Home
last modified time | relevance | path

Searched full:tsa (Results 1 – 25 of 69) sorted by relevance

123

/freebsd-src/crypto/openssl/test/
H A DCAtsa.cnf17 # Policies used by the TSA tests.
74 organizationName = Hun-TSA Ltd.
75 commonName = tsa$ENV::INDEX
79 # TSA server cert is not a CA cert.
82 # The following key usage flags are needed for TSA server certificates.
92 # This is not a CA cert and not a TSA cert, either (timeStamping usage missing)
95 # The following key usage flags are needed for TSA server certificates.
120 [ tsa ]
122 default_tsa = tsa_config1 # the default TSA section
126 # These are used by the TSA reply generation only.
[all …]
/freebsd-src/sys/contrib/device-tree/Bindings/soc/fsl/cpm_qe/
H A Dfsl,cpm1-scc-qmc.yaml14 serial controller using the same TDM physical interface routed from TSA.
40 fsl,tsa-serial:
44 - description: phandle to TSA node
47 TSA serial interface (dt-bindings/soc/cpm1-fsl,tsa.h defines these
53 Should be a phandle/number pair. The phandle to TSA node and the TSA
96 TSA to this cell.
102 TSA to this cell.
140 - fsl,tsa-serial
148 #include <dt-bindings/soc/cpm1-fsl,tsa.h>
162 fsl,tsa-serial = <&tsa FSL_CPM_TSA_SCC4>;
[all …]
H A Dfsl,cpm1-tsa.yaml4 $id: http://devicetree.org/schemas/soc/fsl/cpm_qe/fsl,cpm1-tsa.yaml#
7 title: PowerQUICC CPM Time-slot assigner (TSA) controller
13 The TSA is the time-slot assigner that can be found on some PowerQUICC SoC.
21 - fsl,mpc885-tsa
22 - fsl,mpc866-tsa
23 - const: fsl,cpm1-tsa
128 (dt-bindings/soc/cpm1-fsl,tsa.h defines these values)
174 #include <dt-bindings/soc/cpm1-fsl,tsa.h>
176 tsa@ae0 {
177 compatible = "fsl,mpc885-tsa", "fsl,cpm1-tsa";
/freebsd-src/crypto/openssl/doc/man1/
H A Dopenssl-ts.pod.in62 This command is a basic Time Stamping Authority (TSA) client and
64 TSA can be part of a PKI deployment and its role is to provide long
72 The TSA client computes a one-way hash value for a data file and sends
73 the hash to the TSA.
77 The TSA attaches the current date and time to the received hash value,
79 creating this token the TSA certifies the existence of the original
84 The TSA client receives the timestamp token and verifies the
86 value that it had sent to the TSA.
91 timestamp request to the TSA and one for sending the timestamp response
158 The policy that the client expects the TSA to use for creating the
[all …]
H A Dtsget.pod140 timestamp requests, tsa.opentsa.org listens at port 8080 for HTTP requests
141 and at port 8443 for HTTPS requests, the TSA service is available at the /tsa
147 tsget -h http://tsa.opentsa.org:8080/tsa file1.tsq
152 tsget -h http://tsa.opentsa.org:8080/tsa -v -e .reply \
159 | tsget -h http://tsa.opentsa.org:8080/tsa \
165 tsget -h https://tsa.opentsa.org:8443/tsa \
172 tsget -h https://tsa.opentsa.org:8443/tsa -C cacerts.pem \
179 TSGET='-h https://tsa.opentsa.org:8443/tsa -C cacerts.pem \
/freebsd-src/secure/usr.bin/openssl/man/
H A Dopenssl-ts.1231 This command is a basic Time Stamping Authority (\s-1TSA\s0) client and
233 \&\s-1TSA\s0 can be part of a \s-1PKI\s0 deployment and its role is to provide long
237 The \s-1TSA\s0 client computes a one-way hash value for a data file and sends
238 the hash to the \s-1TSA.\s0
240 The \s-1TSA\s0 attaches the current date and time to the received hash value,
242 creating this token the \s-1TSA\s0 certifies the existence of the original
