Searched +full:- +full:- +full:staple +full:- +full:ocsp (Results 1 – 13 of 13) sorted by relevance
| /external/cldr/tools/scripts/ansible/ |
| D | certbot-playbook.yml | 1 - hosts: letsencrypt 4 - vars/main.yml 5 - local-vars/local.yml 7 - name: Install certbot packages 10 - python3-certbot-nginx 11 - name: setup certbot 13 sudo certbot --nginx --agree-tos -m {{ certbot_admin_email }} 14 -d {{ inventory_hostname }} --non-interactive 15 --keep --redirect --uir --hsts --staple-ocsp --must-staple
|
| /external/curl/docs/cmdline-opts/ |
| D | cert-status.d | 2 SPDX-License-Identifier: curl 3 Long: cert-status 6 Help: Verify the status of the server cert via OCSP-staple 8 See-also: pinnedpubkey 9 Example: --cert-status $URL 11 --- 13 Certificate Status Request (aka. OCSP stapling) TLS extension.
|
| D | doh-cert-status.d | 2 SPDX-License-Identifier: curl 3 Long: doh-cert-status 4 Help: Verify the status of the DoH server cert via OCSP-staple 7 Example: --doh-cert-status --doh-url https://doh.example $URL 8 See-also: doh-insecure 10 --- 11 Same as --cert-status but used for DoH (DNS-over-HTTPS).
|
| /external/python/cryptography/docs/development/ |
| D | test-vectors.rst | 15 ------- 20 We run vectors from `Project Wycheproof`_ -- a collection of known edge-cases 31 * RSA PKCS #1 from the RSA FTP site (ftp://ftp.rsasecurity.com/pub/pkcs/pkcs-1/ 33 * RSA FIPS 186-2 and PKCS1 v1.5 vulnerability test vectors from `NIST CAVP`_. 34 * FIPS 186-2 and FIPS 186-3 DSA test vectors from `NIST CAVP`_. 35 * FIPS 186-2 and FIPS 186-3 ECDSA test vectors from `NIST CAVP`_. 43 * GnuTLS: `enc-rsa-pkcs8.pem`_, `enc2-rsa-pkcs8.pem`_, 44 `unenc-rsa-pkcs8.pem`_, `pkcs12_s2k_pem.c`_. The encoding error in 45 `unenc-rsa-pkcs8.pem`_ was fixed, and the contents of `enc-rsa-pkcs8.pem`_ 46 was re-encrypted to include it. The contents of `enc2-rsa-pkcs8.pem`_ [all …]
|
| /external/cronet/net/ssl/ |
| D | ssl_server_config.h | 2 // Use of this source code is governed by a BSD-style license that can be 19 #include "third_party/abseil-cpp/absl/types/optional.h" 26 // A collection of server-side SSL-related configuration settings. 47 // to reject early data that is non-safe to be replayed. 51 // used in addition to those disabled by the net built-in policy. 54 // big-endian form, they should be declared in host byte order, with the 80 // List of DER-encoded X.509 DistinguishedName of certificate authorities 103 // If non-empty, the DER-encoded OCSP response to staple. 106 // If non-empty, the serialized SignedCertificateTimestampList to send in the 125 ECHKeysContainer( // NOLINT(google-explicit-constructor) [all …]
|
| /external/python/cryptography/docs/x509/ |
| D | reference.rst | 9 -----BEGIN X509 CRL----- 20 -----END X509 CRL----- 24 -----BEGIN CERTIFICATE REQUEST----- 39 -----END CERTIFICATE REQUEST----- 43 -----BEGIN CERTIFICATE----- 63 -----END CERTIFICATE----- 67 -----BEGIN CERTIFICATE----- 99 -----END CERTIFICATE----- 103 -----BEGIN RSA PUBLIC KEY----- 115 -----END RSA PUBLIC KEY----- [all …]
|
| /external/curl/src/ |
| D | tool_listhelp.c | 21 * SPDX-License-Identifier: curl 31 cd $srcroot/docs/cmdline-opts 36 {" --abstract-unix-socket <path>", 39 {" --alt-svc <file name>", 40 "Enable alt-svc with this cache file", 42 {" --anyauth", 45 {"-a, --append", 48 {" --aws-sigv4 <provider1[:provider2[:region[:service]]]>", 51 {" --basic", 54 {" --cacert <file>", [all …]
|
| /external/python/cryptography/ |
