/third_party/openssl/test/recipes/80-test_cmp_http_data/ |
D | test_enrollment.csv | 1 expected,description, -section,val, -cmd,val, -newkey,val,val, -newkeypass,val, -subject,val, -issu… 4 1,newkey, -section,, -cmd,ir, -newkey,new.key,, -newkeypass,pass:,,,BLANK,,BLANK,,BLANK,,BLANK,,BLA… 5 0,newkey missing arg, -section,, -cmd,ir, -newkey,,, -newkeypass,pass:,,,BLANK,,BLANK,,BLANK,,BLANK… 6 0,newkey is directory, -section,, -cmd,ir, -newkey,dir/,, -newkeypass,pass:,,,BLANK,,BLANK,,BLANK,,… 7 0,newkey too many parameters, -section,, -cmd,ir, -newkey,abc,def, -newkeypass,pass:,,,BLANK,,BLANK… 8 0,newkey is an RSA key, -section,, -cmd,ir, -newkey,test.RSA2048.pem,, -newkeypass,pass:,,,BLANK,,B… 10 1,newkeypass, -section,, -cmd,ir, -newkey,new_pass_12345.key,, -newkeypass,pass:12345,,,BLANK,,BLAN… 11 1,read newkeypass from file, -section,, -cmd,ir, -newkey,new_pass_12345.key,, -newkeypass,file:1234… 12 1,newkeypass no prefix, -section,, -cmd,ir, -newkey,new_pass_12345.key,, -newkeypass,12345,,,BLANK,… 13 0,no newkeypass, -section,, -cmd,ir, -newkey,new_pass_12345.key,,BLANK,,,,BLANK,,BLANK,,BLANK,,BLAN… [all …]
|
/third_party/openssl/test/smime-certs/ |
D | mksmime-certs.sh | 18 -keyout smroot.pem -out smroot.pem -newkey rsa:2048 -days 36501 22 -keyout smrsa1.pem -out req.pem -newkey rsa:2048 28 -keyout smrsa2.pem -out req.pem -newkey rsa:2048 33 -keyout smrsa3.pem -out req.pem -newkey rsa:2048 42 -keyout smdsa1.pem -out req.pem -newkey dsa:dsap.pem 46 -keyout smdsa2.pem -out req.pem -newkey dsa:dsap.pem 50 -keyout smdsa3.pem -out req.pem -newkey dsa:dsap.pem 60 -keyout smec1.pem -out req.pem -newkey ec:ecp.pem 64 -keyout smec2.pem -out req.pem -newkey ec:ecp2.pem 79 -keyout smtmp.pem -out req.pem -newkey rsa:2048
|
/third_party/python/Lib/idlelib/ |
D | filelist.py | 85 newkey = os.path.normcase(filename) 86 if newkey == key: 88 if newkey in self.dict: 89 conflict = self.dict[newkey] 95 self.dict[newkey] = edit 96 self.inversedict[edit] = newkey
|
/third_party/openssl/test/ |
D | cmp_msg_test.c | 66 static EVP_PKEY *newkey = NULL; variable 154 || !TEST_true(set1_newPkey(ctx, newkey)) in test_cmp_create_ir_protection_set() 170 if (!TEST_true(OSSL_CMP_CTX_set1_pkey(fixture->cmp_ctx, newkey)) in test_cmp_create_ir_protection_fails() 197 if (!TEST_true(set1_newPkey(fixture->cmp_ctx, newkey))) { in test_cmp_create_cr() 211 if (!TEST_true(set1_newPkey(fixture->cmp_ctx, newkey))) { in test_cmp_create_certreq_with_invalid_bodytype() 230 || !TEST_true(set1_newPkey(ctx, newkey)) in test_cmp_create_p10cr() 246 if (!TEST_true(set1_newPkey(fixture->cmp_ctx, newkey))) { in test_cmp_create_p10cr_null() 260 if (!TEST_true(set1_newPkey(fixture->cmp_ctx, newkey)) in test_cmp_create_kur() 275 if (!TEST_true(set1_newPkey(fixture->cmp_ctx, newkey))) { in test_cmp_create_kur_without_oldcert() 333 if (!TEST_true(set1_newPkey(fixture->cmp_ctx, newkey))) { in test_cmp_create_error_msg() [all …]
|
/third_party/openssl/demos/certs/ |
D | mkcerts.sh | 9 -keyout root.pem -out root.pem -newkey rsa:2048 -days 3650 12 -keyout intkey.pem -out intreq.pem -newkey rsa:2048 19 -keyout skey.pem -out req.pem -newkey rsa:1024 26 -keyout ckey.pem -out creq.pem -newkey rsa:1024 33 -keyout revkey.pem -out rreq.pem -newkey rsa:1024 40 -keyout respkey.pem -out respreq.pem -newkey rsa:1024