245 The \s-1TSA\s0 client receives the timestamp token and verifies the
247 value that it had sent to the \s-1TSA.\s0
250 timestamp request to the \s-1TSA\s0 and one for sending the timestamp response
301 The policy that the client expects the \s-1TSA\s0 to use for creating the
[all …]
H A Dtsget.1254 timestamp requests, tsa.opentsa.org listens at port 8080 for \s-1HTTP\s0 requests
255 and at port 8443 for \s-1HTTPS\s0 requests, the \s-1TSA\s0 service is available at the /tsa
262 \& tsget \-h http://tsa.opentsa.org:8080/tsa file1.tsq
269 \& tsget \-h http://tsa.opentsa.org:8080/tsa \-v \-e .reply \e
278 \& | tsget \-h http://tsa.opentsa.org:8080/tsa \e
286 \& tsget \-h https://tsa.opentsa.org:8443/tsa \e
295 \& tsget \-h https://tsa.opentsa.org:8443/tsa \-C cacerts.pem \e
304 \& TSGET=\*(Aq\-h https://tsa.opentsa.org:8443/tsa \-C cacerts.pem \e
/freebsd-src/sys/dev/ixgbe/
H A Dixgbe_dcb.c254 u8 *tsa) in ixgbe_dcb_unpack_tsa_cee() argument
260 tsa[tc] = tc_config[tc].path[direction].tsa; in ixgbe_dcb_unpack_tsa_cee()
333 if (p->tsa == ixgbe_dcb_tsa_strict) { in ixgbe_dcb_check_config_cee()
459 u8 tsa[IXGBE_DCB_MAX_TRAFFIC_CLASS] = { 0 }; in ixgbe_dcb_config_rx_arbiter_cee() local
468 ixgbe_dcb_unpack_tsa_cee(dcb_config, IXGBE_DCB_TX_CONFIG, tsa); in ixgbe_dcb_config_rx_arbiter_cee()
473 ret = ixgbe_dcb_config_rx_arbiter_82598(hw, refill, max, tsa); in ixgbe_dcb_config_rx_arbiter_cee()
481 tsa, map); in ixgbe_dcb_config_rx_arbiter_cee()
500 u8 tsa[IXGBE_DCB_MAX_TRAFFIC_CLASS]; in ixgbe_dcb_config_tx_desc_arbiter_cee() local
508 ixgbe_dcb_unpack_tsa_cee(dcb_config, IXGBE_DCB_TX_CONFIG, tsa); in ixgbe_dcb_config_tx_desc_arbiter_cee()
540 u8 tsa[IXGBE_DCB_MAX_TRAFFIC_CLASS]; ixgbe_dcb_config_tx_data_arbiter_cee() local
645 u8 tsa[IXGBE_DCB_MAX_TRAFFIC_CLASS]; ixgbe_dcb_hw_config_cee() local
713 ixgbe_dcb_hw_config(struct ixgbe_hw * hw,u16 * refill,u16 * max,u8 * bwg_id,u8 * tsa,u8 * map) ixgbe_dcb_hw_config() argument
[all...]
H A Dixgbe_dcb_82598.c108 * @tsa: transmission selection algorithm indexed by traffic class
113 u16 *max, u8 *tsa) in ixgbe_dcb_config_rx_arbiter_82598() argument
140 if (tsa[i] == ixgbe_dcb_tsa_strict) in ixgbe_dcb_config_rx_arbiter_82598()
166 * @tsa: transmission selection algorithm indexed by traffic class
172 u8 *tsa) in ixgbe_dcb_config_tx_desc_arbiter_82598() argument
195 if (tsa[i] == ixgbe_dcb_tsa_group_strict_cee) in ixgbe_dcb_config_tx_desc_arbiter_82598()
198 if (tsa[i] == ixgbe_dcb_tsa_strict) in ixgbe_dcb_config_tx_desc_arbiter_82598()
213 * @tsa: transmission selection algorithm indexed by traffic class
219 u8 *tsa) in ixgbe_dcb_config_tx_data_arbiter_82598() argument
238 if (tsa[i] == ixgbe_dcb_tsa_group_strict_cee) in ixgbe_dcb_config_tx_data_arbiter_82598()
[all …]
H A Dixgbe_dcb_82599.c116 * @tsa: transmission selection algorithm indexed by traffic class
122 u16 *max, u8 *bwg_id, u8 *tsa, in ixgbe_dcb_config_rx_arbiter_82599() argument
157 if (tsa[i] == ixgbe_dcb_tsa_strict) in ixgbe_dcb_config_rx_arbiter_82599()
179 * @tsa: transmission selection algorithm indexed by traffic class
184 u16 *max, u8 *bwg_id, u8 *tsa) in ixgbe_dcb_config_tx_desc_arbiter_82599() argument
202 if (tsa[i] == ixgbe_dcb_tsa_group_strict_cee) in ixgbe_dcb_config_tx_desc_arbiter_82599()
205 if (tsa[i] == ixgbe_dcb_tsa_strict) in ixgbe_dcb_config_tx_desc_arbiter_82599()
227 * @tsa: transmission selection algorithm indexed by traffic class
