/external/tpm2-tss/script/ekca/ |
D | create_ca.sh | 22 mkdir root-ca 23 pushd root-ca 26 touch root-ca.index 27 echo 00 > root-ca.crlnum 28 echo 1000 > root-ca.serial 31 cp "${EKCADIR}/root-ca.cnf" ./ 32 export OPENSSL_CONF=./root-ca.cnf 37 openssl req -new -out root-ca.req.pem -passout file:pass.txt 42 openssl ca -selfsign \ 43 -in root-ca.req.pem \ [all …]
|
D | intermed-ca.cnf | 19 [ ca ] 27 serial = $dir/intermed-ca.serial 28 database = $dir/intermed-ca.index 30 certificate = $dir/intermed-ca.cert.pem 31 private_key = $dir/private/intermed-ca.key.pem 33 crl = $dir/crl/intermed-ca.crl 35 crlnumber = $dir/intermed-ca.crlnum 70 # Intermediate CA request options 73 default_keyfile = private/intermed-ca.key.pem 84 # Intermediate CA Request Extensions [all …]
|
D | root-ca.cnf | 12 [ ca ] 20 serial = $dir/root-ca.serial 21 database = $dir/root-ca.index 23 certificate = $dir/root-ca.cert.pem 24 private_key = $dir/private/root-ca.key.pem 26 crl = $dir/root-ca.crl 28 crlnumber = $dir/root-ca.crlnum 51 # Root CA Request Options 54 default_keyfile = private/root-ca.key.pem 65 # Root CA Request Extensions [all …]
|
/external/curl/tests/certs/scripts/ |
D | genroot.sh | 28 if [ ! -f $PREFIX-ca.prm ] ; then 29 echo No configuration file $PREFIX-ca.prm 45 echo "openssl genrsa -out $PREFIX-ca.key $KEYSIZE -passout XXX" 46 openssl genrsa -out $PREFIX-ca.key $KEYSIZE -passout pass:secret 48 echo "openssl req -config $PREFIX-ca.prm -new -key $PREFIX-ca.key -out $PREFIX-ca.csr" 49 $OPENSSL req -config $PREFIX-ca.prm -new -key $PREFIX-ca.key -out $PREFIX-ca.csr -passin pass:secret 51 …ial $SERIAL -extfile $PREFIX-ca.prm -days $DURATION -req -signkey $PREFIX-ca.key -in $PREFIX-ca.cs… 53 …ial $SERIAL -extfile $PREFIX-ca.prm -days $DURATION -req -signkey $PREFIX-ca.key -in $PREFIX-ca.cs… 55 echo "openssl x509 -text -in $PREFIX-$SERIAL-ca.cacert -nameopt multiline > $PREFIX-ca.cacert " 56 $OPENSSL x509 -text -in $PREFIX-$SERIAL-ca.cacert -nameopt multiline > $PREFIX-ca.cacert [all …]
|
D | genserv.sh | 40 echo No CA prefix 43 if [ ! -f $CAPREFIX-ca.cacert ] ; then 44 echo No CA certificate file $CAPREFIX-ca.caert 47 if [ ! -f $CAPREFIX-ca.key ] ; then 86 …rial $SERIAL -extfile $PREFIX-sv.prm -days $DURATION -CA $CAPREFIX-ca.cacert -CAkey $CAPREFIX-ca.… 88 …rial $SERIAL -extfile $PREFIX-sv.prm -days $DURATION -CA $CAPREFIX-ca.cacert -CAkey $CAPREFIX-ca.… 92 …aname $CAPREFIX -name $PREFIX -inkey $PREFIX-sv.key -in $PREFIX-sv.crt -certfile $CAPREFIX-ca.crt " 94 …-caname $CAPREFIX -name $PREFIX -inkey $PREFIX-sv.key -in $PREFIX-sv.crt -certfile $CAPREFIX-ca.crt 101 touch $CAPREFIX-ca.db 102 echo 01 > $CAPREFIX-ca.cnt [all …]
|
/external/python/cpython2/Lib/email/test/data/ |
D | msg_43.txt | 26 …ca.gov, xxxxxxxxxxxxx@dot.ca.gov, xxxxxxxxxx@dot.ca.gov, xxxxxxxx@dot.ca.gov, xxxxxxxxxx@dot.ca.go… 41 Reporting-MTA: dns; sacspam01.dot.ca.gov 42 Received-From-MTA: smtp; sacspam01.dot.ca.gov ([127.0.0.1]) 45 Final-Recipient: rfc822; xxxxxxx@dot.ca.gov 51 Final-Recipient: rfc822; xxxxxxxxxxxxx@dot.ca.gov 57 Final-Recipient: rfc822; xxxxxxxxxx@dot.ca.gov 63 Final-Recipient: rfc822; xxxxxxxx@dot.ca.gov 69 Final-Recipient: rfc822; xxxxxxxxxx@dot.ca.gov 75 Final-Recipient: rfc822; xxxxxx@dot.ca.gov 81 Final-Recipient: rfc822; xxxxxxxxxx@dot.ca.gov [all …]