| D | CHANGELOG.rst | 4 .. _v3-3-2: 6 3.3.2 - 2021-02-07 11 integer overflow, leading to buffer overflows. *CVE-2020-36242* 13 .. _v3-3-1: 15 3.3.1 - 2020-12-09 18 * Re-added a legacy symbol causing problems for older ``pyOpenSSL`` users. 20 .. _v3-3: 22 3.3 - 2020-12-08 30 64-bit to 1024-bit (8 byte to 128 byte) initialization vectors. This change 38 Diffie-Hellman parameters of less than 512 bits in length. This change is to [all …]
|
| /external/python/cryptography/src/cryptography/x509/ |
| D | extensions.py | 61 # Double-check the algorithm structure. 409 "path_length must be a non-negative integer or None" 652 "require_explicit_policy must be a non-negative integer or " 660 "inhibit_policy_mapping must be a non-negative integer or None" 965 # called OCSP Must-Staple when present in the TLS Feature extension in an 968 # status_request_v2 is defined in RFC 6961 and allows multiple OCSP 986 raise ValueError("skip_certs must be a non-negative integer")
|
| /external/rust/crates/quiche/deps/boringssl/src/tool/ |
| D | transport_common.cc | 148 hostname[hostname.size() - 1] == ']') { in Connect() 149 hostname = hostname.substr(1, hostname.size() - 2); in Connect() 172 socket(result->ai_family, result->ai_socktype, result->ai_protocol); in Connect() 178 switch (result->ai_family) { in Connect() 181 reinterpret_cast<struct sockaddr_in *>(result->ai_addr); in Connect() 183 inet_ntop(result->ai_family, &sin->sin_addr, buf, sizeof(buf)), in Connect() 184 ntohs(sin->sin_port)); in Connect() 189 reinterpret_cast<struct sockaddr_in6 *>(result->ai_addr); in Connect() 191 inet_ntop(result->ai_family, &sin6->sin6_addr, buf, sizeof(buf)), in Connect() 192 ntohs(sin6->sin6_port)); in Connect() [all …]
|
| /external/cronet/third_party/boringssl/src/tool/ |
| D | transport_common.cc | 148 hostname[hostname.size() - 1] == ']') { in Connect() 149 hostname = hostname.substr(1, hostname.size() - 2); in Connect() 172 socket(result->ai_family, result->ai_socktype, result->ai_protocol); in Connect() 178 switch (result->ai_family) { in Connect() 181 reinterpret_cast<struct sockaddr_in *>(result->ai_addr); in Connect() 183 inet_ntop(result->ai_family, &sin->sin_addr, buf, sizeof(buf)), in Connect() 184 ntohs(sin->sin_port)); in Connect() 189 reinterpret_cast<struct sockaddr_in6 *>(result->ai_addr); in Connect() 191 inet_ntop(result->ai_family, &sin6->sin6_addr, buf, sizeof(buf)), in Connect() 192 ntohs(sin6->sin6_port)); in Connect() [all …]
|
| /external/boringssl/src/tool/ |
| D | transport_common.cc | 148 hostname[hostname.size() - 1] == ']') { in Connect() 149 hostname = hostname.substr(1, hostname.size() - 2); in Connect() 172 socket(result->ai_family, result->ai_socktype, result->ai_protocol); in Connect() 178 switch (result->ai_family) { in Connect() 181 reinterpret_cast<struct sockaddr_in *>(result->ai_addr); in Connect() 183 inet_ntop(result->ai_family, &sin->sin_addr, buf, sizeof(buf)), in Connect() 184 ntohs(sin->sin_port)); in Connect() 189 reinterpret_cast<struct sockaddr_in6 *>(result->ai_addr); in Connect() 191 inet_ntop(result->ai_family, &sin6->sin6_addr, buf, sizeof(buf)), in Connect() 192 ntohs(sin6->sin6_port)); in Connect() [all …]
|
| /external/python/cryptography/tests/x509/ |
| D | test_x509.py | 1 # -*- coding: utf-8 -*- 243 assert crl.next_update.isoformat() == "2016-01-01T00:00:00" 244 assert crl.last_update.isoformat() == "2015-01-01T00:00:00" 507 assert rev.revocation_date.isoformat() == "2015-01-01T00:00:00" 634 crl[-13] 638 assert crl[-1].serial_number == crl[11].serial_number 703 assert cert.serial_number == -18008675309 707 os.path.join("x509", "alternate-rsa-sha1-oid.pem"), 898 os.path.join("x509", "utf8-dnsname.pem"), 914 u"xn--biztosts-fza2j.hu", [all …]
|