Home
last modified time | relevance | path

Searched full:ca (Results 1 – 25 of 4250) sorted by relevance

12345678910>>...170

/external/tpm2-tss/script/ekca/
Dcreate_ca.sh22 mkdir root-ca
23 pushd root-ca
26 touch root-ca.index
27 echo 00 > root-ca.crlnum
28 echo 1000 > root-ca.serial
31 cp "${EKCADIR}/root-ca.cnf" ./
32 export OPENSSL_CONF=./root-ca.cnf
37 openssl req -new -out root-ca.req.pem -passout file:pass.txt
42 openssl ca -selfsign \
43 -in root-ca.req.pem \
[all …]
Dintermed-ca.cnf19 [ ca ]
27 serial = $dir/intermed-ca.serial
28 database = $dir/intermed-ca.index
30 certificate = $dir/intermed-ca.cert.pem
31 private_key = $dir/private/intermed-ca.key.pem
33 crl = $dir/crl/intermed-ca.crl
35 crlnumber = $dir/intermed-ca.crlnum
70 # Intermediate CA request options
73 default_keyfile = private/intermed-ca.key.pem
84 # Intermediate CA Request Extensions
[all …]
Droot-ca.cnf12 [ ca ]
20 serial = $dir/root-ca.serial
21 database = $dir/root-ca.index
23 certificate = $dir/root-ca.cert.pem
24 private_key = $dir/private/root-ca.key.pem
26 crl = $dir/root-ca.crl
28 crlnumber = $dir/root-ca.crlnum
51 # Root CA Request Options
54 default_keyfile = private/root-ca.key.pem
65 # Root CA Request Extensions
[all …]
/external/curl/tests/certs/scripts/
Dgenroot.sh28 if [ ! -f $PREFIX-ca.prm ] ; then
29 echo No configuration file $PREFIX-ca.prm
45 echo "openssl genrsa -out $PREFIX-ca.key $KEYSIZE -passout XXX"
46 openssl genrsa -out $PREFIX-ca.key $KEYSIZE -passout pass:secret
48 echo "openssl req -config $PREFIX-ca.prm -new -key $PREFIX-ca.key -out $PREFIX-ca.csr"
49 $OPENSSL req -config $PREFIX-ca.prm -new -key $PREFIX-ca.key -out $PREFIX-ca.csr -passin pass:secret
51 …ial $SERIAL -extfile $PREFIX-ca.prm -days $DURATION -req -signkey $PREFIX-ca.key -in $PREFIX-ca.cs…
53 …ial $SERIAL -extfile $PREFIX-ca.prm -days $DURATION -req -signkey $PREFIX-ca.key -in $PREFIX-ca.cs…
55 echo "openssl x509 -text -in $PREFIX-$SERIAL-ca.cacert -nameopt multiline > $PREFIX-ca.cacert "
56 $OPENSSL x509 -text -in $PREFIX-$SERIAL-ca.cacert -nameopt multiline > $PREFIX-ca.cacert
[all …]
Dgenserv.sh40 echo No CA prefix
43 if [ ! -f $CAPREFIX-ca.cacert ] ; then
44 echo No CA certificate file $CAPREFIX-ca.caert
47 if [ ! -f $CAPREFIX-ca.key ] ; then
86 …rial $SERIAL -extfile $PREFIX-sv.prm -days $DURATION -CA $CAPREFIX-ca.cacert -CAkey $CAPREFIX-ca.…
88 …rial $SERIAL -extfile $PREFIX-sv.prm -days $DURATION -CA $CAPREFIX-ca.cacert -CAkey $CAPREFIX-ca.…
92 …aname $CAPREFIX -name $PREFIX -inkey $PREFIX-sv.key -in $PREFIX-sv.crt -certfile $CAPREFIX-ca.crt "
94 …-caname $CAPREFIX -name $PREFIX -inkey $PREFIX-sv.key -in $PREFIX-sv.crt -certfile $CAPREFIX-ca.crt
101 touch $CAPREFIX-ca.db
102 echo 01 > $CAPREFIX-ca.cnt
[all …]
/external/python/cpython2/Lib/email/test/data/
Dmsg_43.txt26ca.gov, xxxxxxxxxxxxx@dot.ca.gov, xxxxxxxxxx@dot.ca.gov, xxxxxxxx@dot.ca.gov, xxxxxxxxxx@dot.ca.go…
41 Reporting-MTA: dns; sacspam01.dot.ca.gov
42 Received-From-MTA: smtp; sacspam01.dot.ca.gov ([127.0.0.1])
