/openssl/providers/implementations/rands/seeding/ |
H A D | rand_vxworks.c | 42 struct timespec ts; in get_time_stamp() local 44 if (clock_gettime(CLOCK_REALTIME, &ts) == 0) in get_time_stamp() 45 return TWO32TO64(ts.tv_sec, ts.tv_nsec); in get_time_stamp() 52 struct timespec ts; in get_timer_bits() local 57 if (clock_gettime(CLOCK_MONOTONIC, &ts) == 0) in get_timer_bits() 58 return TWO32TO64(ts.tv_sec, ts.tv_nsec); in get_timer_bits()
|
H A D | rand_unix.c | 144 struct timespec ts; in ossl_pool_acquire_entropy() local 162 ts.tv_nsec = random(); in ossl_pool_acquire_entropy() 175 clock_gettime(CLOCK_REALTIME, &ts); in ossl_pool_acquire_entropy() 176 v = (unsigned char)(ts.tv_nsec & 0xFF); in ossl_pool_acquire_entropy() 778 struct timespec ts; in get_time_stamp() local 780 if (clock_gettime(CLOCK_REALTIME, &ts) == 0) in get_time_stamp() 781 return TWO32TO64(ts.tv_sec, ts.tv_nsec); in get_time_stamp()
|
/openssl/crypto/asn1/ |
H A D | a_time.c | 272 if (is_utc(ts->tm_year)) in ossl_asn1_time_from_tm() 277 if (!is_utc(ts->tm_year)) in ossl_asn1_time_from_tm() 296 if (ts->tm_mon > INT_MAX - 1) in ossl_asn1_time_from_tm() 300 if (ts->tm_year > INT_MAX - 1900) in ossl_asn1_time_from_tm() 303 ts->tm_year + 1900, ts->tm_mon + 1, in ossl_asn1_time_from_tm() 304 ts->tm_mday, ts->tm_hour, ts->tm_min, in ossl_asn1_time_from_tm() 308 ts->tm_year % 100, ts->tm_mon + 1, in ossl_asn1_time_from_tm() 309 ts->tm_mday, ts->tm_hour, ts->tm_min, in ossl_asn1_time_from_tm() 331 struct tm *ts; in ASN1_TIME_adj() local 334 ts = OPENSSL_gmtime(&t, &data); in ASN1_TIME_adj() [all …]
|
H A D | a_gentm.c | 66 struct tm *ts; in ASN1_GENERALIZEDTIME_adj() local 69 ts = OPENSSL_gmtime(&t, &data); in ASN1_GENERALIZEDTIME_adj() 70 if (ts == NULL) in ASN1_GENERALIZEDTIME_adj() 74 if (!OPENSSL_gmtime_adj(ts, offset_day, offset_sec)) in ASN1_GENERALIZEDTIME_adj() 78 return ossl_asn1_time_from_tm(s, ts, V_ASN1_GENERALIZEDTIME); in ASN1_GENERALIZEDTIME_adj()
|
H A D | a_utctm.c | 60 struct tm *ts; in ASN1_UTCTIME_adj() local 63 ts = OPENSSL_gmtime(&t, &data); in ASN1_UTCTIME_adj() 64 if (ts == NULL) in ASN1_UTCTIME_adj() 68 if (!OPENSSL_gmtime_adj(ts, offset_day, offset_sec)) in ASN1_UTCTIME_adj() 72 return ossl_asn1_time_from_tm(s, ts, V_ASN1_UTCTIME); in ASN1_UTCTIME_adj()
|
H A D | asn1_local.h | 93 ASN1_TIME *ossl_asn1_time_from_tm(ASN1_TIME *s, struct tm *ts, int type);
|
/openssl/crypto/ |
H A D | o_time.c | 16 struct tm *ts = NULL; in OPENSSL_gmtime() local 38 ts = result; in OPENSSL_gmtime() 43 ts = result; in OPENSSL_gmtime() 47 ts = result; in OPENSSL_gmtime() 49 ts = gmtime(timer); in OPENSSL_gmtime() 50 if (ts == NULL) in OPENSSL_gmtime() 53 memcpy(result, ts, sizeof(struct tm)); in OPENSSL_gmtime() 54 ts = result; in OPENSSL_gmtime() 56 return ts; in OPENSSL_gmtime()
|
H A D | sleep.c | 60 struct timespec ts; in OSSL_sleep() local 62 ts.tv_sec = (long int) (millis / 1000); in OSSL_sleep() 63 ts.tv_nsec = (long int) (millis % 1000) * 1000000ul; in OSSL_sleep() 64 nanosleep(&ts, NULL); in OSSL_sleep()
|
H A D | build.info | 8 err comp http ocsp cms ts srp cmac ct async ess crmf cmp encode_decode \
|
/openssl/test/ |
H A D | cmp_vfy_test.c | 54 X509_STORE *ts; in set_up() local 60 ts = X509_STORE_new(); in set_up() 62 if (ts == NULL in set_up() 67 X509_STORE_free(ts); in set_up() 224 X509_STORE *ts; in test_validate_msg_signature_partial_chain() local 231 if (ts == NULL in test_validate_msg_signature_partial_chain() 608 struct tm ts = { 0 }; in OPT_TEST_DECLARE_USAGE() local 610 ts.tm_year = 2018 - 1900; /* 2018 */ in OPT_TEST_DECLARE_USAGE() 611 ts.tm_mon = 1; /* February */ in OPT_TEST_DECLARE_USAGE() 612 ts.tm_mday = 18; /* 18th */ in OPT_TEST_DECLARE_USAGE() [all …]
|
/openssl/crypto/cmp/ |