|
/third_party/openssl/test/recipes/80-test_cmp_http_data/Mock/ |
D | test.cnf | 5 newkey = new.key 32 newkey = signer.key 95 newkey =
|
/third_party/openssl/demos/certs/apps/ |
D | mkxcerts.sh | 23 -nodes -keyout tecp256.pem -out tecp256.pem -newkey ec:ecp256.pem \ 28 -nodes -keyout tecp384.pem -out tecp384.pem -newkey ec:ecp384.pem \
|
/third_party/selinux/libsepol/src/ |
D | expand.c | 3293 avtab_key_t newkey; in expand_avtab_node() local 3296 newkey.target_class = k->target_class; in expand_avtab_node() 3297 newkey.specified = k->specified; in expand_avtab_node() 3306 newkey.source_type = k->source_type; in expand_avtab_node() 3308 newkey.target_type = j + 1; in expand_avtab_node() 3309 rc = expand_avtab_insert(expa, &newkey, d); in expand_avtab_node() 3318 newkey.target_type = k->target_type; in expand_avtab_node() 3320 newkey.source_type = i + 1; in expand_avtab_node() 3321 rc = expand_avtab_insert(expa, &newkey, d); in expand_avtab_node() 3331 newkey.source_type = i + 1; in expand_avtab_node() [all …]
|
/third_party/libwebsockets/lib/tls/ |
D | CMakeLists.txt | 434 …message("cmd = \"${OPENSSL_EXECUTABLE}\" req -new -newkey rsa:2048 -days 10000 -nodes -x509 -subj … 436 …COMMAND "${OPENSSL_EXECUTABLE}" req -new -newkey rsa:2048 -days 10000 -nodes -x509 -subj "/C=GB/ST… 451 …message("cmd = \"${OPENSSL_EXECUTABLE}\" req -new -newkey rsa:2048 -days 10000 -nodes -x509 -keyou… 456 …COMMAND "${OPENSSL_EXECUTABLE}" req -config ${OPENSSL_CONFIG_FILE} -new -newkey rsa:2048 -days 100… 462 …COMMAND "${OPENSSL_EXECUTABLE}" req -new -newkey rsa:2048 -days 10000 -nodes -x509 -keyout "${TEST… 479 …req -new -newkey rsa:2048 -days 10000 -nodes -x509 -subj "/O=lws/CN=localhost" -keyout "${TEST_SER… 490 …req -new -newkey rsa:2048 -days 10000 -nodes -x509 -keyout "${TEST_SERVER_SSL_KEY}" -out "${TEST_S…
|
/third_party/openssl/doc/man1/ |
D | openssl-req.pod.in | 24 [B<-newkey> I<arg>] 85 (B<-new> or B<-newkey> or B<-precert>) are not specified. 155 the B<-newkey> and B<-pkeyopt> options, 158 =item B<-newkey> I<arg> 169 If I<nbits> is omitted, i.e., B<-newkey> B<rsa> is specified, 173 All other algorithms support the B<-newkey> I<algname>:I<file> form, where 430 the B<-newkey> option. The smallest accepted key size is 512 bits. If 593 openssl req -newkey rsa:2048 -keyout key.pem -out req.pem 597 openssl req -x509 -newkey rsa:2048 -keyout key.pem -out req.pem 686 -newkey rsa:2048 -keyout key.pem -out req.pem
|
D | openssl-cmp.pod.in | 24 [B<-newkey> I<filename>|I<uri>] 249 =item B<-newkey> I<filename>|I<uri> 259 Pass phrase source for the key given with the B<-newkey> option. 351 is provided via the B<-newkey> or B<-key> options. 359 while its public key is ignored if I<-newkey> is given. 774 This applies to all options specifying keys: B<-key>, B<-newkey>, and 1154 -newkey cl_key.pem -subject "/CN=MyName" \ 1169 -newkey cl_key_new.pem -certout cl_cert.pem 1200 newkey = cl_key.pem 1216 openssl cmp -cmd kur -newkey cl_key_new.pem
|
D | CA.pl.pod | 67 F<newkey.pem> and the request written to the file F<newreq.pem>. 73 F<newkey.pem> and the request written to the file F<newreq.pem>.