45 Final-Recipient: rfc822; xxxxxxx@dot.ca.gov
51 Final-Recipient: rfc822; xxxxxxxxxxxxx@dot.ca.gov
57 Final-Recipient: rfc822; xxxxxxxxxx@dot.ca.gov
63 Final-Recipient: rfc822; xxxxxxxx@dot.ca.gov
69 Final-Recipient: rfc822; xxxxxxxxxx@dot.ca.gov
75 Final-Recipient: rfc822; xxxxxx@dot.ca.gov
81 Final-Recipient: rfc822; xxxxxxxxxx@dot.ca.gov
[all …]
/external/python/cpython3/Lib/test/test_email/data/
Dmsg_43.txt26ca.gov, xxxxxxxxxxxxx@dot.ca.gov, xxxxxxxxxx@dot.ca.gov, xxxxxxxx@dot.ca.gov, xxxxxxxxxx@dot.ca.go…
41 Reporting-MTA: dns; sacspam01.dot.ca.gov
42 Received-From-MTA: smtp; sacspam01.dot.ca.gov ([127.0.0.1])
45 Final-Recipient: rfc822; xxxxxxx@dot.ca.gov
51 Final-Recipient: rfc822; xxxxxxxxxxxxx@dot.ca.gov
57 Final-Recipient: rfc822; xxxxxxxxxx@dot.ca.gov
63 Final-Recipient: rfc822; xxxxxxxx@dot.ca.gov
69 Final-Recipient: rfc822; xxxxxxxxxx@dot.ca.gov
75 Final-Recipient: rfc822; xxxxxx@dot.ca.gov
81 Final-Recipient: rfc822; xxxxxxxxxx@dot.ca.gov
[all …]
/external/curl/docs/
DSSLCERTS.md23 This system is about trust. In your local CA certificate store you have certs
38 by using a CA certificate store that the SSL library can use to make sure the
45 If the remote server uses a self-signed certificate, if you don't install a CA
46 cert store, if the server uses a certificate signed by a CA that isn't
56 2. Get a CA certificate that can verify the remote server and use the proper
57 option to point out this CA cert for verification when connecting. For
62 3. Add the CA cert for your server to the existing default CA certificate
63 store. The default CA certificate store can be changed at compile time with
66 --with-ca-bundle=FILE: use the specified file as CA certificate store. CA
69 --with-ca-path=PATH: use the specified path as CA certificate store. CA
[all …]
/external/python/httplib2/script/
Dgenerate-tls19 openssl rsa -in ca.key -check -noout
32 [[ -f ca.key ]] || openssl genrsa -out ca.key $rsa_bits
37 echo "- generate CA" >&2
38 …sl req -batch -new -nodes -x509 -days $days -subj "$subj_prefix/CN=$org-CA" -key ca.key -out ca.pem
39 …openssl req -batch -new -nodes -x509 -days $days -subj "$subj_prefix/CN=$org-CA-unused" -key ca.ke…
43 …openssl x509 -req -in tmp.csr -CA ca.pem -CAkey ca.key -CAcreateserial -out client.crt -days $days…
45 cat client.crt ca.pem client.key >client_chain.pem
49 …openssl x509 -req -in tmp.csr -CA ca.pem -CAkey ca.key -CAcreateserial -out client_encrypted.crt -…
54 …openssl x509 -req -in tmp.csr -CA ca.pem -CAkey ca.key -CAcreateserial -out server.crt -days $days…
56 cat server.crt ca.pem server.key >server_chain.pem
/external/llvm-project/clang/test/SemaCXX/
Derr_typecheck_assign_const_filecheck.cpp58 void test1(A a, const A Ca) { in test1() argument
61 Ca.b.c.d.e.Mnum = 5; in test1()
63 Ca.b.c.d.e.Snum = 5; in test1()
64 Ca.b.c.Md.e.num = 5; in test1()
65 Ca.Mb.Cc.d.e.Mnum = 5; in test1()
66 Ca.Mb.getC().d.e.num = 5; in test1()
67 Ca.getSB().c.d.e.num = 5; in test1()
