No problem. Performing OCSP or obtaining SCT values are two ways really to obtain trusted data that a certificate is valid and from a reliable source. So, when thinking about how certificates are validated, performing OCSP or obtaining SCT values are just two ways this can be done. There is also the on-device trust store to consider in this process. All of this going back to the point that the APIs for sec_protocol_options_set_tls_ocsp_enabled and sec_protocol_options_set_tls_sct_enabled allow you to flag these options as ways for TLS to validate that the certificate from the peer is trusted. The truly best way to identify where this is making an impact is through testing different hosts. Try using badssl dot com to test different conditions.
Also, one thing to note about about SCT data is that it can come from a variety of sources. For example, embedded in the certificate or through TLS vended by the server. To get a full understanding of where the SCT and OCSP data is coming from, I recommend take a packet trace when your connection is going up. OCSP will often be visible to you as a GET request in the trace, but you may need to hunt for the SCT values during the handshake packet exchange.
Matt Eaton
DTS Engineering, CoreOS
meaton3 at apple.com