/third_party/openssl/test/smime-certs/ |
D | mksmime-certs.sh | 18 -keyout smroot.pem -out smroot.pem -newkey rsa:2048 -days 3650 22 -keyout smrsa1.pem -out req.pem -newkey rsa:2048 28 -keyout smrsa2.pem -out req.pem -newkey rsa:2048 33 -keyout smrsa3.pem -out req.pem -newkey rsa:2048 42 -keyout smdsa1.pem -out req.pem -newkey dsa:dsap.pem 46 -keyout smdsa2.pem -out req.pem -newkey dsa:dsap.pem 50 -keyout smdsa3.pem -out req.pem -newkey dsa:dsap.pem 60 -keyout smec1.pem -out req.pem -newkey ec:ecp.pem 64 -keyout smec2.pem -out req.pem -newkey ec:ecp2.pem 68 -keyout smec3.pem -out req.pem -newkey ec:ecp.pem [all …]
|
/third_party/python/Lib/idlelib/ |
D | filelist.py | 85 newkey = os.path.normcase(filename) 86 if newkey == key: 88 if newkey in self.dict: 89 conflict = self.dict[newkey] 95 self.dict[newkey] = edit 96 self.inversedict[edit] = newkey
|
/third_party/glib/glib/tests/ |
D | cache.c | 50 gint *newkey; in key_dup() local 52 newkey = g_new (gint, 1); in key_dup() 53 *newkey = *(gint*)key; in key_dup() 55 return newkey; in key_dup()
|
/third_party/openssl/demos/certs/ |
D | mkcerts.sh | 9 -keyout root.pem -out root.pem -newkey rsa:2048 -days 3650 12 -keyout intkey.pem -out intreq.pem -newkey rsa:2048 19 -keyout skey.pem -out req.pem -newkey rsa:1024 26 -keyout ckey.pem -out creq.pem -newkey rsa:1024 33 -keyout revkey.pem -out rreq.pem -newkey rsa:1024 40 -keyout respkey.pem -out respreq.pem -newkey rsa:1024
|
/third_party/mindspore/tests/st/fl/cross_silo_faster_rcnn/ |
D | test_fl_fasterrcnn.py | 168 newkey = 'backbone.' + oldkey 169 param_dict[newkey] = data 170 oldkey = newkey 173 newkey = oldkey.replace(k, v) 174 param_dict[newkey] = param_dict.pop(oldkey)
|
/third_party/openssl/demos/certs/apps/ |
D | mkxcerts.sh | 23 -nodes -keyout tecp256.pem -out tecp256.pem -newkey ec:ecp256.pem \ 28 -nodes -keyout tecp384.pem -out tecp384.pem -newkey ec:ecp384.pem \
|
/third_party/openssl/apps/ |
D | req.c | 243 long newkey = -1; in req_main() local 575 if (!NCONF_get_number(req_conf, SECTION, BITS, &newkey)) { in req_main() 576 newkey = DEFAULT_KEY_LENGTH; in req_main() 580 genctx = set_keygen_ctx(keyalg, &pkey_type, &newkey, in req_main() 586 if (newkey < MIN_KEY_LENGTH in req_main() 590 MIN_KEY_LENGTH, newkey); in req_main() 594 if (pkey_type == EVP_PKEY_RSA && newkey > OPENSSL_RSA_MAX_MODULUS_BITS) in req_main() 598 OPENSSL_RSA_MAX_MODULUS_BITS, newkey); in req_main() 601 if (pkey_type == EVP_PKEY_DSA && newkey > OPENSSL_DSA_MAX_MODULUS_BITS) in req_main() 605 OPENSSL_DSA_MAX_MODULUS_BITS, newkey); in req_main() [all …]
|
/third_party/selinux/libsepol/src/ |
D | expand.c | 3267 avtab_key_t newkey; in expand_avtab_node() local 3270 newkey.target_class = k->target_class; in expand_avtab_node() 3271 newkey.specified = k->specified; in expand_avtab_node() 3280 newkey.source_type = k->source_type; in expand_avtab_node() 3282 newkey.target_type = j + 1; in expand_avtab_node() 3283 rc = expand_avtab_insert(expa, &newkey, d); in expand_avtab_node() 3292 newkey.target_type = k->target_type; in expand_avtab_node() 3294 newkey.source_type = i + 1; in expand_avtab_node() 3295 rc = expand_avtab_insert(expa, &newkey, d); in expand_avtab_node() 3305 newkey.source_type = i + 1; in expand_avtab_node() [all …]
