summaryrefslogtreecommitdiff
path: root/static/freebsd/man3/TS_VERIFY_CTX.3
diff options
context:
space:
mode:
Diffstat (limited to 'static/freebsd/man3/TS_VERIFY_CTX.3')
-rw-r--r--static/freebsd/man3/TS_VERIFY_CTX.3214
1 files changed, 214 insertions, 0 deletions
diff --git a/static/freebsd/man3/TS_VERIFY_CTX.3 b/static/freebsd/man3/TS_VERIFY_CTX.3
new file mode 100644
index 00000000..679dc68a
--- /dev/null
+++ b/static/freebsd/man3/TS_VERIFY_CTX.3
@@ -0,0 +1,214 @@
+.\" -*- mode: troff; coding: utf-8 -*-
+.\" Automatically generated by Pod::Man v6.0.2 (Pod::Simple 3.45)
+.\"
+.\" Standard preamble:
+.\" ========================================================================
+.de Sp \" Vertical space (when we can't use .PP)
+.if t .sp .5v
+.if n .sp
+..
+.de Vb \" Begin verbatim text
+.ft CW
+.nf
+.ne \\$1
+..
+.de Ve \" End verbatim text
+.ft R
+.fi
+..
+.\" \*(C` and \*(C' are quotes in nroff, nothing in troff, for use with C<>.
+.ie n \{\
+. ds C` ""
+. ds C' ""
+'br\}
+.el\{\
+. ds C`
+. ds C'
+'br\}
+.\"
+.\" Escape single quotes in literal strings from groff's Unicode transform.
+.ie \n(.g .ds Aq \(aq
+.el .ds Aq '
+.\"
+.\" If the F register is >0, we'll generate index entries on stderr for
+.\" titles (.TH), headers (.SH), subsections (.SS), items (.Ip), and index
+.\" entries marked with X<> in POD. Of course, you'll have to process the
+.\" output yourself in some meaningful fashion.
+.\"
+.\" Avoid warning from groff about undefined register 'F'.
+.de IX
+..
+.nr rF 0
+.if \n(.g .if rF .nr rF 1
+.if (\n(rF:(\n(.g==0)) \{\
+. if \nF \{\
+. de IX
+. tm Index:\\$1\t\\n%\t"\\$2"
+..
+. if !\nF==2 \{\
+. nr % 0
+. nr F 2
+. \}
+. \}
+.\}
+.rr rF
+.\"
+.\" Required to disable full justification in groff 1.23.0.
+.if n .ds AD l
+.\" ========================================================================
+.\"
+.IX Title "TS_VERIFY_CTX 3ossl"
+.TH TS_VERIFY_CTX 3ossl 2026-04-07 3.5.6 OpenSSL
+.\" For nroff, turn off justification. Always turn off hyphenation; it makes
+.\" way too many mistakes in technical documents.
+.if n .ad l
+.nh
+.SH NAME
+TS_VERIFY_CTX, TS_VERIFY_CTX_new, TS_VERIFY_CTX_init, TS_VERIFY_CTX_free,
+TS_VERIFY_CTX_cleanup, TS_VERIFY_CTX_set_flags, TS_VERIFY_CTX_add_flags,
+TS_VERIFY_CTX_set0_data, TS_VERIFY_CTX_set0_imprint, TS_VERIFY_CTX_set0_store,
+TS_VERIFY_CTX_set0_certs, TS_VERIFY_CTX_set_certs, TS_VERIFY_CTS_set_certs,
+TS_VERIFY_CTX_set_data, TS_VERIFY_CTX_set_imprint, TS_VERIFY_CTX_set_store
+\&\- manage the TS response verification context
+.SH SYNOPSIS
+.IX Header "SYNOPSIS"
+.Vb 1
+\& #include <openssl/ts.h>
+\&
+\& typedef struct TS_verify_ctx TS_VERIFY_CTX;
+\&
+\& TS_VERIFY_CTX *TS_VERIFY_CTX_new(void);
+\& void TS_VERIFY_CTX_init(TS_VERIFY_CTX *ctx);
+\& void TS_VERIFY_CTX_free(TS_VERIFY_CTX *ctx);
+\& void TS_VERIFY_CTX_cleanup(TS_VERIFY_CTX *ctx);
+\& int TS_VERIFY_CTX_set_flags(TS_VERIFY_CTX *ctx, int f);
+\& int TS_VERIFY_CTX_add_flags(TS_VERIFY_CTX *ctx, int f);
+\& int TS_VERIFY_CTX_set0_data(TS_VERIFY_CTX *ctx, BIO *b);
