/openssl-master/doc/man1/ |
A D | tsget.pod | 26 This command can be used for sending a timestamp request, as specified 27 in RFC 3161, to a timestamp server over HTTP or HTTPS and storing the 28 timestamp response in a file. It cannot be used for creating the requests 33 This command sends the following HTTP request for each timestamp request: 39 Content-Type: application/timestamp-query 40 Accept: application/timestamp-reply 45 It expects a response of type application/timestamp-reply, which is 54 The URL of the HTTP/HTTPS server listening for timestamp requests. 124 List of files containing RFC 3161 DER-encoded timestamp requests. If no 144 Get a timestamp response for F<file1.tsq> over HTTP, output is written to [all …]
|
A D | openssl-ts.pod.in | 91 timestamp request to the TSA and one for sending the timestamp response 93 creating a timestamp request based on a data file, 204 otherwise it is a timestamp token (ContentInfo). 266 Specifies a previously created timestamp response or timestamp token 278 of a timestamp response (TimeStampResp). (Optional) 288 The output is a timestamp token (ContentInfo) instead of timestamp 305 timestamp token is valid and matches a particular timestamp request or 544 To create a timestamp response for a request: 557 To create a timestamp token instead of timestamp response: 565 To extract the timestamp token from a response: [all …]
|
A D | openssl-verification-options.pod | 255 =item B<-attime> I<timestamp> 257 Perform validation checks using time specified by I<timestamp> and not 258 current system time. I<timestamp> is the number of seconds since
|
/openssl-master/crypto/ct/ |
A D | ct_prn.c | 29 static void timestamp_print(uint64_t timestamp, BIO *out) in timestamp_print() argument 37 (int)(timestamp / 86400000), in timestamp_print() 38 (timestamp % 86400000) / 1000); in timestamp_print() 44 ASN1_STRING_get0_data(gen), (unsigned int)(timestamp % 1000)); in timestamp_print() 100 timestamp_print(sct->timestamp, out); in SCT_print()
|
A D | ct_sct.c | 118 void SCT_set_timestamp(SCT *sct, uint64_t timestamp) in SCT_set_timestamp() argument 120 sct->timestamp = timestamp; in SCT_set_timestamp() 213 return sct->timestamp; in SCT_get_timestamp()
|
A D | ct_vfy.c | 55 l2n8(sct->timestamp, p); in sct_ctx_update() 116 if (sct->timestamp > sctx->epoch_time_in_ms) { in SCT_CTX_verify()
|
A D | ct_b64.c | 64 ct_log_entry_type_t entry_type, uint64_t timestamp, in SCT_new_from_base64() argument 116 SCT_set_timestamp(sct, timestamp); in SCT_new_from_base64()
|
A D | ct_oct.c | 110 n2l8(p, sct->timestamp); in o2i_SCT() 239 l2n8(sct->timestamp, p); in i2o_SCT()
|
A D | ct_local.h | 70 uint64_t timestamp; member
|
/openssl-master/doc/man3/ |
A D | CT_POLICY_EVAL_CTX_new.pod | 36 determine this, an SCT's timestamp and signature must be verified. 96 The SCT timestamp will be compared to this time to check whether the SCT was 98 timestamp is in the future". By default, this will be set to 5 minutes in the
|
A D | SCT_new.pod | 42 uint64_t timestamp, 60 void SCT_set_timestamp(SCT *sct, uint64_t timestamp);
|
A D | SCT_validate.pod | 63 If the SCT's signature is incorrect, its timestamp is in the future (relative to
|
A D | SSL_CTX_set_session_cache_mode.pod | 110 Updates the timestamp of the session when it is used, increasing the lifespan
|
A D | PKCS7_verify.pod | 96 timestamp).
|
A D | CMS_verify.pod | 103 timestamp).
|
/openssl-master/include/openssl/ |
A D | ct.h.in | 134 * If an SCT's timestamp is after this time, it will be interpreted as having 136 * whose timestamp is in the future", so an SCT will not validate in this case. 157 uint64_t timestamp, 217 * Returns the timestamp for the SCT (epoch time in milliseconds). 222 * Set the timestamp of an SCT (epoch time in milliseconds). 224 void SCT_set_timestamp(SCT *sct, uint64_t timestamp);
|
A D | cmp.h.in | 64 * -- when the timestamp is missing but should be there
|
/openssl-master/test/ |
A D | ct_test.c | 443 const uint64_t timestamp = 1; in test_encode_tls_sct() local 453 CT_LOG_ENTRY_TYPE_X509, timestamp, in test_encode_tls_sct()
|
/openssl-master/test/certs/ |
A D | mkcert.sh | 376 --timestamp="2020-01-01T00:00:00Z" \
|
/openssl-master/crypto/objects/ |
A D | objects.txt | 493 id-pkix-mod 13 : id-mod-timestamp-protocol
|
/openssl-master/crypto/err/ |
A D | openssl.txt | 457 CT_R_SCT_FUTURE_TIMESTAMP:116:sct future timestamp
|
/openssl-master/ |
A D | CHANGES.md | 1671 2) When verifying that a timestamp response token signer matches the 1672 timestamp authority name (exposed via the API functions
|