|
/third_party/libwebsockets/lib/tls/ |
D | CMakeLists.txt | 434 …message("cmd = \"${OPENSSL_EXECUTABLE}\" req -new -newkey rsa:2048 -days 10000 -nodes -x509 -subj … 436 …COMMAND "${OPENSSL_EXECUTABLE}" req -new -newkey rsa:2048 -days 10000 -nodes -x509 -subj "/C=GB/ST… 451 …message("cmd = \"${OPENSSL_EXECUTABLE}\" req -new -newkey rsa:2048 -days 10000 -nodes -x509 -keyou… 456 …COMMAND "${OPENSSL_EXECUTABLE}" req -config ${OPENSSL_CONFIG_FILE} -new -newkey rsa:2048 -days 100… 462 …COMMAND "${OPENSSL_EXECUTABLE}" req -new -newkey rsa:2048 -days 10000 -nodes -x509 -keyout "${TEST… 479 …req -new -newkey rsa:2048 -days 10000 -nodes -x509 -subj "/O=lws/CN=localhost" -keyout "${TEST_SER… 490 …req -new -newkey rsa:2048 -days 10000 -nodes -x509 -keyout "${TEST_SERVER_SSL_KEY}" -out "${TEST_S…
|
/third_party/openssl/doc/man1/ |
D | CA.pl.pod | 50 "newkey.pem" and the request written to the file "newreq.pem". 56 "newkey.pem" and the request written to the file "newreq.pem". 161 openssl req -x509 -newkey dsa:dsap.pem -keyout cacert.pem -out cacert.pem 172 openssl req -out newreq.pem -newkey dsa:dsap.pem
|
D | req.pod | 26 [B<-newkey rsa:bits>] 27 [B<-newkey alg:file>] 84 options (B<-new> and B<-newkey>) are not specified. 155 =item B<-newkey arg> 160 in size. If B<nbits> is omitted, i.e. B<-newkey rsa> specified, 163 All other algorithms support the B<-newkey alg:file> form, where file may be 368 the B<-newkey> option. The smallest accepted key size is 512 bits. If 531 openssl req -newkey rsa:2048 -keyout key.pem -out req.pem 535 openssl req -x509 -newkey rsa:2048 -keyout key.pem -out req.pem 617 -newkey rsa:2048 -keyout key.pem -out req.pem
|
/third_party/grpc/src/core/tsi/test_creds/ |
D | README | 9 $ openssl req -x509 -newkey rsa:2048 -keyout badserver.key -out badserver.pem \ 22 $ openssl req -x509 -new -newkey rsa:2048 -nodes -keyout ca.key -out ca.pem \
|
/third_party/libwebsockets/minimal-examples/http-server/minimal-http-server-tls/ |
D | README.md | 35 …libwebsockets-test\n\nlocalhost\nnone@invalid.org\n" | openssl req -new -newkey rsa:4096 -days 365…
|
/third_party/libwebsockets/minimal-examples/http-server/minimal-http-server-tls-mem/ |
D | README.md | 44 …libwebsockets-test\n\nlocalhost\nnone@invalid.org\n" | openssl req -new -newkey rsa:4096 -days 365…
|
/third_party/curl/tests/certs/scripts/ |
D | genserv.sh | 73 …$OPENSSL req -config $PREFIX-sv.prm -newkey rsa:$KEYSIZE -keyout $PREFIX-sv.key -out $PREFIX-sv.cs…
|
/third_party/libwebsockets/minimal-examples/http-server/minimal-http-server-tls-80/ |
D | README.md | 54 …libwebsockets-test\n\nlocalhost\nnone@invalid.org\n" | openssl req -new -newkey rsa:4096 -days 365…