233 u16 *max, u8 *bwg_id, u8 *tsa, in ixgbe_dcb_config_tx_data_arbiter_82599() argument
266 if (tsa[i] == ixgbe_dcb_tsa_group_strict_cee) in ixgbe_dcb_config_tx_data_arbiter_82599()
[all …]
/freebsd-src/contrib/netbsd-tests/lib/libc/sys/
H A Dt_clock_gettime.c88 struct timespec tsa, tsb, tsl, res; in check_timecounter() local
100 CL(clock_gettime(CLOCK_REALTIME, &tsa)); in check_timecounter()
101 tsl = tsa; in check_timecounter()
106 while ((time_t)tsa.tv_sec < endlimit) { in check_timecounter()
110 diff = 1000000000LL * (tsb.tv_sec - tsa.tv_sec) in check_timecounter()
111 + tsb.tv_nsec - tsa.tv_nsec; in check_timecounter()
118 (void)printf("%stime TSA: 0x%jx.%08jx, TSB: 0x%jx.%08jx, " in check_timecounter()
120 (uintmax_t)tsa.tv_sec, (uintmax_t)tsa.tv_nsec, in check_timecounter()
135 tsa.tv_sec = tsb.tv_sec; in check_timecounter()
136 tsa.tv_nsec = tsb.tv_nsec; in check_timecounter()
/freebsd-src/tools/tools/netrate/netreceive/
H A Dnetreceive.c75 timespec_add(struct timespec *tsa, struct timespec *tsb) in timespec_add() argument
78 tsa->tv_sec += tsb->tv_sec; in timespec_add()
79 tsa->tv_nsec += tsb->tv_nsec; in timespec_add()
80 if (tsa->tv_nsec >= 1000000000) { in timespec_add()
81 tsa->tv_sec++; in timespec_add()
82 tsa->tv_nsec -= 1000000000; in timespec_add()
87 timespec_sub(struct timespec *tsa, struct timespec *tsb) in timespec_sub() argument
90 tsa->tv_sec -= tsb->tv_sec; in timespec_sub()
91 tsa->tv_nsec -= tsb->tv_nsec; in timespec_sub()
92 if (tsa->tv_nsec < 0) { in timespec_sub()
[all …]
/freebsd-src/crypto/openssl/crypto/ts/
H A Dts_rsp_print.c60 "the TSA's time source is not available"}, in TS_STATUS_INFO_print_bio()
62 "the requested TSA policy is not supported by the TSA"}, in TS_STATUS_INFO_print_bio()
64 "the requested extension is not supported by the TSA"}, in TS_STATUS_INFO_print_bio()
160 BIO_printf(bio, "TSA: "); in TS_TST_INFO_print_bio()
161 if (a->tsa == NULL) in TS_TST_INFO_print_bio()
165 if ((nval = i2v_GENERAL_NAME(NULL, a->tsa, NULL))) in TS_TST_INFO_print_bio()
H A Dts_rsp_utils.c272 int TS_TST_INFO_set_tsa(TS_TST_INFO *a, GENERAL_NAME *tsa) in TS_TST_INFO_set_tsa() argument
276 if (a->tsa == tsa) in TS_TST_INFO_set_tsa()
278 new_tsa = GENERAL_NAME_dup(tsa); in TS_TST_INFO_set_tsa()
283 GENERAL_NAME_free(a->tsa); in TS_TST_INFO_set_tsa()
284 a->tsa = new_tsa; in TS_TST_INFO_set_tsa()
290 return a->tsa; in TS_TST_INFO_get_tsa()
/freebsd-src/contrib/ntp/util/
H A Dpps-api.c31 Chew(struct timespec *tsa, struct timespec *tsc, unsigned sa, unsigned sc) in Chew() argument
36 printf("%d.%09d ", tsa->tv_sec, tsa->tv_nsec); in Chew()
41 timespecsub(&ts,tsa); in Chew()
/freebsd-src/crypto/openssl/apps/
H A Dopenssl-vms.cnf40 # Policies used by the TSA examples.
228 # This is required for TSA certificates.
305 [ tsa ]
307 default_tsa = tsa_config1 # the default TSA section
311 # These are used by the TSA reply generation only.
312 dir = sys\$disk:[.demoCA # TSA root directory
315 signer_cert = $dir/tsacert.pem # The TSA signing certificate
319 signer_key = $dir/private/tsakey.pem # The TSA private key (optional)
329 tsa_name = yes # Must the TSA name be included in the reply?
H A Dopenssl.cnf41 # Policies used by the TSA examples.
229 # This is required for TSA certificates.
306 [ tsa ]
308 default_tsa = tsa_config1 # the default TSA section
312 # These are used by the TSA reply generation only.
