| /freebsd/crypto/openssl/crypto/ct/ |
| H A D | ct_sct.c | 22 SCT *SCT_new(void) in SCT_new() 24 SCT *sct = OPENSSL_zalloc(sizeof(*sct)); in SCT_new() local 26 if (sct == NULL) in SCT_new() 29 sct->entry_type = CT_LOG_ENTRY_TYPE_NOT_SET; in SCT_new() 30 sct->version = SCT_VERSION_NOT_SET; in SCT_new() 31 return sct; in SCT_new() 34 void SCT_free(SCT *sct) in SCT_free() argument 36 if (sct == NULL) in SCT_free() 39 OPENSSL_free(sct->log_id); in SCT_free() 40 OPENSSL_free(sct->ext); in SCT_free() [all …]
|
| H A D | ct_oct.c | 24 int o2i_SCT_signature(SCT *sct, const unsigned char **in, size_t len) in o2i_SCT_signature() argument 30 if (sct->version != SCT_VERSION_V1) { in o2i_SCT_signature() 48 sct->hash_alg = *p++; in o2i_SCT_signature() 49 sct->sig_alg = *p++; in o2i_SCT_signature() 50 if (SCT_get_signature_nid(sct) == NID_undef) { in o2i_SCT_signature() 62 if (SCT_set1_signature(sct, p, siglen) != 1) in o2i_SCT_signature() 70 SCT *o2i_SCT(SCT **psct, const unsigned char **in, size_t len) in o2i_SCT() 72 SCT *sct = NULL; in o2i_SCT() local 80 if ((sct = SCT_new()) == NULL) in o2i_SCT() 85 sct->version = *p; in o2i_SCT() [all …]
|
| H A D | ct_prn.c | 19 static void SCT_signature_algorithms_print(const SCT *sct, BIO *out) in SCT_signature_algorithms_print() argument 21 int nid = SCT_get_signature_nid(sct); in SCT_signature_algorithms_print() 24 BIO_printf(out, "%02X%02X", sct->hash_alg, sct->sig_alg); in SCT_signature_algorithms_print() 50 const char *SCT_validation_status_string(const SCT *sct) in SCT_validation_status_string() argument 53 switch (SCT_get_validation_status(sct)) { in SCT_validation_status_string() 70 void SCT_print(const SCT *sct, BIO *out, int indent, in SCT_print() argument 76 log = CTLOG_STORE_get0_log_by_id(log_store, sct->log_id, in SCT_print() 77 sct->log_id_len); in SCT_print() 83 if (sct->version != SCT_VERSION_V1) { in SCT_print() 85 BIO_hex_string(out, indent + 16, 16, sct->sct, sct->sct_len); in SCT_print() [all …]
|
| H A D | ct_vfy.c | 26 * Update encoding for SCT signature verification/generation to supplied 29 static int sct_ctx_update(EVP_MD_CTX *ctx, const SCT_CTX *sctx, const SCT *sct) in sct_ctx_update() argument 44 * (2 bytes + sct->ext_len) CtExtensions extensions; in sct_ctx_update() 47 if (sct->entry_type == CT_LOG_ENTRY_TYPE_NOT_SET) in sct_ctx_update() 49 if (sct->entry_type == CT_LOG_ENTRY_TYPE_PRECERT && sctx->ihash == NULL) in sct_ctx_update() 53 *p++ = sct->version; in sct_ctx_update() 55 l2n8(sct->timestamp, p); in sct_ctx_update() 56 s2n(sct->entry_type, p); in sct_ctx_update() 61 if (sct->entry_type == CT_LOG_ENTRY_TYPE_X509) { in sct_ctx_update() 86 s2n(sct->ext_len, p); in sct_ctx_update() [all …]
|
| H A D | ct_local.h | 59 /* If version is not SCT_VERSION_V1, this contains the encoded SCT */ 60 unsigned char *sct; member 62 /* If version is SCT_VERSION_V1, fields below contain components of the SCT */ 68 * SCT should ever be set as such. 79 /* Where this SCT was found, e.g. certificate, OCSP response, etc. */ 81 /* The result of the last attempt to validate this SCT. */ 85 /* Miscellaneous data that is useful when verifying an SCT */ 101 /* milliseconds since epoch (to check that the SCT isn't from the future) */ 121 * Creates a new context for verifying an SCT. 125 * Deletes an SCT verification context. [all …]
|