|
/third_party/ltp/testcases/commands/tpm-tools/tpmtoken/tpmtoken_import/ |
D | tpmtoken_import_tests.sh | 79 -newkey rsa:2048 -keyout $TPM_KEYFILE \
|
/third_party/selinux/libsepol/cil/src/ |
D | cil_binary.c | 3167 range_trans_t *newkey = NULL; in cil_rangetransition_to_policydb() local 3195 newkey = cil_calloc(1, sizeof(*newkey)); in cil_rangetransition_to_policydb() 3197 newkey->source_type = sepol_src->s.value; in cil_rangetransition_to_policydb() 3198 newkey->target_type = sepol_tgt->s.value; in cil_rangetransition_to_policydb() 3199 newkey->target_class = sepol_class->s.value; in cil_rangetransition_to_policydb() 3202 free(newkey); in cil_rangetransition_to_policydb() 3207 rc = hashtab_insert(pdb->range_tr, (hashtab_key_t)newkey, newdatum); in cil_rangetransition_to_policydb() 3210 o_range = hashtab_search(pdb->range_tr, (hashtab_key_t)newkey); in cil_rangetransition_to_policydb() 3221 free(newkey); in cil_rangetransition_to_policydb()
|
/third_party/python/Doc/library/ |
D | unittest.mock.rst | 141 >>> with patch.dict(foo, {'newkey': 'newvalue'}, clear=True): 142 ... assert foo == {'newkey': 'newvalue'} 1604 >>> @patch.dict(foo, {'newkey': 'newvalue'}) 1606 ... assert foo == {'newkey': 'newvalue'} 1616 >>> @patch.dict('os.environ', {'newkey': 'newvalue'}) 1619 ... self.assertEqual(os.environ['newkey'], 'newvalue') 1630 >>> with patch.dict(foo, {'newkey': 'newvalue'}) as patched_foo: 1631 ... assert foo == {'newkey': 'newvalue'} 1632 ... assert patched_foo == {'newkey': 'newvalue'} 1640 >>> with patch.dict('os.environ', {'newkey': 'newvalue'}): [all …]
|
D | unittest.mock-examples.rst | 469 >>> with patch.dict(foo, {'newkey': 'newvalue'}, clear=True): 470 ... assert foo == {'newkey': 'newvalue'}
|
/third_party/python/Modules/ |
D | itertoolsmodule.c | 262 PyObject *newvalue, *newkey, *oldvalue; in groupby_step() local 269 newkey = newvalue; in groupby_step() 272 newkey = PyObject_CallOneArg(gbo->keyfunc, newvalue); in groupby_step() 273 if (newkey == NULL) { in groupby_step() 281 Py_XSETREF(gbo->currkey, newkey); in groupby_step()
|
/third_party/openssl/test/certs/ |
D | setup.sh | 399 -newkey rsa-pss -keyout server-pss-restrict-key.pem \
|
/third_party/ntfs-3g/libntfs-3g/ |
D | security.c | 633 u32 newkey; in entersecurityattr() local 761 newkey = le32_to_cpu(keyid) + 1; in entersecurityattr() 762 securid = cpu_to_le32(newkey); in entersecurityattr()
|
/third_party/python/Objects/ |
D | unicodeobject.c | 13821 PyObject *newkey; in unicode_maketrans_impl() local 13829 newkey = PyLong_FromLong(PyUnicode_READ(kind, data, 0)); in unicode_maketrans_impl() 13830 if (!newkey) in unicode_maketrans_impl() 13832 res = PyDict_SetItem(new, newkey, value); in unicode_maketrans_impl() 13833 Py_DECREF(newkey); in unicode_maketrans_impl()
|
/third_party/node/doc/api/ |
D | http2.md | 69 openssl req -x509 -newkey rsa:2048 -nodes -sha256 -subj '/CN=localhost' \
|