/third_party/node/deps/openssl/openssl/fuzz/ |
H A D | ct.c | 32 STACK_OF(SCT) *scts = d2i_SCT_LIST(NULL, pp, len); in FuzzerTestOneInput() 33 if (scts != NULL) { in FuzzerTestOneInput() 35 SCT_LIST_print(scts, bio, 4, "\n", NULL); in FuzzerTestOneInput() 38 if (i2d_SCT_LIST(scts, &der)) { in FuzzerTestOneInput() 43 SCT_LIST_free(scts); in FuzzerTestOneInput()
|
/third_party/openssl/fuzz/ |
H A D | ct.c | 32 STACK_OF(SCT) *scts = d2i_SCT_LIST(NULL, pp, len); in FuzzerTestOneInput() 33 if (scts != NULL) { in FuzzerTestOneInput() 35 SCT_LIST_print(scts, bio, 4, "\n", NULL); in FuzzerTestOneInput() 38 if (i2d_SCT_LIST(scts, &der)) { in FuzzerTestOneInput() 43 SCT_LIST_free(scts); in FuzzerTestOneInput()
|
/third_party/openssl/test/ |
H A D | ct_test.c | 183 static int assert_validity(CT_TEST_FIXTURE *fixture, STACK_OF(SCT) *scts, in assert_validity() argument 190 if (!TEST_int_ge(SCT_LIST_validate(scts, policy_ctx), 0)) in assert_validity() 193 for (i = 0; i < sk_SCT_num(scts); ++i) { in assert_validity() 194 SCT *sct_i = sk_SCT_value(scts, i); in assert_validity() 213 int unverified_sct_count = sk_SCT_num(scts) - in assert_validity() 228 STACK_OF(SCT) *scts = NULL; in execute_cert_test() 281 scts = X509V3_EXT_d2i(sct_extension); in execute_cert_test() 282 for (i = 0; i < sk_SCT_num(scts); ++i) { in execute_cert_test() 283 SCT *sct_i = sk_SCT_value(scts, i); in execute_cert_test() 292 if (!assert_validity(fixture, scts, ct_policy_ct in execute_cert_test() [all...] |
/third_party/toybox/toys/pending/ |
H A D | man.c | 35 char any, cell, ex, *f, k_done, *line, *m, **sct, **scts, **sufs; 144 TT.sct = TT.scts; in manpath() 167 TT.scts = (char *[]) {"1", "8", "3", "2", "5", "4", "6", "7", 0}; in man_main() 168 TT.sct = TT.scts - 1; // First manpath() read increments. in man_main() 207 TT.scts = (char *[]){*toys.optargs, 0}, TT.sct = TT.scts - 1; in man_main()
|
/third_party/node/deps/npm/node_modules/@sigstore/verify/dist/ |
H A D | verifier.js | 89 if (containsDupes(result.scts)) { 95 if (result.scts.length < this.options.ctlogThreshold) { 98 message: `expected ${this.options.ctlogThreshold} SCTs, got ${result.scts.length}`,
|
/third_party/node/deps/openssl/openssl/crypto/ct/ |
H A D | ct_sct.c | 376 int SCT_LIST_validate(const STACK_OF(SCT) *scts, CT_POLICY_EVAL_CTX *ctx) in STACK_OF() 379 int sct_count = scts != NULL ? sk_SCT_num(scts) : 0; in STACK_OF() 384 SCT *sct = sk_SCT_value(scts, i); in STACK_OF()
|
/third_party/openssl/crypto/ct/ |
H A D | ct_sct.c | 376 int SCT_LIST_validate(const STACK_OF(SCT) *scts, CT_POLICY_EVAL_CTX *ctx) in STACK_OF() 379 int sct_count = scts != NULL ? sk_SCT_num(scts) : 0; in STACK_OF() 384 SCT *sct = sk_SCT_value(scts, i); in STACK_OF()
|
/third_party/node/deps/openssl/openssl/ssl/ |
H A D | ssl_lib.c | 1297 SCT_LIST_free(s->scts); in SSL_free() 1298 OPENSSL_free(s->ext.scts); in SSL_free() 5156 if (s->ext.scts != NULL) { in ct_extract_tls_extension_scts() 5157 const unsigned char *p = s->ext.scts; in ct_extract_tls_extension_scts() 5158 STACK_OF(SCT) *scts = o2i_SCT_LIST(NULL, &p, s->ext.scts_len); in ct_extract_tls_extension_scts() 5160 scts_extracted = ct_move_scts(&s->scts, scts, SCT_SOURCE_TLS_EXTENSION); in ct_extract_tls_extension_scts() 5162 SCT_LIST_free(scts); in ct_extract_tls_extension_scts() 5170 * contains an SCT X509 extension. They will be stored in |s->scts|. 5183 STACK_OF(SCT) *scts in ct_extract_ocsp_response_scts() 5265 ct_permissive(const CT_POLICY_EVAL_CTX * ctx, const STACK_OF(SCT) *scts, void *unused_arg) ct_permissive() argument 5271 ct_strict(const CT_POLICY_EVAL_CTX * ctx, const STACK_OF(SCT) *scts, void *unused_arg) ct_strict() argument [all...] |
/third_party/openssl/ssl/ |
