Home
last modified time | relevance | path

Searched refs:timestamp (Results 1 – 24 of 24) sorted by relevance

/openssl/doc/man1/
H A Dtsget.pod26 This command can be used for sending a timestamp request, as specified
27 in RFC 3161, to a timestamp server over HTTP or HTTPS and storing the
28 timestamp response in a file. It cannot be used for creating the requests
33 This command sends the following HTTP request for each timestamp request:
39 Content-Type: application/timestamp-query
40 Accept: application/timestamp-reply
45 It expects a response of type application/timestamp-reply, which is
54 The URL of the HTTP/HTTPS server listening for timestamp requests.
124 List of files containing RFC 3161 DER-encoded timestamp requests. If no
144 Get a timestamp response for F<file1.tsq> over HTTP, output is written to
[all …]
H A Dopenssl-ts.pod.in91 timestamp request to the TSA and one for sending the timestamp response
93 creating a timestamp request based on a data file,
204 otherwise it is a timestamp token (ContentInfo).
266 Specifies a previously created timestamp response or timestamp token
278 of a timestamp response (TimeStampResp). (Optional)
288 The output is a timestamp token (ContentInfo) instead of timestamp
305 timestamp token is valid and matches a particular timestamp request or
544 To create a timestamp response for a request:
557 To create a timestamp token instead of timestamp response:
565 To extract the timestamp token from a response:
[all …]
H A Dopenssl-verification-options.pod255 =item B<-attime> I<timestamp>
257 Perform validation checks using time specified by I<timestamp> and not
258 current system time. I<timestamp> is the number of seconds since
/openssl/crypto/ct/
H A Dct_prn.c29 static void timestamp_print(uint64_t timestamp, BIO *out) in timestamp_print() argument
37 (int)(timestamp / 86400000), in timestamp_print()
38 (timestamp % 86400000) / 1000); in timestamp_print()
44 ASN1_STRING_get0_data(gen), (unsigned int)(timestamp % 1000)); in timestamp_print()
100 timestamp_print(sct->timestamp, out); in SCT_print()
H A Dct_sct.c114 void SCT_set_timestamp(SCT *sct, uint64_t timestamp) in SCT_set_timestamp() argument
116 sct->timestamp = timestamp; in SCT_set_timestamp()
205 return sct->timestamp; in SCT_get_timestamp()
H A Dct_vfy.c55 l2n8(sct->timestamp, p); in sct_ctx_update()
116 if (sct->timestamp > sctx->epoch_time_in_ms) { in SCT_CTX_verify()
H A Dct_b64.c62 ct_log_entry_type_t entry_type, uint64_t timestamp, in SCT_new_from_base64() argument
114 SCT_set_timestamp(sct, timestamp); in SCT_new_from_base64()
H A Dct_oct.c110 n2l8(p, sct->timestamp); in o2i_SCT()
235 l2n8(sct->timestamp, p); in i2o_SCT()
H A Dct_local.h70 uint64_t timestamp; member
/openssl/doc/man3/
H A DSSL_get_handshake_rtt.pod25 When acting as the server, one timestamp is taken when the server is finished
27 ServerHelloDone in TLS 1.2. The other timestamp is taken when the server is
31 When acting as the client, one timestamp is taken when the client is finished
H A DCT_POLICY_EVAL_CTX_new.pod36 determine this, an SCT's timestamp and signature must be verified.
96 The SCT timestamp will be compared to this time to check whether the SCT was
98 timestamp is in the future". By default, this will be set to 5 minutes in the
H A DSCT_new.pod42 uint64_t timestamp,
60 void SCT_set_timestamp(SCT *sct, uint64_t timestamp);
H A DSCT_validate.pod63 If the SCT's signature is incorrect, its timestamp is in the future (relative to
H A DSSL_CTX_set_session_cache_mode.pod110 Updates the timestamp of the session when it is used, increasing the lifespan
H A DPKCS7_verify.pod108 timestamp).
H A DCMS_verify.pod129 timestamp).
/openssl/test/helpers/
H A Dnoisydgrambio.c20 OSSL_TIME timestamp; member
129 if (ossl_time_compare(limit->pinfos[idx].timestamp, sampling_start) >= 0) in bandwidth_limit()
163 limit->pinfos[end].timestamp = now; in bandwidth_limit()
/openssl/include/openssl/
H A Dct.h.in134 * If an SCT's timestamp is after this time, it will be interpreted as having
136 * whose timestamp is in the future", so an SCT will not validate in this case.
157 uint64_t timestamp,
217 * Returns the timestamp for the SCT (epoch time in milliseconds).
222 * Set the timestamp of an SCT (epoch time in milliseconds).
224 void SCT_set_timestamp(SCT *sct, uint64_t timestamp);
H A Dcmp.h.in66 * -- when the timestamp is missing but should be there
/openssl/test/
H A Dct_test.c443 const uint64_t timestamp = 1; in test_encode_tls_sct() local
459 CT_LOG_ENTRY_TYPE_X509, timestamp, in test_encode_tls_sct()
/openssl/test/certs/
H A Dmkcert.sh397 --timestamp="2020-01-01T00:00:00Z" \
/openssl/crypto/objects/
H A Dobjects.txt509 id-pkix-mod 13 : id-mod-timestamp-protocol
/openssl/crypto/err/
H A Dopenssl.txt514 CT_R_SCT_FUTURE_TIMESTAMP:116:sct future timestamp
/openssl/
H A DCHANGES.md3420 2) When verifying that a timestamp response token signer matches the
3421 timestamp authority name (exposed via the API functions

Completed in 112 milliseconds