69 Ca.Cb.Cc.Cd.Ce.Snum = 5; in test1()
75 void test2(A a, const A Ca) { in test2() argument
76 Ca.b.c.d.e.num = 5; in test2()
[all …]
/external/clang/test/SemaCXX/
Derr_typecheck_assign_const_filecheck.cpp58 void test1(A a, const A Ca) { in test1() argument
61 Ca.b.c.d.e.Mnum = 5; in test1()
63 Ca.b.c.d.e.Snum = 5; in test1()
64 Ca.b.c.Md.e.num = 5; in test1()
65 Ca.Mb.Cc.d.e.Mnum = 5; in test1()
66 Ca.Mb.getC().d.e.num = 5; in test1()
67 Ca.getSB().c.d.e.num = 5; in test1()
69 Ca.Cb.Cc.Cd.Ce.Snum = 5; in test1()
75 void test2(A a, const A Ca) { in test2() argument
76 Ca.b.c.d.e.num = 5; in test2()
[all …]
/external/rust/crates/grpcio-sys/grpc/src/core/tsi/test_creds/
DREADME19 The ca is self-signed:
22 $ openssl req -x509 -new -newkey rsa:2048 -nodes -keyout ca.key -out ca.pem \
23 -config ca-openssl.cnf -days 3650 -extensions v3_req
26 client is issued by CA:
36 $ openssl x509 -req -CA ca.pem -CAkey ca.key -CAcreateserial -in client.csr \
39 client1 is issued by CA:
49 $ openssl x509 -req -CA ca.pem -CAkey ca.key -CAcreateserial -in client1.csr \
52 client2 is issued by CA:
62 $ openssl x509 -req -CA ca.pem -CAkey ca.key -CAcreateserial -in client2.csr \
65 server0 is issued by CA:
[all …]
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/asn1/x509/
DBasicConstraints.java17 ASN1Boolean cA = ASN1Boolean.getInstance(false); field in BasicConstraints
56 this.cA = null; in BasicConstraints()
63 this.cA = ASN1Boolean.getInstance(seq.getObjectAt(0)); in BasicConstraints()
67 this.cA = null; in BasicConstraints()
72 if (this.cA != null) in BasicConstraints()
85 boolean cA) in BasicConstraints() argument
87 if (cA) in BasicConstraints()
89 this.cA = ASN1Boolean.getInstance(true); in BasicConstraints()
93 this.cA = null; in BasicConstraints()
99 * create a cA=true object for the given path length constraint.
[all …]
/external/libffi/testsuite/libffi.call/
Dmany_complex.inc56 _Complex T_C_TYPE ca[13];
63 values[i] = &ca[i];
64 ca[i] = i + (-20 - i) * I;
72 cc = many(ca[0], ca[1], ca[2], ca[3], ca[4], ca[5], ca[6], ca[7], ca[8],
73 ca[9], ca[10], ca[11], ca[12]);
/external/libffi/testsuite/libffi.complex/
Dmany_complex.inc56 _Complex T_C_TYPE ca[13];
63 values[i] = &ca[i];
64 ca[i] = i + (-20 - i) * I;
72 cc = many(ca[0], ca[1], ca[2], ca[3], ca[4], ca[5], ca[6], ca[7], ca[8],
73 ca[9], ca[10], ca[11], ca[12]);
/external/bouncycastle/repackaged/bcprov/src/main/java/com/android/org/bouncycastle/asn1/x509/
DBasicConstraints.java21 ASN1Boolean cA = ASN1Boolean.getInstance(false); field in BasicConstraints
60 this.cA = null; in BasicConstraints()
67 this.cA = ASN1Boolean.getInstance(seq.getObjectAt(0)); in BasicConstraints()
71 this.cA = null; in BasicConstraints()
76 if (this.cA != null) in BasicConstraints()
89 boolean cA) in BasicConstraints() argument
91 if (cA) in BasicConstraints()
93 this.cA = ASN1Boolean.getInstance(true); in BasicConstraints()
97 this.cA = null; in BasicConstraints()
103 * create a cA=true object for the given path length constraint.