|
/external/python/cpython3/Lib/test/test_email/data/ |
D | msg_43.txt | 26 …ca.gov, xxxxxxxxxxxxx@dot.ca.gov, xxxxxxxxxx@dot.ca.gov, xxxxxxxx@dot.ca.gov, xxxxxxxxxx@dot.ca.go… 41 Reporting-MTA: dns; sacspam01.dot.ca.gov 42 Received-From-MTA: smtp; sacspam01.dot.ca.gov ([127.0.0.1]) 45 Final-Recipient: rfc822; xxxxxxx@dot.ca.gov 51 Final-Recipient: rfc822; xxxxxxxxxxxxx@dot.ca.gov 57 Final-Recipient: rfc822; xxxxxxxxxx@dot.ca.gov 63 Final-Recipient: rfc822; xxxxxxxx@dot.ca.gov 69 Final-Recipient: rfc822; xxxxxxxxxx@dot.ca.gov 75 Final-Recipient: rfc822; xxxxxx@dot.ca.gov 81 Final-Recipient: rfc822; xxxxxxxxxx@dot.ca.gov [all …]
|
/external/curl/docs/ |
D | SSLCERTS.md | 23 This system is about trust. In your local CA certificate store you have certs 38 by using a CA certificate store that the SSL library can use to make sure the 45 If the remote server uses a self-signed certificate, if you don't install a CA 46 cert store, if the server uses a certificate signed by a CA that isn't 56 2. Get a CA certificate that can verify the remote server and use the proper 57 option to point out this CA cert for verification when connecting. For 62 3. Add the CA cert for your server to the existing default CA certificate 63 store. The default CA certificate store can be changed at compile time with 66 --with-ca-bundle=FILE: use the specified file as CA certificate store. CA 69 --with-ca-path=PATH: use the specified path as CA certificate store. CA [all …]
|
/external/python/httplib2/script/ |
D | generate-tls | 19 openssl rsa -in ca.key -check -noout 32 [[ -f ca.key ]] || openssl genrsa -out ca.key $rsa_bits 37 echo "- generate CA" >&2 38 …sl req -batch -new -nodes -x509 -days $days -subj "$subj_prefix/CN=$org-CA" -key ca.key -out ca.pem 39 …openssl req -batch -new -nodes -x509 -days $days -subj "$subj_prefix/CN=$org-CA-unused" -key ca.ke… 43 …openssl x509 -req -in tmp.csr -CA ca.pem -CAkey ca.key -CAcreateserial -out client.crt -days $days… 45 cat client.crt ca.pem client.key >client_chain.pem 49 …openssl x509 -req -in tmp.csr -CA ca.pem -CAkey ca.key -CAcreateserial -out client_encrypted.crt -… 54 …openssl x509 -req -in tmp.csr -CA ca.pem -CAkey ca.key -CAcreateserial -out server.crt -days $days… 56 cat server.crt ca.pem server.key >server_chain.pem
|
/external/llvm-project/clang/test/SemaCXX/ |
D | err_typecheck_assign_const_filecheck.cpp | 58 void test1(A a, const A Ca) { in test1() argument 61 Ca.b.c.d.e.Mnum = 5; in test1() 63 Ca.b.c.d.e.Snum = 5; in test1() 64 Ca.b.c.Md.e.num = 5; in test1() 65 Ca.Mb.Cc.d.e.Mnum = 5; in test1() 66 Ca.Mb.getC().d.e.num = 5; in test1() 67 Ca.getSB().c.d.e.num = 5; in test1() 69 Ca.Cb.Cc.Cd.Ce.Snum = 5; in test1() 75 void test2(A a, const A Ca) { in test2() argument 76 Ca.b.c.d.e.num = 5; in test2() [all …]
|
/external/clang/test/SemaCXX/ |
D | err_typecheck_assign_const_filecheck.cpp | 58 void test1(A a, const A Ca) { in test1() argument 61 Ca.b.c.d.e.Mnum = 5; in test1() 63 Ca.b.c.d.e.Snum = 5; in test1() 64 Ca.b.c.Md.e.num = 5; in test1() 65 Ca.Mb.Cc.d.e.Mnum = 5; in test1() 66 Ca.Mb.getC().d.e.num = 5; in test1() 67 Ca.getSB().c.d.e.num = 5; in test1() 69 Ca.Cb.Cc.Cd.Ce.Snum = 5; in test1() 75 void test2(A a, const A Ca) { in test2() argument 76 Ca.b.c.d.e.num = 5; in test2() [all …]
