| /freebsd-src/crypto/openssl/test/ |
| H A D | CAtsa.cnf | 17 # Policies used by the TSA tests. 74 organizationName = Hun-TSA Ltd. 75 commonName = tsa$ENV::INDEX 79 # TSA server cert is not a CA cert. 82 # The following key usage flags are needed for TSA server certificates. 92 # This is not a CA cert and not a TSA cert, either (timeStamping usage missing) 95 # The following key usage flags are needed for TSA server certificates. 120 [ tsa ] 122 default_tsa = tsa_config1 # the default TSA section 126 # These are used by the TSA reply generation only. [all …]
|
| /freebsd-src/sys/contrib/device-tree/Bindings/soc/fsl/cpm_qe/ |
| H A D | fsl,cpm1-scc-qmc.yaml | 14 serial controller using the same TDM physical interface routed from TSA. 40 fsl,tsa-serial: 44 - description: phandle to TSA node 47 TSA serial interface (dt-bindings/soc/cpm1-fsl,tsa.h defines these 53 Should be a phandle/number pair. The phandle to TSA node and the TSA 96 TSA to this cell. 102 TSA to this cell. 140 - fsl,tsa-serial 148 #include <dt-bindings/soc/cpm1-fsl,tsa.h> 162 fsl,tsa-serial = <&tsa FSL_CPM_TSA_SCC4>; [all …]
|
| H A D | fsl,cpm1-tsa.yaml | 4 $id: http://devicetree.org/schemas/soc/fsl/cpm_qe/fsl,cpm1-tsa.yaml# 7 title: PowerQUICC CPM Time-slot assigner (TSA) controller 13 The TSA is the time-slot assigner that can be found on some PowerQUICC SoC. 21 - fsl,mpc885-tsa 22 - fsl,mpc866-tsa 23 - const: fsl,cpm1-tsa 128 (dt-bindings/soc/cpm1-fsl,tsa.h defines these values) 174 #include <dt-bindings/soc/cpm1-fsl,tsa.h> 176 tsa@ae0 { 177 compatible = "fsl,mpc885-tsa", "fsl,cpm1-tsa";
|
| /freebsd-src/crypto/openssl/doc/man1/ |
| H A D | openssl-ts.pod.in | 62 This command is a basic Time Stamping Authority (TSA) client and 64 TSA can be part of a PKI deployment and its role is to provide long 72 The TSA client computes a one-way hash value for a data file and sends 73 the hash to the TSA. 77 The TSA attaches the current date and time to the received hash value, 79 creating this token the TSA certifies the existence of the original 84 The TSA client receives the timestamp token and verifies the 86 value that it had sent to the TSA. 91 timestamp request to the TSA and one for sending the timestamp response 158 The policy that the client expects the TSA to use for creating the [all …]
|
| H A D | tsget.pod | 140 timestamp requests, tsa.opentsa.org listens at port 8080 for HTTP requests 141 and at port 8443 for HTTPS requests, the TSA service is available at the /tsa 147 tsget -h http://tsa.opentsa.org:8080/tsa file1.tsq 152 tsget -h http://tsa.opentsa.org:8080/tsa -v -e .reply \ 159 | tsget -h http://tsa.opentsa.org:8080/tsa \ 165 tsget -h https://tsa.opentsa.org:8443/tsa \ 172 tsget -h https://tsa.opentsa.org:8443/tsa -C cacerts.pem \ 179 TSGET='-h https://tsa.opentsa.org:8443/tsa -C cacerts.pem \
|
| /freebsd-src/secure/usr.bin/openssl/man/ |
| H A D | openssl-ts.1 | 231 This command is a basic Time Stamping Authority (\s-1TSA\s0) client and 233 \&\s-1TSA\s0 can be part of a \s-1PKI\s0 deployment and its role is to provide long 237 The \s-1TSA\s0 client computes a one-way hash value for a data file and sends 238 the hash to the \s-1TSA.\s0 240 The \s-1TSA\s0 attaches the current date and time to the received hash value, 242 creating this token the \s-1TSA\s0 certifies the existence of the original 245 The \s-1TSA\s0 client receives the timestamp token and verifies the 247 value that it had sent to the \s-1TSA.\s0 250 timestamp request to the \s-1TSA\s0 and one for sending the timestamp response 301 The policy that the client expects the \s-1TSA\s0 to use for creating the [all …]