[all …]
/external/bouncycastle/repackaged_platform/bcprov/src/main/java/com/android/internal/org/bouncycastle/asn1/x509/
DBasicConstraints.java21 ASN1Boolean cA = ASN1Boolean.getInstance(false); field in BasicConstraints
60 this.cA = null; in BasicConstraints()
67 this.cA = ASN1Boolean.getInstance(seq.getObjectAt(0)); in BasicConstraints()
71 this.cA = null; in BasicConstraints()
76 if (this.cA != null) in BasicConstraints()
89 boolean cA) in BasicConstraints() argument
91 if (cA) in BasicConstraints()
93 this.cA = ASN1Boolean.getInstance(true); in BasicConstraints()
97 this.cA = null; in BasicConstraints()
103 * create a cA=true object for the given path length constraint.
[all …]
/external/curl/lib/vtls/
Dbearssl.c73 struct cafile_parser *ca = ctx; in append_dn() local
75 if(ca->err != CURLE_OK || !ca->in_cert) in append_dn()
77 if(sizeof(ca->dn) - ca->dn_len < len) { in append_dn()
78 ca->err = CURLE_FAILED_INIT; in append_dn()
81 memcpy(ca->dn + ca->dn_len, buf, len); in append_dn()
82 ca->dn_len += len; in append_dn()
87 struct cafile_parser *ca = ctx; in x509_push() local
89 if(ca->in_cert) in x509_push()
90 br_x509_decoder_push(&ca->xc, buf, len); in x509_push()
96 struct cafile_parser ca; in load_cafile() local
[all …]
/external/grpc-grpc-java/testing/src/main/resources/certs/
DREADME19 The ca is self-signed:
22 $ openssl req -x509 -new -newkey rsa:1024 -nodes -out ca.pem -config ca-openssl.cnf -days 3650 -ext…
25 client is issued by CA:
36 $ openssl ca -in client.csr -out client.pem -keyfile ca.key -cert ca.pem -verbose -config openssl.c…
39 server0 is issued by CA:
50 $ openssl ca -in server0.csr -out server0.pem -keyfile ca.key -cert ca.pem -verbose -config openssl…
53 server1 is issued by CA with a special config for subject alternative names:
64 $ openssl ca -in server1.csr -out server1.pem -keyfile ca.key -cert ca.pem -verbose -config server1…
71 running the `openssl ca` command.
/external/cldr/tools/java/org/unicode/cldr/json/
DJSON_config.txt14 section=ca-buddhist ; path=//cldr/main/[^/]++/dates/calendars/buddhist/.* ; package=cal-buddhist
15 section=ca-chinese ; path=//cldr/main/[^/]++/dates/calendars/chinese/.* ; package=cal-chinese
16 section=ca-coptic ; path=//cldr/main/[^/]++/dates/calendars/coptic/.* ; package=cal-coptic
17 section=ca-dangi ; path=//cldr/main/[^/]++/dates/calendars/dangi/.* ; package=cal-dangi
18 section=ca-ethiopic ; path=//cldr/main/[^/]++/dates/calendars/ethiopic/.* ; package=cal-ethiopic
19 section=ca-ethiopic-amete-alem ; path=//cldr/main/[^/]++/dates/calendars/ethiopic-amete-alem/.* ; p…
20 section=ca-generic ; path=//cldr/main/[^/]++/dates/calendars/generic/.* ; package=dates
21 section=ca-gregorian ; path=//cldr/main/[^/]++/dates/calendars/gregorian/.* ; package=dates
22 section=ca-hebrew ; path=//cldr/main/[^/]++/dates/calendars/hebrew/.* ; package=cal-hebrew
23 section=ca-indian ; path=//cldr/main/[^/]++/dates/calendars/indian/.* ; package=cal-indian
[all …]
/external/llvm-project/llvm/test/Transforms/LoopDeletion/
Dupdate-scev.ll84 …%ca.3.lcssa = phi i64 [ %ca.2.lcssa, %for.cond8.preheader ], [ %inc11.lcssa, %for.cond.loopexit.lo…
88 %ca.19 = phi i64 [ 0, %for.cond5.preheader.lr.ph ], [ %ca.3.lcssa, %for.cond.loopexit ]
99 …%ca.2.lcssa = phi i64 [ %ca.19, %for.cond5.preheader ], [ %inc.lcssa, %for.cond8.preheader.loopexi…
106 %ca.26 = phi i64 [ %inc, %for.body7 ], [ %ca.19, %for.body7.preheader ]