+\& int TS_VERIFY_CTX_set0_imprint(TS_VERIFY_CTX *ctx,
+\& unsigned char *hexstr, long len);
+\& int TS_VERIFY_CTX_set0_store(TS_VERIFY_CTX *ctx, X509_STORE *s);
+\& int TS_VERIFY_CTX_set0_certs(TS_VERIFY_CTX *ctx, STACK_OF(X509) *certs);
+.Ve
+.PP
+The following functions have been deprecated since OpenSSL 3.4:
+.PP
+.Vb 6
+\& BIO *TS_VERIFY_CTX_set_data(TS_VERIFY_CTX *ctx, BIO *b);
+\& unsigned char *TS_VERIFY_CTX_set_imprint(TS_VERIFY_CTX *ctx,
+\& unsigned char *hexstr, long len);
+\& X509_STORE *TS_VERIFY_CTX_set_store(TS_VERIFY_CTX *ctx, X509_STORE *s);
+\& STACK_OF(X509) *TS_VERIFY_CTX_set_certs(TS_VERIFY_CTX *ctx,
+\& STACK_OF(X509) *certs);
+.Ve
+.PP
+The following function has been deprecated since OpenSSL 3.0:
+.PP
+.Vb 2
+\& STACK_OF(X509) *TS_VERIFY_CTS_set_certs(TS_VERIFY_CTX *ctx,
+\& STACK_OF(X509) *certs);
+.Ve
+.SH DESCRIPTION
+.IX Header "DESCRIPTION"
+The Time\-Stamp Protocol (TSP) is defined by RFC 3161. TSP is a protocol used to
+provide long\-term proof of the existence of certain data before a particular
+time. TSP defines a Time Stamping Authority (TSA) and an entity that makes
+requests to the TSA. Usually, the TSA is referred to as the server side, and the
+requesting entity is referred to as the client.
+.PP
+In TSP, when a server sends a response to a client, the server normally
+needs to sign the response data \- the TimeStampToken (TST) \- with its private
+key. Then the client verifies the received TST using the server\*(Aqs certificate
+chain.
+.PP
+For all the following methods, unless noted otherwise, \fIctx\fR is the
+verification context created in advance.
+.PP
+\&\fBTS_VERIFY_CTX_new()\fR returns an allocated \fBTS_VERIFY_CTX\fR structure.
+.PP
+\&\fBTS_VERIFY_CTX_init()\fR initializes a verification context.
+.PP
+\&\fBTS_VERIFY_CTX_free()\fR frees up a \fBTS_VERIFY_CTX\fR object. \fIctx\fR is the
+verification context to be freed. If \fIctx\fR is NULL, the call is ignored.
+.PP
+\&\fBTS_VERIFY_CTX_set_flags()\fR sets the flags in the verification context. \fIf\fR are
+the flags to be set.
+.PP
+\&\fBTS_VERIFY_CTX_add_flags()\fR adds flags to the verification context. \fIf\fR are the
+flags to be added (OR\*(Aqd).
+.PP
+\&\fBTS_VERIFY_CTX_set0_data()\fR sets the data to be verified. \fIb\fR is the \fBBIO\fR with
+the data. A previously assigned \fBBIO\fR is freed.
+.PP
+\&\fBTS_VERIFY_CTX_set0_imprint()\fR sets the message imprint. \fIhexstr\fR is the
+message imprint to be assigned. A previously assigned imprint is freed.
+.PP
+\&\fBTS_VERIFY_CTX_set0_store()\fR sets the store for the verification context. \fIs\fR is
+the store to be assigned. A previously assigned store is freed.
+.PP
+\&\fBTS_VERIFY_CTX_set0_certs()\fR is used to set the server\*(Aqs certificate chain when
+verifying a TST. \fIcerts\fR is a stack of \fBX509\fR certificates.
+.PP
+\&\fBTS_VERIFY_CTX_cleanup()\fR frees all data associated with the given
+\&\fBTS_VERIFY_CTX\fR object and initializes it. \fIctx\fR is the verification context
+created in advance. If \fIctx\fR is NULL, the call is ignored.