|
| H A D | tsget.1 | 254 timestamp requests, tsa.opentsa.org listens at port 8080 for \s-1HTTP\s0 requests 255 and at port 8443 for \s-1HTTPS\s0 requests, the \s-1TSA\s0 service is available at the /tsa 262 \& tsget \-h http://tsa.opentsa.org:8080/tsa file1.tsq 269 \& tsget \-h http://tsa.opentsa.org:8080/tsa \-v \-e .reply \e 278 \& | tsget \-h http://tsa.opentsa.org:8080/tsa \e 286 \& tsget \-h https://tsa.opentsa.org:8443/tsa \e 295 \& tsget \-h https://tsa.opentsa.org:8443/tsa \-C cacerts.pem \e 304 \& TSGET=\*(Aq\-h https://tsa.opentsa.org:8443/tsa \-C cacerts.pem \e
|
| /freebsd-src/sys/dev/ixgbe/ |
| H A D | ixgbe_dcb.c | 254 u8 *tsa) in ixgbe_dcb_unpack_tsa_cee() argument 260 tsa[tc] = tc_config[tc].path[direction].tsa; in ixgbe_dcb_unpack_tsa_cee() 333 if (p->tsa == ixgbe_dcb_tsa_strict) { in ixgbe_dcb_check_config_cee() 459 u8 tsa[IXGBE_DCB_MAX_TRAFFIC_CLASS] = { 0 }; in ixgbe_dcb_config_rx_arbiter_cee() local 468 ixgbe_dcb_unpack_tsa_cee(dcb_config, IXGBE_DCB_TX_CONFIG, tsa); in ixgbe_dcb_config_rx_arbiter_cee() 473 ret = ixgbe_dcb_config_rx_arbiter_82598(hw, refill, max, tsa); in ixgbe_dcb_config_rx_arbiter_cee() 481 tsa, map); in ixgbe_dcb_config_rx_arbiter_cee() 500 u8 tsa[IXGBE_DCB_MAX_TRAFFIC_CLASS]; in ixgbe_dcb_config_tx_desc_arbiter_cee() local 508 ixgbe_dcb_unpack_tsa_cee(dcb_config, IXGBE_DCB_TX_CONFIG, tsa); in ixgbe_dcb_config_tx_desc_arbiter_cee() 540 u8 tsa[IXGBE_DCB_MAX_TRAFFIC_CLASS]; ixgbe_dcb_config_tx_data_arbiter_cee() local 645 u8 tsa[IXGBE_DCB_MAX_TRAFFIC_CLASS]; ixgbe_dcb_hw_config_cee() local 713 ixgbe_dcb_hw_config(struct ixgbe_hw * hw,u16 * refill,u16 * max,u8 * bwg_id,u8 * tsa,u8 * map) ixgbe_dcb_hw_config() argument [all...] |
| H A D | ixgbe_dcb_82598.c | 108 * @tsa: transmission selection algorithm indexed by traffic class 113 u16 *max, u8 *tsa) in ixgbe_dcb_config_rx_arbiter_82598() argument 140 if (tsa[i] == ixgbe_dcb_tsa_strict) in ixgbe_dcb_config_rx_arbiter_82598() 166 * @tsa: transmission selection algorithm indexed by traffic class 172 u8 *tsa) in ixgbe_dcb_config_tx_desc_arbiter_82598() argument 195 if (tsa[i] == ixgbe_dcb_tsa_group_strict_cee) in ixgbe_dcb_config_tx_desc_arbiter_82598() 198 if (tsa[i] == ixgbe_dcb_tsa_strict) in ixgbe_dcb_config_tx_desc_arbiter_82598() 213 * @tsa: transmission selection algorithm indexed by traffic class 219 u8 *tsa) in ixgbe_dcb_config_tx_data_arbiter_82598() argument 238 if (tsa[i] == ixgbe_dcb_tsa_group_strict_cee) in ixgbe_dcb_config_tx_data_arbiter_82598() [all …]
|
| H A D | ixgbe_dcb_82599.c | 116 * @tsa: transmission selection algorithm indexed by traffic class 122 u16 *max, u8 *bwg_id, u8 *tsa, in ixgbe_dcb_config_rx_arbiter_82599() argument 157 if (tsa[i] == ixgbe_dcb_tsa_strict) in ixgbe_dcb_config_rx_arbiter_82599() 179 * @tsa: transmission selection algorithm indexed by traffic class 184 u16 *max, u8 *bwg_id, u8 *tsa) in ixgbe_dcb_config_tx_desc_arbiter_82599() argument 202 if (tsa[i] == ixgbe_dcb_tsa_group_strict_cee) in ixgbe_dcb_config_tx_desc_arbiter_82599() 205 if (tsa[i] == ixgbe_dcb_tsa_strict) in ixgbe_dcb_config_tx_desc_arbiter_82599() 227 * @tsa: transmission selection algorithm indexed by traffic class 233 u16 *max, u8 *bwg_id, u8 *tsa, in ixgbe_dcb_config_tx_data_arbiter_82599() argument 266 if (tsa[i] == ixgbe_dcb_tsa_group_strict_cee) in ixgbe_dcb_config_tx_data_arbiter_82599() [all …]
|