107 %inc = add nsw i64 %ca.26, 1
108 %arrayidx = getelementptr inbounds double, double* %bx, i64 %ca.26
113 %ca.37 = phi i64 [ %inc11, %for.body10 ], [ %ca.2.lcssa, %for.body10.preheader ]
114 %inc11 = add nsw i64 %ca.37, 1
127 %ca.19.1 = phi i64 [ 0, %for.cond5.preheader.lr.ph.1 ], [ %ca.3.lcssa.1, %for.cond.loopexit.1 ]
134 %ca.26.1 = phi i64 [ %inc.1, %for.body7.1 ], [ %ca.19.1, %for.body7.preheader.1 ]
[all …]
/external/curl/lib/
Dcurl_addrinfo.c84 struct Curl_addrinfo *ca; in Curl_freeaddrinfo() local
86 for(ca = cahead; ca; ca = canext) { in Curl_freeaddrinfo()
87 canext = ca->ai_next; in Curl_freeaddrinfo()
88 free(ca); in Curl_freeaddrinfo()
118 struct Curl_addrinfo *ca; in Curl_getaddrinfo_ex() local
151 ca = malloc(sizeof(struct Curl_addrinfo) + ss_size + namelen); in Curl_getaddrinfo_ex()
152 if(!ca) { in Curl_getaddrinfo_ex()
160 ca->ai_flags = ai->ai_flags; in Curl_getaddrinfo_ex()
161 ca->ai_family = ai->ai_family; in Curl_getaddrinfo_ex()
162 ca->ai_socktype = ai->ai_socktype; in Curl_getaddrinfo_ex()
[all …]
/external/libcxx/test/std/utilities/any/any.nonmembers/any.cast/
Dany_cast_pointer.pass.cpp42 any const& ca = a; in test_cast_is_noexcept() local
43 static_assert(noexcept(any_cast<int>(&ca)), ""); in test_cast_is_noexcept()
52 any const& ca = a; in test_cast_return_type() local
53 static_assert(std::is_same<decltype(any_cast<int>(&ca)), int const*>::value, ""); in test_cast_return_type()
54 static_assert(std::is_same<decltype(any_cast<int const>(&ca)), int const*>::value, ""); in test_cast_return_type()
63 any const* ca = nullptr; in test_cast_nullptr() local
64 assert(nullptr == any_cast<int>(ca)); in test_cast_nullptr()
65 assert(nullptr == any_cast<int const>(ca)); in test_cast_nullptr()
75 any const& ca = a; in test_cast_empty() local
76 assert(nullptr == any_cast<int>(&ca)); in test_cast_empty()
[all …]
/external/llvm-project/libcxx/test/std/utilities/any/any.nonmembers/any.cast/
Dany_cast_pointer.pass.cpp40 any const& ca = a; in test_cast_is_noexcept() local
41 ASSERT_NOEXCEPT(any_cast<int>(&ca)); in test_cast_is_noexcept()
50 any const& ca = a; in test_cast_return_type() local
51 ASSERT_SAME_TYPE(decltype(any_cast<int>(&ca)), int const*); in test_cast_return_type()
52 ASSERT_SAME_TYPE(decltype(any_cast<int const>(&ca)), int const*); in test_cast_return_type()
61 any const* ca = nullptr; in test_cast_nullptr() local
62 assert(nullptr == any_cast<int>(ca)); in test_cast_nullptr()
63 assert(nullptr == any_cast<int const>(ca)); in test_cast_nullptr()
73 any const& ca = a; in test_cast_empty() local
74 assert(nullptr == any_cast<int>(&ca)); in test_cast_empty()
[all …]
/external/wpa_supplicant_8/hs20/server/ca/
Dsetup.sh14 CNR="Hotspot 2.0 Trust Root CA - 99"
28 # -c: Company name, used to generate Subject name CN for Intermediate CA\n
29 # -C: Subject name CN of the Root CA ($CNR)\n
77 echo "---[ Root CA ]----------------------------------------------------------"
102 echo " * Use existing Root CA"
104 echo " * Generate Root CA private key"
105 …out rootCA/private/cakey.pem -out rootCA/careq.pem || fail "Failed to generate Root CA private key"
106 echo " * Sign Root CA certificate"
107ca -config openssl.cnf.tmp -md sha256 -create_serial -out rootCA/cacert.pem -days 10957 -batch -ke…
116 echo "---[ Intermediate CA ]--------------------------------------------------"
[all …]

12345678910>>...170