|
/external/rust/crates/grpcio-sys/grpc/src/core/tsi/test_creds/ |
D | README | 19 The ca is self-signed: 22 $ openssl req -x509 -new -newkey rsa:2048 -nodes -keyout ca.key -out ca.pem \ 23 -config ca-openssl.cnf -days 3650 -extensions v3_req 26 client is issued by CA: 36 $ openssl x509 -req -CA ca.pem -CAkey ca.key -CAcreateserial -in client.csr \ 39 client1 is issued by CA: 49 $ openssl x509 -req -CA ca.pem -CAkey ca.key -CAcreateserial -in client1.csr \ 52 client2 is issued by CA: 62 $ openssl x509 -req -CA ca.pem -CAkey ca.key -CAcreateserial -in client2.csr \ 65 server0 is issued by CA: [all …]
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/asn1/x509/ |
D | BasicConstraints.java | 17 ASN1Boolean cA = ASN1Boolean.getInstance(false); field in BasicConstraints 56 this.cA = null; in BasicConstraints() 63 this.cA = ASN1Boolean.getInstance(seq.getObjectAt(0)); in BasicConstraints() 67 this.cA = null; in BasicConstraints() 72 if (this.cA != null) in BasicConstraints() 85 boolean cA) in BasicConstraints() argument 87 if (cA) in BasicConstraints() 89 this.cA = ASN1Boolean.getInstance(true); in BasicConstraints() 93 this.cA = null; in BasicConstraints() 99 * create a cA=true object for the given path length constraint. [all …]
|
/external/libffi/testsuite/libffi.call/ |
D | many_complex.inc | 56 _Complex T_C_TYPE ca[13]; 63 values[i] = &ca[i]; 64 ca[i] = i + (-20 - i) * I; 72 cc = many(ca[0], ca[1], ca[2], ca[3], ca[4], ca[5], ca[6], ca[7], ca[8], 73 ca[9], ca[10], ca[11], ca[12]);
|
/external/libffi/testsuite/libffi.complex/ |
D | many_complex.inc | 56 _Complex T_C_TYPE ca[13]; 63 values[i] = &ca[i]; 64 ca[i] = i + (-20 - i) * I; 72 cc = many(ca[0], ca[1], ca[2], ca[3], ca[4], ca[5], ca[6], ca[7], ca[8], 73 ca[9], ca[10], ca[11], ca[12]);
|
/external/bouncycastle/repackaged/bcprov/src/main/java/com/android/org/bouncycastle/asn1/x509/ |
D | BasicConstraints.java | 21 ASN1Boolean cA = ASN1Boolean.getInstance(false); field in BasicConstraints 60 this.cA = null; in BasicConstraints() 67 this.cA = ASN1Boolean.getInstance(seq.getObjectAt(0)); in BasicConstraints() 71 this.cA = null; in BasicConstraints() 76 if (this.cA != null) in BasicConstraints() 89 boolean cA) in BasicConstraints() argument 91 if (cA) in BasicConstraints() 93 this.cA = ASN1Boolean.getInstance(true); in BasicConstraints() 97 this.cA = null; in BasicConstraints() 103 * create a cA=true object for the given path length constraint. [all …]
|
/external/bouncycastle/repackaged_platform/bcprov/src/main/java/com/android/internal/org/bouncycastle/asn1/x509/ |
D | BasicConstraints.java | 21 ASN1Boolean cA = ASN1Boolean.getInstance(false); field in BasicConstraints 60 this.cA = null; in BasicConstraints() 67 this.cA = ASN1Boolean.getInstance(seq.getObjectAt(0)); in BasicConstraints() 71 this.cA = null; in BasicConstraints() 76 if (this.cA != null) in BasicConstraints() 89 boolean cA) in BasicConstraints() argument 91 if (cA) in BasicConstraints() 93 this.cA = ASN1Boolean.getInstance(true); in BasicConstraints() 97 this.cA = null; in BasicConstraints() 103 * create a cA=true object for the given path length constraint. [all …]