|
/third_party/libwebsockets/minimal-examples/http-server/minimal-http-server-tls/ |
D | README.md | 35 …libwebsockets-test\n\nlocalhost\nnone@invalid.org\n" | openssl req -new -newkey rsa:4096 -days 365…
|
/third_party/libwebsockets/minimal-examples/http-server/minimal-http-server-tls-mem/ |
D | README.md | 44 …libwebsockets-test\n\nlocalhost\nnone@invalid.org\n" | openssl req -new -newkey rsa:4096 -days 365…
|
/third_party/libwebsockets/minimal-examples/http-server/minimal-http-server-tls-80/ |
D | README.md | 54 …libwebsockets-test\n\nlocalhost\nnone@invalid.org\n" | openssl req -new -newkey rsa:4096 -days 365…
|
/third_party/ltp/testcases/commands/tpm-tools/tpmtoken/tpmtoken_import/ |
D | tpmtoken_import_tests.sh | 79 -newkey rsa:2048 -keyout $TPM_KEYFILE \
|
/third_party/openssl/apps/ |
D | openssl.cnf | 358 newkey = insta.priv.pem 373 key = $insta::newkey # insta.priv.pem
|
D | openssl-vms.cnf | 358 newkey = insta.priv.pem 373 key = $insta::newkey # insta.priv.pem
|
/third_party/selinux/libsepol/cil/src/ |
D | cil_binary.c | 3255 range_trans_t *newkey = NULL; in cil_rangetransition_to_policydb() local 3283 newkey = cil_calloc(1, sizeof(*newkey)); in cil_rangetransition_to_policydb() 3285 newkey->source_type = sepol_src->s.value; in cil_rangetransition_to_policydb() 3286 newkey->target_type = sepol_tgt->s.value; in cil_rangetransition_to_policydb() 3287 newkey->target_class = sepol_class->s.value; in cil_rangetransition_to_policydb() 3290 free(newkey); in cil_rangetransition_to_policydb() 3295 rc = hashtab_insert(pdb->range_tr, (hashtab_key_t)newkey, newdatum); in cil_rangetransition_to_policydb() 3298 o_range = hashtab_search(pdb->range_tr, (hashtab_key_t)newkey); in cil_rangetransition_to_policydb() 3318 free(newkey); in cil_rangetransition_to_policydb()
|
/third_party/python/Doc/library/ |
D | unittest.mock.rst | 141 >>> with patch.dict(foo, {'newkey': 'newvalue'}, clear=True): 142 ... assert foo == {'newkey': 'newvalue'} 1604 >>> @patch.dict(foo, {'newkey': 'newvalue'}) 1606 ... assert foo == {'newkey': 'newvalue'} 1616 >>> @patch.dict('os.environ', {'newkey': 'newvalue'}) 1619 ... self.assertEqual(os.environ['newkey'], 'newvalue') 1630 >>> with patch.dict(foo, {'newkey': 'newvalue'}) as patched_foo: 1631 ... assert foo == {'newkey': 'newvalue'} 1632 ... assert patched_foo == {'newkey': 'newvalue'} 1640 >>> with patch.dict('os.environ', {'newkey': 'newvalue'}): [all …]
|
D | unittest.mock-examples.rst | 469 >>> with patch.dict(foo, {'newkey': 'newvalue'}, clear=True): 470 ... assert foo == {'newkey': 'newvalue'}
|
/third_party/python/Modules/ |
D | itertoolsmodule.c | 262 PyObject *newvalue, *newkey, *oldvalue; in groupby_step() local 269 newkey = newvalue; in groupby_step() 272 newkey = PyObject_CallOneArg(gbo->keyfunc, newvalue); in groupby_step() 273 if (newkey == NULL) { in groupby_step() 281 Py_XSETREF(gbo->currkey, newkey); in groupby_step()
|
/third_party/fsverity-utils/ |
D | README.md | 146 openssl req -newkey rsa:4096 -nodes -keyout key.pem -x509 -out cert.pem
|
/third_party/openssl/test/certs/ |
D | setup.sh | 411 -newkey rsa-pss -keyout server-pss-restrict-key.pem \
|
/third_party/ntfs-3g/libntfs-3g/ |
D | security.c | 633 u32 newkey; in entersecurityattr() local 761 newkey = le32_to_cpu(keyid) + 1; in entersecurityattr() 762 securid = cpu_to_le32(newkey); in entersecurityattr()
|