf()
253 sbuf_printf(sb, "%s (%02x/%02x)", type, sct, sc); in nvme_sc_sbuf()
255 sbuf_printf(sb, "%s (%02x/%02x)", s, sct, sc); in nvme_sc_sbuf()

123