H A D | cmp_genm.c | 16 const X509_STORE *ts = OSSL_CMP_CTX_get0_trustedStore(ctx); in get0_trustedStore_vpm() local 18 return ts == NULL ? NULL : X509_STORE_get0_param(ts); in get0_trustedStore_vpm() 218 if (ts == NULL || (verify_cb = X509_STORE_get_verify_cb(ts)) == NULL) in selfsigned_verify_cb() 232 if (ts == NULL || target == NULL) { in verify_ss_cert() 253 X509_STORE *ts = OSSL_CMP_CTX_get0_trusted(ctx); in verify_ss_cert_trans() local 258 X509_VERIFY_PARAM *vpm = X509_STORE_get0_param(ts); in verify_ss_cert_trans() 260 if ((ts = X509_STORE_new()) == NULL) in verify_ss_cert_trans() 262 if (!X509_STORE_set1_param(ts, vpm) in verify_ss_cert_trans() 263 || !X509_STORE_add_cert(ts, trusted)) in verify_ss_cert_trans() 273 ts, untrusted, target); in verify_ss_cert_trans() [all …]
|
H A D | cmp_vfy.c | 142 static int verify_cb_cert(X509_STORE *ts, X509 *cert, int err) in verify_cb_cert() argument 148 if (ts == NULL || (verify_cb = X509_STORE_get_verify_cb(ts)) == NULL) in verify_cb_cert() 151 && X509_STORE_CTX_init(csc, ts, cert, NULL)) { in verify_cb_cert() 250 X509_STORE *ts = ctx->trusted; in cert_acceptable() local 253 X509_VERIFY_PARAM *vpm = ts != NULL ? X509_STORE_get0_param(ts) : NULL; in cert_acceptable() 283 && verify_cb_cert(ts, cert, err) <= 0) in cert_acceptable()
|
/openssl/crypto/conf/ |
H A D | conf_api.c | 48 STACK_OF(CONF_VALUE) *ts; in _CONF_add_string() 50 ts = (STACK_OF(CONF_VALUE) *)section->value; in _CONF_add_string() 53 if (!sk_CONF_VALUE_push(ts, value)) in _CONF_add_string() 58 (void)sk_CONF_VALUE_delete_ptr(ts, v); in _CONF_add_string()
|
/openssl/crypto/ocsp/ |
H A D | ocsp_prn.c | 38 static const char *do_table2string(long s, const OCSP_TBLSTR *ts, size_t len) in do_table2string() argument 41 for (i = 0; i < len; i++, ts++) in do_table2string() 42 if (ts->t == s) in do_table2string() 43 return ts->m; in do_table2string()
|
/openssl/doc/man1/ |
H A D | openssl-ts.pod.in | 6 openssl-ts - Time Stamping Authority command 10 B<openssl> B<ts> 13 B<openssl> B<ts> 28 B<openssl> B<ts> 46 B<openssl> B<ts> 509 openssl ts -query -data design1.txt -no_nonce \ 520 openssl ts -query -in design1.tsq -text 527 openssl ts -query -data design2.txt -sha512 \ 551 openssl ts -reply -queryfile design1.tsq -out design1.tsr 555 openssl ts -reply -in design1.tsr -text [all …]
|
H A D | openssl-cmds.pod.in | 54 ts, 135 L<openssl-ts(1)>,
|
H A D | tsget.pod | 29 and verifying responses, you have to use L<openssl-ts(1)> to do that. This 158 openssl ts -query -data file3.txt -cert | tee file3.tsq \ 189 L<openssl-ts(1)>,
|
H A D | build.info | 54 DEPEND[openssl-ts.pod]=../perlvars.pm
|
/openssl/apps/ |
H A D | cmp.c | 777 X509_VERIFY_PARAM *ts_vpm = X509_STORE_get0_param(ts); in truststore_set_host_etc() 999 if (ts == NULL) in load_trusted() 1004 if (X509_STORE_set1_param(ts, vpm /* may be NULL */) in load_trusted() 1006 return ts; in load_trusted() 1009 X509_STORE_free(ts); in load_trusted() 1178 X509_STORE *ts = in setup_srv_ctx() local 1181 if (ts == NULL || !OSSL_CMP_CTX_set0_trusted(ctx, ts)) { in setup_srv_ctx() 1182 X509_STORE_free(ts); in setup_srv_ctx() 1296 X509_STORE *ts; in setup_verification_ctx() local 1304 if (ts == NULL || !OSSL_CMP_CTX_set0_trusted(ctx, ts)) { in setup_verification_ctx() [all …]
|
H A D | build.info | 31 IF[{- !$disabled{'ts'} -}] 32 $OPENSSLSRC=$OPENSSLSRC ts.c
|
/openssl/test/helpers/ |
H A D | quictestlib.h | 57 QTEST_FAULT *qtest_create_injector(QUIC_TSERVER *ts);
|
/openssl/doc/man3/ |
H A D | TS_RESP_CTX_new.pod | 10 #include <openssl/ts.h>
|
/openssl/.github/workflows/ |
H A D | run-checker-merge.yml | 35 no-ts,
|
/openssl/crypto/x509/ |
H A D | t_x509.c | 456 X509_STORE *ts = X509_STORE_CTX_get0_store(ctx); in X509_STORE_CTX_print_verify_cb() local 457 X509_VERIFY_PARAM *vpm = X509_STORE_get0_param(ts); in X509_STORE_CTX_print_verify_cb()
|
/openssl/crypto/err/ |
H A D | openssl.ec | 31 L TS include/openssl/tserr.h crypto/ts/ts_err.c include/cry…
|