/external/conscrypt/platform/src/main/java/org/conscrypt/ct/ |
VerifiedSCT.java | 20 * Verification result for a single SCT. 30 public final SignedCertificateTimestamp sct; field in class:VerifiedSCT 33 public VerifiedSCT(SignedCertificateTimestamp sct, Status status) { 34 this.sct = sct;
|
CTVerifier.java | 73 * The result of the verification for each sct is added to {@code result}. 100 for (SignedCertificateTimestamp sct: scts) { 101 VerifiedSCT.Status status = verifySingleSCT(sct, precertEntry); 102 result.add(new VerifiedSCT(sct, status)); 109 * The result of the verification for each sct is added to {@code result}. 127 for (SignedCertificateTimestamp sct: scts) { 128 VerifiedSCT.Status status = verifySingleSCT(sct, x509Entry); 129 result.add(new VerifiedSCT(sct, status)); 134 * Verify a single SCT for the given Certificate Entry 136 private VerifiedSCT.Status verifySingleSCT(SignedCertificateTimestamp sct, 180 SignedCertificateTimestamp sct = SignedCertificateTimestamp.decode(encodedSCT, origin); local [all...] |
CTLogInfo.java | 103 public VerifiedSCT.Status verifySingleSCT(SignedCertificateTimestamp sct, 105 if (!Arrays.equals(sct.getLogID(), getID())) { 111 toVerify = sct.encodeTBS(entry); 118 String algorithm = sct.getSignature().getAlgorithm(); 132 if (!signature.verify(sct.getSignature().getSignature())) {
|
CTPolicyImpl.java | 37 CTLogInfo log = logStore.getKnownLog(verifiedSCT.sct.getLogID());
|
/external/conscrypt/platform/src/test/java/org/conscrypt/ct/ |
SerializationTest.java | 37 SignedCertificateTimestamp sct local 40 assertEquals(SignedCertificateTimestamp.Version.V1, sct.getVersion()); 41 assertEquals(0x0102030405060708L, sct.getTimestamp()); 42 assertEquals(0, sct.getExtensions().length); 44 sct.getSignature().getHashAlgorithm()); 46 sct.getSignature().getSignatureAlgorithm()); 48 sct.getSignature().getSignature())); 49 assertEquals(SignedCertificateTimestamp.Origin.EMBEDDED, sct.getOrigin()); 53 byte[] sct = new byte[] { 66 SignedCertificateTimestamp.decode(sct, SignedCertificateTimestamp.Origin.EMBEDDED) [all...] |
CTVerifierTest.java | 157 result.getValidSCTs().get(0).sct.getOrigin()); 159 result.getInvalidSCTs().get(0).sct.getOrigin());
|
/external/ImageMagick/coders/ |
Android.mk | 113 sct.c\
|
Make.com | 112 $call Make sct.c 158 sct,sfw,sgi,stegano,sun,svg,tga,thumbnail,tiff,tile,tim,ttf,txt,uil,url, -
|
/external/boringssl/src/ssl/ |
tls13_both.c | 244 CBS status_request, sct; local 247 {TLSEXT_TYPE_certificate_timestamp, &have_sct, &sct}, 293 if (!ssl_is_sct_list_valid(&sct)) { 301 &sct, &hs->new_session->tlsext_signed_cert_timestamp_list,
|
t1_lib.c | 3607 CBS sct; local [all...] |
/prebuilts/go/darwin-x86/src/crypto/tls/ |
handshake_messages_test.go | 267 // empty SCT lists are invalid. 270 sct := []byte{0x42, 0x42, 0x42, 0x42} 274 scts: [][]byte{sct}, 283 // Change serverHelloBytes so that the SCT list is empty 284 i := bytes.Index(serverHelloBytes, sct) 286 t.Fatal("Cannot find SCT in ServerHello") 291 // Append the extension length and SCT list length for an empty list. 305 t.Fatal("Unmarshaled ServerHello with empty SCT list") 310 // Not only must the SCT list be non-empty, but the SCT elements mus [all...] |
handshake_messages.go | 524 for i, sct := range m.scts { 525 if !bytes.Equal(sct, m1.scts[i]) { 582 for _, sct := range m.scts { 583 sctLen += len(sct) + 2 676 for _, sct := range m.scts { 677 z[0] = byte(len(sct) >> 8) 678 z[1] = byte(len(sct)) 679 copy(z[2:], sct) 680 z = z[len(sct)+2:] [all...] |
handshake_server_test.go | 396 for i, sct := range expected { 397 if !bytes.Equal(sct, actual[i]) { 398 t.Fatalf("SCT #%d was %x, but expected %x", i, actual[i], sct) [all...] |
handshake_client_test.go | 878 name: "SCT", 894 if sct := state.SignedCertificateTimestamps[i]; !bytes.Equal(sct, expected) { 895 return fmt.Errorf("SCT #%d contained %x, expected %x", i, sct, expected) [all...] |
/prebuilts/go/linux-x86/src/crypto/tls/ |
handshake_messages_test.go | 267 // empty SCT lists are invalid. 270 sct := []byte{0x42, 0x42, 0x42, 0x42} 274 scts: [][]byte{sct}, 283 // Change serverHelloBytes so that the SCT list is empty 284 i := bytes.Index(serverHelloBytes, sct) 286 t.Fatal("Cannot find SCT in ServerHello") 291 // Append the extension length and SCT list length for an empty list. 305 t.Fatal("Unmarshaled ServerHello with empty SCT list") 310 // Not only must the SCT list be non-empty, but the SCT elements mus [all...] |
handshake_messages.go | 524 for i, sct := range m.scts { 525 if !bytes.Equal(sct, m1.scts[i]) { 582 for _, sct := range m.scts { 583 sctLen += len(sct) + 2 676 for _, sct := range m.scts { 677 z[0] = byte(len(sct) >> 8) 678 z[1] = byte(len(sct)) 679 copy(z[2:], sct) 680 z = z[len(sct)+2:] [all...] |
handshake_server_test.go | 396 for i, sct := range expected { 397 if !bytes.Equal(sct, actual[i]) { 398 t.Fatalf("SCT #%d was %x, but expected %x", i, actual[i], sct) [all...] |
handshake_client_test.go | 878 name: "SCT", 894 if sct := state.SignedCertificateTimestamps[i]; !bytes.Equal(sct, expected) { 895 return fmt.Errorf("SCT #%d contained %x, expected %x", i, sct, expected) [all...] |
/external/libvncserver/libvncclient/ |
rfbproto.c | [all...] |
/external/libvncserver/rfb/ |
rfbproto.h | 1203 rfbServerCutTextMsg sct; member in union:__anon24293 [all...] |
/external/libvncserver/libvncserver/ |
rfbserver.c | 3491 rfbServerCutTextMsg sct; local [all...] |
/external/libxml2/ |
Makefile.am | [all...] |