313 dir = ./demoCA # TSA root directory
316 signer_cert = $dir/tsacert.pem # The TSA signing certificate
320 signer_key = $dir/private/tsakey.pem # The TSA private key (optional)
330 tsa_name = yes # Must the TSA name be included in the reply?
/freebsd-src/crypto/openssl/doc/man3/
H A DTS_VERIFY_CTX_set_certs.pod21 time. TSP defines a Time Stamping Authority (TSA) and an entity who shall make
22 requests to the TSA. Usually the TSA is denoted as the server side and the
/freebsd-src/sys/dev/sfxge/common/
H A Def10_tlv_layout.h67 * 4: tsa configuration
859 /* TSA NIC IP address configuration (DEPRECATED)
861 * Sets the TSA NIC IP address statically via configuration tool or dynamically
865 * be moved to a private partition during TSA development. It is not used in any
886 /* TSA Controller IP address configuration (DEPRECATED)
888 * Sets the TSA Controller IP address statically via configuration tool
891 * be moved to a private partition during TSA development. It is not used in any
908 * Sets the TSA NIC binding ticket used for binding process between the TSA NIC
909 * and the TSA Controller
912 * be moved to a private partition during TSA development. It is not used in any
[all …]
/freebsd-src/contrib/netbsd-tests/lib/libc/gen/
H A Dt_sleep.c268 struct timespec tsa, tsb, tslp, tremain; in sleeptest() local
292 clock_gettime(CLOCK_REALTIME, &tsa); in sleeptest()
297 timespecsub(&tsb, &tsa, &tremain); in sleeptest()
301 delta1 = (int64_t)tsb.tv_sec - (int64_t)tsa.tv_sec; in sleeptest()
303 delta1 += (int64_t)tsb.tv_nsec - (int64_t)tsa.tv_nsec; in sleeptest()
/freebsd-src/crypto/openssl/test/recipes/
H A D80-test_tsa.t90 note "setting up TSA test directory";
91 indir "tsa" => sub
109 'creating a new CA for the TSA tests');
112 unless subtest 'creating tsa_cert1.pem TSA server cert' => sub {
117 unless subtest 'creating tsa_cert2.pem non-TSA server cert' => sub {
/freebsd-src/sys/compat/linux/
H A Dlinux_signal.c469 struct timespec ts, *tsa; in linux_rt_sigtimedwait() local
476 tsa = &ts; in linux_rt_sigtimedwait()
478 tsa = NULL; in linux_rt_sigtimedwait()
480 return (linux_common_rt_sigtimedwait(td, args->mask, tsa, in linux_rt_sigtimedwait()
486 struct timespec *tsa, l_siginfo_t *ptr, l_size_t sigsetsize) in linux_common_rt_sigtimedwait() argument
498 error = kern_sigtimedwait(td, bset, &ksi, tsa); in linux_common_rt_sigtimedwait()
520 struct timespec ts, *tsa; in linux_rt_sigtimedwait_time64() local
527 tsa = &ts; in linux_rt_sigtimedwait_time64()
529 tsa = NULL; in linux_rt_sigtimedwait_time64()
531 return (linux_common_rt_sigtimedwait(td, args->mask, tsa, in linux_rt_sigtimedwait_time64()
H A Dlinux_event.c483 struct timespec ts, *tsa; in linux_epoll_pwait2_64() local
496 tsa = &ts; in linux_epoll_pwait2_64()
498 tsa = NULL; in linux_epoll_pwait2_64()
501 args->maxevents, tsa, pmask)); in linux_epoll_pwait2_64()
507 struct timespec ts, *tsa; in linux_epoll_pwait2() local
520 tsa = &ts; in linux_epoll_pwait2()
522 tsa = NULL; in linux_epoll_pwait2()
525 args->maxevents, tsa, pmask)); in linux_epoll_pwait2()
/freebsd-src/tools/tools/netrate/netsend/
H A Dnetsend.c69 timespec_add(struct timespec *tsa, struct timespec *tsb) in timespec_add() argument
72 tsa->tv_sec += tsb->tv_sec; in timespec_add()
73 tsa->tv_nsec += tsb->tv_nsec; in timespec_add()
74 if (tsa->tv_nsec >= 1000000000) { in timespec_add()
75 tsa->tv_sec++; in timespec_add()
76 tsa->tv_nsec -= 1000000000; in timespec_add()
/freebsd-src/secure/lib/libcrypto/man/man3/
H A DTS_VERIFY_CTX_set_certs.3156 time. \s-1TSP\s0 defines a Time Stamping Authority (\s-1TSA\s0) and an entity who shall make
157 requests to the \s-1TSA.\s0 Usually the \s-1TSA\s0 is denoted as the server side and the

123