H A D | ssl_lib.c | 1235 SCT_LIST_free(s->scts); in SSL_free() 1236 OPENSSL_free(s->ext.scts); in SSL_free() 5037 if (s->ext.scts != NULL) { in ct_extract_tls_extension_scts() 5038 const unsigned char *p = s->ext.scts; in ct_extract_tls_extension_scts() 5039 STACK_OF(SCT) *scts = o2i_SCT_LIST(NULL, &p, s->ext.scts_len); in ct_extract_tls_extension_scts() 5041 scts_extracted = ct_move_scts(&s->scts, scts, SCT_SOURCE_TLS_EXTENSION); in ct_extract_tls_extension_scts() 5043 SCT_LIST_free(scts); in ct_extract_tls_extension_scts() 5051 * contains an SCT X509 extension. They will be stored in |s->scts|. 5064 STACK_OF(SCT) *scts in ct_extract_ocsp_response_scts() 5146 ct_permissive(const CT_POLICY_EVAL_CTX * ctx, const STACK_OF(SCT) *scts, void *unused_arg) ct_permissive() argument 5152 ct_strict(const CT_POLICY_EVAL_CTX * ctx, const STACK_OF(SCT) *scts, void *unused_arg) ct_strict() argument [all...] |
/third_party/node/deps/npm/node_modules/@sigstore/verify/dist/key/ |
H A D | index.js | 50 scts: (0, sct_1.verifySCTs)(path[0], path[1], trustMaterial.ctlogs),
|
/third_party/openssl/ohos_lite/include/openssl/ |
H A D | ct.h | 315 __owur int SCT_LIST_validate(const STACK_OF(SCT) *scts,
|
/third_party/node/deps/openssl/openssl/ssl/statem/ |
H A D | extensions_clnt.c | 1486 OPENSSL_free(s->ext.scts); in tls_parse_stoc_sct() 1487 s->ext.scts = NULL; in tls_parse_stoc_sct() 1491 s->ext.scts = OPENSSL_malloc(size); in tls_parse_stoc_sct() 1492 if (s->ext.scts == NULL) { in tls_parse_stoc_sct() 1497 if (!PACKET_copy_bytes(pkt, s->ext.scts, size)) { in tls_parse_stoc_sct()
|
/third_party/openssl/ssl/statem/ |
H A D | extensions_clnt.c | 1446 OPENSSL_free(s->ext.scts); in tls_parse_stoc_sct() 1447 s->ext.scts = NULL; in tls_parse_stoc_sct() 1451 s->ext.scts = OPENSSL_malloc(size); in tls_parse_stoc_sct() 1452 if (s->ext.scts == NULL) { in tls_parse_stoc_sct() 1457 if (!PACKET_copy_bytes(pkt, s->ext.scts, size)) { in tls_parse_stoc_sct()
|
/third_party/node/deps/openssl/config/archs/darwin64-x86_64-cc/asm/include/openssl/ |
H A D | ct.h | 386 __owur int SCT_LIST_validate(const STACK_OF(SCT) *scts,
|
/third_party/node/deps/openssl/config/archs/darwin64-arm64-cc/no-asm/include/openssl/ |
H A D | ct.h | 386 __owur int SCT_LIST_validate(const STACK_OF(SCT) *scts,
|
/third_party/node/deps/openssl/config/archs/linux-aarch64/no-asm/include/openssl/ |
H A D | ct.h | 386 __owur int SCT_LIST_validate(const STACK_OF(SCT) *scts,
|
/third_party/node/deps/openssl/config/archs/linux-elf/asm/include/openssl/ |
H A D | ct.h | 386 __owur int SCT_LIST_validate(const STACK_OF(SCT) *scts,
|
/third_party/node/deps/openssl/config/archs/darwin64-x86_64-cc/no-asm/include/openssl/ |
H A D | ct.h | 386 __owur int SCT_LIST_validate(const STACK_OF(SCT) *scts,
|
/third_party/node/deps/openssl/config/archs/darwin-i386-cc/no-asm/include/openssl/ |
H A D | ct.h | 386 __owur int SCT_LIST_validate(const STACK_OF(SCT) *scts,
|
/third_party/node/deps/openssl/config/archs/darwin64-arm64-cc/asm/include/openssl/ |
H A D | ct.h | 386 __owur int SCT_LIST_validate(const STACK_OF(SCT) *scts,
|
/third_party/node/deps/openssl/config/archs/darwin64-x86_64-cc/asm_avx2/include/openssl/ |
H A D | ct.h | 386 __owur int SCT_LIST_validate(const STACK_OF(SCT) *scts,
|
/third_party/node/deps/openssl/config/archs/linux-aarch64/asm/include/openssl/ |
H A D | ct.h | 386 __owur int SCT_LIST_validate(const STACK_OF(SCT) *scts,
|
/third_party/node/deps/openssl/config/archs/linux-aarch64/asm_avx2/include/openssl/ |
H A D | ct.h | 386 __owur int SCT_LIST_validate(const STACK_OF(SCT) *scts,
|
/third_party/node/deps/openssl/config/archs/linux-elf/asm_avx2/include/openssl/ |
H A D | ct.h | 386 __owur int SCT_LIST_validate(const STACK_OF(SCT) *scts,
|
/third_party/node/deps/openssl/config/archs/linux-armv4/asm_avx2/include/openssl/ |
H A D | ct.h | 386 __owur int SCT_LIST_validate(const STACK_OF(SCT) *scts,
|