| /freebsd-src/contrib/netbsd-tests/lib/libc/sys/ |
| H A D | t_clock_gettime.c | 88 struct timespec tsa, tsb, tsl, res; in check_timecounter() local 100 CL(clock_gettime(CLOCK_REALTIME, &tsa)); in check_timecounter() 101 tsl = tsa; in check_timecounter() 106 while ((time_t)tsa.tv_sec < endlimit) { in check_timecounter() 110 diff = 1000000000LL * (tsb.tv_sec - tsa.tv_sec) in check_timecounter() 111 + tsb.tv_nsec - tsa.tv_nsec; in check_timecounter() 118 (void)printf("%stime TSA: 0x%jx.%08jx, TSB: 0x%jx.%08jx, " in check_timecounter() 120 (uintmax_t)tsa.tv_sec, (uintmax_t)tsa.tv_nsec, in check_timecounter() 135 tsa.tv_sec = tsb.tv_sec; in check_timecounter() 136 tsa.tv_nsec = tsb.tv_nsec; in check_timecounter()
|
| /freebsd-src/tools/tools/netrate/netreceive/ |
| H A D | netreceive.c | 75 timespec_add(struct timespec *tsa, struct timespec *tsb) in timespec_add() argument 78 tsa->tv_sec += tsb->tv_sec; in timespec_add() 79 tsa->tv_nsec += tsb->tv_nsec; in timespec_add() 80 if (tsa->tv_nsec >= 1000000000) { in timespec_add() 81 tsa->tv_sec++; in timespec_add() 82 tsa->tv_nsec -= 1000000000; in timespec_add() 87 timespec_sub(struct timespec *tsa, struct timespec *tsb) in timespec_sub() argument 90 tsa->tv_sec -= tsb->tv_sec; in timespec_sub() 91 tsa->tv_nsec -= tsb->tv_nsec; in timespec_sub() 92 if (tsa->tv_nsec < 0) { in timespec_sub() [all …]
|
| /freebsd-src/crypto/openssl/crypto/ts/ |
| H A D | ts_rsp_print.c | 60 "the TSA's time source is not available"}, in TS_STATUS_INFO_print_bio() 62 "the requested TSA policy is not supported by the TSA"}, in TS_STATUS_INFO_print_bio() 64 "the requested extension is not supported by the TSA"}, in TS_STATUS_INFO_print_bio() 160 BIO_printf(bio, "TSA: "); in TS_TST_INFO_print_bio() 161 if (a->tsa == NULL) in TS_TST_INFO_print_bio() 165 if ((nval = i2v_GENERAL_NAME(NULL, a->tsa, NULL))) in TS_TST_INFO_print_bio()
|
| H A D | ts_rsp_utils.c | 272 int TS_TST_INFO_set_tsa(TS_TST_INFO *a, GENERAL_NAME *tsa) in TS_TST_INFO_set_tsa() argument 276 if (a->tsa == tsa) in TS_TST_INFO_set_tsa() 278 new_tsa = GENERAL_NAME_dup(tsa); in TS_TST_INFO_set_tsa() 283 GENERAL_NAME_free(a->tsa); in TS_TST_INFO_set_tsa() 284 a->tsa = new_tsa; in TS_TST_INFO_set_tsa() 290 return a->tsa; in TS_TST_INFO_get_tsa()
|
| /freebsd-src/contrib/ntp/util/ |
| H A D | pps-api.c | 31 Chew(struct timespec *tsa, struct timespec *tsc, unsigned sa, unsigned sc) in Chew() argument 36 printf("%d.%09d ", tsa->tv_sec, tsa->tv_nsec); in Chew() 41 timespecsub(&ts,tsa); in Chew()
|
| /freebsd-src/crypto/openssl/apps/ |
| H A D | openssl-vms.cnf | 40 # Policies used by the TSA examples. 228 # This is required for TSA certificates. 305 [ tsa ] 307 default_tsa = tsa_config1 # the default TSA section 311 # These are used by the TSA reply generation only. 312 dir = sys\$disk:[.demoCA # TSA root directory 315 signer_cert = $dir/tsacert.pem # The TSA signing certificate 319 signer_key = $dir/private/tsakey.pem # The TSA private key (optional) 329 tsa_name = yes # Must the TSA name be included in the reply?
|
| H A D | openssl.cnf | 41 # Policies used by the TSA examples. 229 # This is required for TSA certificates. 306 [ tsa ] 308 default_tsa = tsa_config1 # the default TSA section 312 # These are used by the TSA reply generation only. 313 dir = ./demoCA # TSA root directory 316 signer_cert = $dir/tsacert.pem # The TSA signing certificate 320 signer_key = $dir/private/tsakey.pem # The TSA private key (optional) 330 tsa_name = yes # Must the TSA name be included in the reply?