+.PP
+All of the following functions described are deprecated. Applications should
+instead use the functions \fBTS_VERIFY_CTX_set0_data\fR\|(3),
+\&\fBTS_VERIFY_CTX_set0_imprint\fR\|(3), \fBTS_VERIFY_CTX_set0_store\fR\|(3),
+\&\fBTS_VERIFY_CTX_set0_certs\fR\|(3).
+.PP
+\&\fBTS_VERIFY_CTX_set_data()\fR is used to set the BIO with the data to be verified.
+A previously assigned BIO is \fBnot freed\fR by this call. \fIb\fR is the \fBBIO\fR
+with the data to assign.
+.PP
+\&\fBTS_VERIFY_CTX_set_imprint()\fR is used to set the message imprint. A previously
+assigned imprint \fBis freed\fR by this call. \fIhexstr\fR is the string with the
+message imprint to assign.
+.PP
+\&\fBTS_VERIFY_CTX_set_store()\fR is used to set the certificate store. A previously
+assigned store is \fBnot freed\fR by this call. \fIs\fR is the store to assign.
+.PP
+\&\fBTS_VERIFY_CTX_set_certs()\fR is used to set the server\*(Aqs certificate chain.
+A previously assigned stack is \fBnot freed\fR by this call. \fIcerts\fR is a stack
+of \fBX509\fR certificates.
+.PP
+\&\fBTS_VERIFY_CTS_set_certs()\fR is a misspelled version of \fBTS_VERIFY_CTX_set_certs()\fR
+which takes the same parameters and returns the same result.
+.SH "RETURN VALUES"
+.IX Header "RETURN VALUES"
+\&\fBTS_VERIFY_CTX_new()\fR returns an allocated \fBTS_VERIFY_CTX\fR structure.
+.PP
+\&\fBTS_VERIFY_CTX_set_flags()\fR returns the flags passed via parameter \fIf\fR.
+.PP
+\&\fBTS_VERIFY_CTX_add_flags()\fR returns the flags of the context after the ones
+passed via parameter \fIf\fR are added to it.
+.PP
+\&\fBTS_VERIFY_CTX_set0_data()\fR, \fBTS_VERIFY_CTX_set0_imprint()\fR,
+\&\fBTS_VERIFY_CTX_set0_store()\fR, and \fBTS_VERIFY_CTX_set0_certs()\fR return 1 if the
+value could be successfully set and 0 in case of any error.
+.PP
+The deprecated functions \fBTS_VERIFY_CTX_set_data()\fR, \fBTS_VERIFY_CTX_set_imprint()\fR,
+\&\fBTS_VERIFY_CTX_set_store()\fR, \fBTS_VERIFY_CTX_set_certs()\fR return the parameter
+the user passes via parameter \fIbio\fR, \fIhexstr\fR, \fIs\fR or \fIcerts\fR.
+.SH "SEE ALSO"
+.IX Header "SEE ALSO"
+\&\fBOSSL_ESS_check_signing_certs\fR\|(3)
+.SH HISTORY
+.IX Header "HISTORY"
+\&\fBTS_VERIFY_CTX_set0_data()\fR, \fBTS_VERIFY_CTX_set0_imprint()\fR,
+\&\fBTS_VERIFY_CTX_set0_store()\fR, \fBTS_VERIFY_CTX_set0_certs()\fR replace the functions
+\&\fBTS_VERIFY_CTX_set_data()\fR, \fBTS_VERIFY_CTX_set_imprint()\fR,
+\&\fBTS_VERIFY_CTX_set_store()\fR, \fBTS_VERIFY_CTX_set_certs()\fR that were deprecated
+in OpenSSL 3.4.0.
+.PP
+The spelling of \fBTS_VERIFY_CTX_set_certs()\fR was corrected in OpenSSL 3.0.0.
+The misspelled version \fBTS_VERIFY_CTS_set_certs()\fR has been retained for
+compatibility reasons, but it is deprecated in OpenSSL 3.0.0.
+.SH COPYRIGHT
+.IX Header "COPYRIGHT"
+Copyright 2019\-2024 The OpenSSL Project Authors. All Rights Reserved.
+.PP
+Licensed under the Apache License 2.0 (the "License"). You may not use
+this file except in compliance with the License. You can obtain a copy
+in the file LICENSE in the source distribution or at
+<https://www.openssl.org/source/license.html>.