| H A D | ct_b64.c | 61 SCT *SCT_new_from_base64(unsigned char version, const char *logid_base64, in SCT_new_from_base64() 66 SCT *sct = SCT_new(); in SCT_new_from_base64() local 71 if (sct == NULL) { in SCT_new_from_base64() 78 * can only construct SCT versions that have been defined. in SCT_new_from_base64() 80 if (!SCT_set_version(sct, version)) { in SCT_new_from_base64() 90 if (!SCT_set0_log_id(sct, dec, declen)) in SCT_new_from_base64() 99 SCT_set0_extensions(sct, dec, declen); in SCT_new_from_base64() 109 if (o2i_SCT_signature(sct, &p, declen) <= 0) in SCT_new_from_base64() 114 SCT_set_timestamp(sct, timestamp); in SCT_new_from_base64() 116 if (!SCT_set_log_entry_type(sct, entry_type)) in SCT_new_from_base64() [all …]
|
| H A D | ct_x509v3.c | 26 static int i2r_SCT_LIST(X509V3_EXT_METHOD *method, STACK_OF(SCT) *sct_list, in i2r_SCT_LIST() 33 static int set_sct_list_source(STACK_OF(SCT) *s, sct_source_t source) in set_sct_list_source() 49 static STACK_OF(SCT) *x509_ext_d2i_SCT_LIST(STACK_OF(SCT) **a, in STACK_OF() argument 53 STACK_OF(SCT) *s = d2i_SCT_LIST(a, pp, len); in STACK_OF() 63 static STACK_OF(SCT) *ocsp_ext_d2i_SCT_LIST(STACK_OF(SCT) **a, in STACK_OF() argument 67 STACK_OF(SCT) *s = d2i_SCT_LIST(a, pp, len); in STACK_OF()
|
| H A D | ct_err.c | 32 "sct future timestamp"}, 33 {ERR_PACK(ERR_LIB_CT, 0, CT_R_SCT_INVALID), "sct invalid"}, 35 "sct invalid signature"}, 36 {ERR_PACK(ERR_LIB_CT, 0, CT_R_SCT_LIST_INVALID), "sct list invalid"}, 37 {ERR_PACK(ERR_LIB_CT, 0, CT_R_SCT_LOG_ID_MISMATCH), "sct log id mismatch"}, 38 {ERR_PACK(ERR_LIB_CT, 0, CT_R_SCT_NOT_SET), "sct not set"}, 40 "sct unsupported version"},
|
| /freebsd/crypto/openssl/doc/man3/ |
| H A D | SCT_new.pod | 38 SCT *SCT_new(void); 39 SCT *SCT_new_from_base64(unsigned char version, 46 void SCT_free(SCT *sct); 47 void SCT_LIST_free(STACK_OF(SCT) *a); 49 sct_version_t SCT_get_version(const SCT *sct); 50 int SCT_set_version(SCT *sct, sct_version_t version); 52 ct_log_entry_type_t SCT_get_log_entry_type(const SCT *sct); 53 int SCT_set_log_entry_type(SCT *sct, ct_log_entry_type_t entry_type); 55 size_t SCT_get0_log_id(const SCT *sct, unsigned char **log_id); 56 int SCT_set0_log_id(SCT *sct, unsigned char *log_id, size_t log_id_len); [all …]
|
| H A D | SCT_validate.pod | 21 int SCT_validate(SCT *sct, const CT_POLICY_EVAL_CTX *ctx); 22 int SCT_LIST_validate(const STACK_OF(SCT) *scts, CT_POLICY_EVAL_CTX *ctx); 23 sct_validation_status_t SCT_get_validation_status(const SCT *sct); 27 SCT_validate() will check that an SCT is valid and verify its signature. 29 The result of the validation checks can be obtained by passing the SCT to 38 The certificate the SCT was issued for. 47 This is only required if the SCT was issued for a pre-certificate 53 A CTLOG_STORE that contains the CT log that issued this SCT. 55 If the SCT was issued by a log that is not in this CTLOG_STORE, the validation 60 If the SCT is of an unsupported version (only v1 is currently supported), the [all …]
|
| H A D | SCT_print.pod | 12 void SCT_print(const SCT *sct, BIO *out, int indent, const CTLOG_STORE *logs); 13 void SCT_LIST_print(const STACK_OF(SCT) *sct_list, BIO *out, int indent, 15 const char *SCT_validation_status_string(const SCT *sct); 19 SCT_print() prints a single Signed Certificate Timestamp (SCT) to a B<BIO> in 21 similar way. A separator can be specified to delimit each SCT in the output. 25 each SCT (if that log is in the CTLOG_STORE). Alternatively, NULL can be passed 28 SCT_validation_status_string() will return the validation status of an SCT as 30 beforehand in order to set the validation status of an SCT first. 35 the validation status of an B<SCT> object.