|
| /freebsd-src/crypto/openssl/doc/man3/ |
| H A D | TS_VERIFY_CTX_set_certs.pod | 21 time. TSP defines a Time Stamping Authority (TSA) and an entity who shall make 22 requests to the TSA. Usually the TSA is denoted as the server side and the
|
| /freebsd-src/sys/dev/sfxge/common/ |
| H A D | ef10_tlv_layout.h | 67 * 4: tsa configuration 859 /* TSA NIC IP address configuration (DEPRECATED) 861 * Sets the TSA NIC IP address statically via configuration tool or dynamically 865 * be moved to a private partition during TSA development. It is not used in any 886 /* TSA Controller IP address configuration (DEPRECATED) 888 * Sets the TSA Controller IP address statically via configuration tool 891 * be moved to a private partition during TSA development. It is not used in any 908 * Sets the TSA NIC binding ticket used for binding process between the TSA NIC 909 * and the TSA Controller 912 * be moved to a private partition during TSA development. It is not used in any [all …]
|
| /freebsd-src/contrib/netbsd-tests/lib/libc/gen/ |
| H A D | t_sleep.c | 268 struct timespec tsa, tsb, tslp, tremain; in sleeptest() local 292 clock_gettime(CLOCK_REALTIME, &tsa); in sleeptest() 297 timespecsub(&tsb, &tsa, &tremain); in sleeptest() 301 delta1 = (int64_t)tsb.tv_sec - (int64_t)tsa.tv_sec; in sleeptest() 303 delta1 += (int64_t)tsb.tv_nsec - (int64_t)tsa.tv_nsec; in sleeptest()
|
| /freebsd-src/crypto/openssl/test/recipes/ |
| H A D | 80-test_tsa.t | 90 note "setting up TSA test directory"; 91 indir "tsa" => sub 109 'creating a new CA for the TSA tests'); 112 unless subtest 'creating tsa_cert1.pem TSA server cert' => sub { 117 unless subtest 'creating tsa_cert2.pem non-TSA server cert' => sub {
|
| /freebsd-src/sys/compat/linux/ |
| H A D | linux_signal.c | 469 struct timespec ts, *tsa; in linux_rt_sigtimedwait() local 476 tsa = &ts; in linux_rt_sigtimedwait() 478 tsa = NULL; in linux_rt_sigtimedwait() 480 return (linux_common_rt_sigtimedwait(td, args->mask, tsa, in linux_rt_sigtimedwait() 486 struct timespec *tsa, l_siginfo_t *ptr, l_size_t sigsetsize) in linux_common_rt_sigtimedwait() argument 498 error = kern_sigtimedwait(td, bset, &ksi, tsa); in linux_common_rt_sigtimedwait() 520 struct timespec ts, *tsa; in linux_rt_sigtimedwait_time64() local 527 tsa = &ts; in linux_rt_sigtimedwait_time64() 529 tsa = NULL; in linux_rt_sigtimedwait_time64() 531 return (linux_common_rt_sigtimedwait(td, args->mask, tsa, in linux_rt_sigtimedwait_time64()
|
| H A D | linux_event.c | 483 struct timespec ts, *tsa; in linux_epoll_pwait2_64() local 496 tsa = &ts; in linux_epoll_pwait2_64() 498 tsa = NULL; in linux_epoll_pwait2_64() 501 args->maxevents, tsa, pmask)); in linux_epoll_pwait2_64() 507 struct timespec ts, *tsa; in linux_epoll_pwait2() local 520 tsa = &ts; in linux_epoll_pwait2() 522 tsa = NULL; in linux_epoll_pwait2() 525 args->maxevents, tsa, pmask)); in linux_epoll_pwait2()
|
| /freebsd-src/tools/tools/netrate/netsend/ |
| H A D | netsend.c | 69 timespec_add(struct timespec *tsa, struct timespec *tsb) in timespec_add() argument 72 tsa->tv_sec += tsb->tv_sec; in timespec_add() 73 tsa->tv_nsec += tsb->tv_nsec; in timespec_add() 74 if (tsa->tv_nsec >= 1000000000) { in timespec_add() 75 tsa->tv_sec++; in timespec_add() 76 tsa->tv_nsec -= 1000000000; in timespec_add()
|
| /freebsd-src/secure/lib/libcrypto/man/man3/ |
| H A D | TS_VERIFY_CTX_set_certs.3 | 156 time. \s-1TSP\s0 defines a Time Stamping Authority (\s-1TSA\s0) and an entity who shall make 157 requests to the \s-1TSA.\s0 Usually the \s-1TSA\s0 is denoted as the server side and the
|