|
/external/curl/lib/vtls/ |
D | bearssl.c | 73 struct cafile_parser *ca = ctx; in append_dn() local 75 if(ca->err != CURLE_OK || !ca->in_cert) in append_dn() 77 if(sizeof(ca->dn) - ca->dn_len < len) { in append_dn() 78 ca->err = CURLE_FAILED_INIT; in append_dn() 81 memcpy(ca->dn + ca->dn_len, buf, len); in append_dn() 82 ca->dn_len += len; in append_dn() 87 struct cafile_parser *ca = ctx; in x509_push() local 89 if(ca->in_cert) in x509_push() 90 br_x509_decoder_push(&ca->xc, buf, len); in x509_push() 96 struct cafile_parser ca; in load_cafile() local [all …]
|
/external/grpc-grpc-java/testing/src/main/resources/certs/ |
D | README | 19 The ca is self-signed: 22 $ openssl req -x509 -new -newkey rsa:1024 -nodes -out ca.pem -config ca-openssl.cnf -days 3650 -ext… 25 client is issued by CA: 36 $ openssl ca -in client.csr -out client.pem -keyfile ca.key -cert ca.pem -verbose -config openssl.c… 39 server0 is issued by CA: 50 $ openssl ca -in server0.csr -out server0.pem -keyfile ca.key -cert ca.pem -verbose -config openssl… 53 server1 is issued by CA with a special config for subject alternative names: 64 $ openssl ca -in server1.csr -out server1.pem -keyfile ca.key -cert ca.pem -verbose -config server1… 71 running the `openssl ca` command.
|
/external/cldr/tools/java/org/unicode/cldr/json/ |
D | JSON_config.txt | 14 section=ca-buddhist ; path=//cldr/main/[^/]++/dates/calendars/buddhist/.* ; package=cal-buddhist 15 section=ca-chinese ; path=//cldr/main/[^/]++/dates/calendars/chinese/.* ; package=cal-chinese 16 section=ca-coptic ; path=//cldr/main/[^/]++/dates/calendars/coptic/.* ; package=cal-coptic 17 section=ca-dangi ; path=//cldr/main/[^/]++/dates/calendars/dangi/.* ; package=cal-dangi 18 section=ca-ethiopic ; path=//cldr/main/[^/]++/dates/calendars/ethiopic/.* ; package=cal-ethiopic 19 section=ca-ethiopic-amete-alem ; path=//cldr/main/[^/]++/dates/calendars/ethiopic-amete-alem/.* ; p… 20 section=ca-generic ; path=//cldr/main/[^/]++/dates/calendars/generic/.* ; package=dates 21 section=ca-gregorian ; path=//cldr/main/[^/]++/dates/calendars/gregorian/.* ; package=dates 22 section=ca-hebrew ; path=//cldr/main/[^/]++/dates/calendars/hebrew/.* ; package=cal-hebrew 23 section=ca-indian ; path=//cldr/main/[^/]++/dates/calendars/indian/.* ; package=cal-indian [all …]
|
/external/llvm-project/llvm/test/Transforms/LoopDeletion/ |
D | update-scev.ll | 84 …%ca.3.lcssa = phi i64 [ %ca.2.lcssa, %for.cond8.preheader ], [ %inc11.lcssa, %for.cond.loopexit.lo… 88 %ca.19 = phi i64 [ 0, %for.cond5.preheader.lr.ph ], [ %ca.3.lcssa, %for.cond.loopexit ] 99 …%ca.2.lcssa = phi i64 [ %ca.19, %for.cond5.preheader ], [ %inc.lcssa, %for.cond8.preheader.loopexi… 106 %ca.26 = phi i64 [ %inc, %for.body7 ], [ %ca.19, %for.body7.preheader ] 107 %inc = add nsw i64 %ca.26, 1 108 %arrayidx = getelementptr inbounds double, double* %bx, i64 %ca.26 113 %ca.37 = phi i64 [ %inc11, %for.body10 ], [ %ca.2.lcssa, %for.body10.preheader ] 114 %inc11 = add nsw i64 %ca.37, 1 127 %ca.19.1 = phi i64 [ 0, %for.cond5.preheader.lr.ph.1 ], [ %ca.3.lcssa.1, %for.cond.loopexit.1 ] 134 %ca.26.1 = phi i64 [ %inc.1, %for.body7.1 ], [ %ca.19.1, %for.body7.preheader.1 ] [all …]