|
| H A D | o2i_SCT_LIST.pod | 12 STACK_OF(SCT) *o2i_SCT_LIST(STACK_OF(SCT) **a, const unsigned char **pp, 14 int i2o_SCT_LIST(const STACK_OF(SCT) *a, unsigned char **pp); 15 SCT *o2i_SCT(SCT **psct, const unsigned char **in, size_t len); 16 int i2o_SCT(const SCT *sct, unsigned char **out); 20 The SCT_LIST and SCT functions are very similar to the i2d and d2i family of
|
| H A D | CT_POLICY_EVAL_CTX_new.pod | 35 This policy may be, for example, that at least one valid SCT is available. To 36 determine this, an SCT's timestamp and signature must be verified. 43 the public key of the log that issued the SCT 47 the certificate that the SCT was issued for 51 the issuer certificate (if the SCT was issued for a pre-certificate) 96 The SCT timestamp will be compared to this time to check whether the SCT was 116 found in the TLS SCT extension or OCSP response.
|
| H A D | SSL_CTX_set_ct_validation_callback.pod | 16 const STACK_OF(SCT) *scts, void *arg); 60 Therefore, in applications that delay SCT policy enforcement until after 61 handshake completion, such delayed SCT checks should only be performed when the 101 When SCT processing is enabled, OCSP stapling will be enabled. This is because 110 be set if a custom client extension handler has been registered to handle SCT
|
| /freebsd/secure/lib/libcrypto/man/man3/ |
| H A D | SCT_new.3 | 97 \& SCT *SCT_new(void); 98 \& SCT *SCT_new_from_base64(unsigned char version, 105 \& void SCT_free(SCT *sct); 106 \& void SCT_LIST_free(STACK_OF(SCT) *a); 108 \& sct_version_t SCT_get_version(const SCT *sct); 109 \& int SCT_set_version(SCT *sct, sct_version_t version); 111 \& ct_log_entry_type_t SCT_get_log_entry_type(const SCT *sct); 112 \& int SCT_set_log_entry_type(SCT *sct, ct_log_entry_type_t entry_type); 114 \& size_t SCT_get0_log_id(const SCT *sct, unsigned char **log_id); 115 \& int SCT_set0_log_id(SCT *sct, unsigned char *log_id, size_t log_id_len); [all …]
|
| H A D | SCT_validate.3 | 80 \& int SCT_validate(SCT *sct, const CT_POLICY_EVAL_CTX *ctx); 81 \& int SCT_LIST_validate(const STACK_OF(SCT) *scts, CT_POLICY_EVAL_CTX *ctx); 82 \& sct_validation_status_t SCT_get_validation_status(const SCT *sct); 86 \&\fBSCT_validate()\fR will check that an SCT is valid and verify its signature. 88 The result of the validation checks can be obtained by passing the SCT to 93 The certificate the SCT was issued for. 100 This is only required if the SCT was issued for a pre-certificate 104 A CTLOG_STORE that contains the CT log that issued this SCT. 106 If the SCT was issued by a log that is not in this CTLOG_STORE, the validation 109 If the SCT is of an unsupported version (only v1 is currently supported), the [all …]
|
| H A D | SCT_print.3 | 71 \& void SCT_print(const SCT *sct, BIO *out, int indent, const CTLOG_STORE *logs); 72 \& void SCT_LIST_print(const STACK_OF(SCT) *sct_list, BIO *out, int indent, 74 \& const char *SCT_validation_status_string(const SCT *sct); 78 \&\fBSCT_print()\fR prints a single Signed Certificate Timestamp (SCT) to a \fBBIO\fR in 80 similar way. A separator can be specified to delimit each SCT in the output. 84 each SCT (if that log is in the CTLOG_STORE). Alternatively, NULL can be passed 87 \&\fBSCT_validation_status_string()\fR will return the validation status of an SCT as 89 beforehand in order to set the validation status of an SCT first. 93 the validation status of an \fBSCT\fR object.
|
| H A D | o2i_SCT_LIST.3 | 71 \& STACK_OF(SCT) *o2i_SCT_LIST(STACK_OF(SCT) **a, const unsigned char **pp, 73 \& int i2o_SCT_LIST(const STACK_OF(SCT) *a, unsigned char **pp); 74 \& SCT *o2i_SCT(SCT **psct, const unsigned char **in, size_t len); 75 \& int i2o_SCT(const SCT *sct, unsigned char **out); 79 The SCT_LIST and SCT functions are very similar to the i2d and d2i family of
|
| H A D | CT_POLICY_EVAL_CTX_new.3 | 94 This policy may be, for example, that at least one valid SCT is available. To 95 determine this, an SCT's timestamp and signature must be verified. 98 the public key of the log that issued the SCT 100 the certificate that the SCT was issued for 102 the issuer certificate (if the SCT was issued for a pre-certificate) 133 The SCT timestamp will be compared to this time to check whether the SCT was 150 found in the TLS SCT extension or OCSP response.