|
/external/curl/lib/ |
D | curl_addrinfo.c | 84 struct Curl_addrinfo *ca; in Curl_freeaddrinfo() local 86 for(ca = cahead; ca; ca = canext) { in Curl_freeaddrinfo() 87 canext = ca->ai_next; in Curl_freeaddrinfo() 88 free(ca); in Curl_freeaddrinfo() 118 struct Curl_addrinfo *ca; in Curl_getaddrinfo_ex() local 151 ca = malloc(sizeof(struct Curl_addrinfo) + ss_size + namelen); in Curl_getaddrinfo_ex() 152 if(!ca) { in Curl_getaddrinfo_ex() 160 ca->ai_flags = ai->ai_flags; in Curl_getaddrinfo_ex() 161 ca->ai_family = ai->ai_family; in Curl_getaddrinfo_ex() 162 ca->ai_socktype = ai->ai_socktype; in Curl_getaddrinfo_ex() [all …]
|
/external/libcxx/test/std/utilities/any/any.nonmembers/any.cast/ |
D | any_cast_pointer.pass.cpp | 42 any const& ca = a; in test_cast_is_noexcept() local 43 static_assert(noexcept(any_cast<int>(&ca)), ""); in test_cast_is_noexcept() 52 any const& ca = a; in test_cast_return_type() local 53 static_assert(std::is_same<decltype(any_cast<int>(&ca)), int const*>::value, ""); in test_cast_return_type() 54 static_assert(std::is_same<decltype(any_cast<int const>(&ca)), int const*>::value, ""); in test_cast_return_type() 63 any const* ca = nullptr; in test_cast_nullptr() local 64 assert(nullptr == any_cast<int>(ca)); in test_cast_nullptr() 65 assert(nullptr == any_cast<int const>(ca)); in test_cast_nullptr() 75 any const& ca = a; in test_cast_empty() local 76 assert(nullptr == any_cast<int>(&ca)); in test_cast_empty() [all …]
|
/external/llvm-project/libcxx/test/std/utilities/any/any.nonmembers/any.cast/ |
D | any_cast_pointer.pass.cpp | 40 any const& ca = a; in test_cast_is_noexcept() local 41 ASSERT_NOEXCEPT(any_cast<int>(&ca)); in test_cast_is_noexcept() 50 any const& ca = a; in test_cast_return_type() local 51 ASSERT_SAME_TYPE(decltype(any_cast<int>(&ca)), int const*); in test_cast_return_type() 52 ASSERT_SAME_TYPE(decltype(any_cast<int const>(&ca)), int const*); in test_cast_return_type() 61 any const* ca = nullptr; in test_cast_nullptr() local 62 assert(nullptr == any_cast<int>(ca)); in test_cast_nullptr() 63 assert(nullptr == any_cast<int const>(ca)); in test_cast_nullptr() 73 any const& ca = a; in test_cast_empty() local 74 assert(nullptr == any_cast<int>(&ca)); in test_cast_empty() [all …]
|
/external/wpa_supplicant_8/hs20/server/ca/ |
D | setup.sh | 14 CNR="Hotspot 2.0 Trust Root CA - 99" 28 # -c: Company name, used to generate Subject name CN for Intermediate CA\n 29 # -C: Subject name CN of the Root CA ($CNR)\n 77 echo "---[ Root CA ]----------------------------------------------------------" 102 echo " * Use existing Root CA" 104 echo " * Generate Root CA private key" 105 …out rootCA/private/cakey.pem -out rootCA/careq.pem || fail "Failed to generate Root CA private key" 106 echo " * Sign Root CA certificate" 107 …ca -config openssl.cnf.tmp -md sha256 -create_serial -out rootCA/cacert.pem -days 10957 -batch -ke… 116 echo "---[ Intermediate CA ]--------------------------------------------------" [all …]
|