|
| H A D | SSL_CTX_set_ct_validation_callback.3 | 75 \& const STACK_OF(SCT) *scts, void *arg); 119 Therefore, in applications that delay SCT policy enforcement until after 120 handshake completion, such delayed SCT checks should only be performed when the 159 When SCT processing is enabled, OCSP stapling will be enabled. This is because 167 be set if a custom client extension handler has been registered to handle SCT
|
| /freebsd/crypto/openssl/include/openssl/ |
| H A D | ct.h.in | 44 generate_stack_macros("SCT") 127 * current time when checking whether an SCT was issued in the future. 134 * If an SCT's timestamp is after this time, it will be interpreted as having 136 * whose timestamp is in the future", so an SCT will not validate in this case. 141 * SCT functions * 145 * Creates a new, blank SCT. 146 * The caller is responsible for calling SCT_free when finished with the SCT. 148 SCT *SCT_new(void); 151 * Creates a new SCT from some base64-encoded strings. 152 * The caller is responsible for calling SCT_free when finished with the SCT. [all …]
|
| H A D | ct.h | 42 SKM_DEFINE_STACK_OF_INTERNAL(SCT, SCT, SCT) 44 #define sk_SCT_value(sk, idx) ((SCT *)OPENSSL_sk_value(ossl_check_const_SCT_sk_type(sk), (idx))) 45 #define sk_SCT_new(cmp) ((STACK_OF(SCT) *)OPENSSL_sk_new(ossl_check_SCT_compfunc_type(cmp))) 46 #define sk_SCT_new_null() ((STACK_OF(SCT) *)OPENSSL_sk_new_null()) 47 #define sk_SCT_new_reserve(cmp, n) ((STACK_OF(SCT) *)OPENSSL_sk_new_reserve(ossl_check_SCT_compfunc… 51 #define sk_SCT_delete(sk, i) ((SCT *)OPENSSL_sk_delete(ossl_check_SCT_sk_type(sk), (i))) 52 #define sk_SCT_delete_ptr(sk, ptr) ((SCT *)OPENSSL_sk_delete_ptr(ossl_check_SCT_sk_type(sk), ossl_c… 55 #define sk_SCT_pop(sk) ((SCT *)OPENSSL_sk_pop(ossl_check_SCT_sk_type(sk))) 56 #define sk_SCT_shift(sk) ((SCT *)OPENSSL_sk_shift(ossl_check_SCT_sk_type(sk))) 59 #define sk_SCT_set(sk, idx, ptr) ((SCT *)OPENSSL_sk_set(ossl_check_SCT_sk_type(sk), (idx), ossl_che… [all …]
|
| /freebsd/crypto/openssl/test/ |
| H A D | ct_test.c | 48 STACK_OF(SCT) *sct_list; 50 * A file to load the expected SCT text from. 56 /* Whether to test the validity of the SCT(s) */ 126 static int compare_sct_list_printout(STACK_OF(SCT) *sct, in compare_sct_list_printout() argument 136 SCT_LIST_print(sct, text_buffer, 0, "\n", NULL); in compare_sct_list_printout() 183 static int assert_validity(CT_TEST_FIXTURE *fixture, STACK_OF(SCT) *scts, in assert_validity() 194 SCT *sct_i = sk_SCT_value(scts, i); in assert_validity() 228 STACK_OF(SCT) *scts = NULL; in execute_cert_test() 229 SCT *sct = NULL; in execute_cert_test() local 283 SCT *sct_i = sk_SCT_value(scts, i); in execute_cert_test() [all …]
|
| /freebsd/sys/contrib/device-tree/Bindings/pwm/ |
| H A D | nxp,lpc1850-sct-pwm.yaml | 4 $id: http://devicetree.org/schemas/pwm/nxp,lpc1850-sct-pwm.yaml# 14 const: nxp,lpc1850-sct-pwm 49 compatible = "nxp,lpc1850-sct-pwm";
|
| /freebsd/sys/dev/nvme/ |
| H A D | nvme_util.c | 218 uint16_t status, sc, sct; in nvme_sc_sbuf() local 222 sct = NVME_STATUS_GET_SCT(status); in nvme_sc_sbuf() 223 switch (sct) { in nvme_sc_sbuf() 251 sbuf_printf(sb, "RESERVED (%02x/%02x)", sct, sc); in nvme_sc_sbuf() 253 sbuf_printf(sb, "%s (%02x/%02x)", type, sct, sc); in nvme_sc_sbuf() 255 sbuf_printf(sb, "%s (%02x/%02x)", s, sct, sc); in nvme_sc_sbuf()
|