Home
last modified time | relevance | path

Searched +full:- +full:- +full:staple +full:- +full:ocsp (Results 1 – 13 of 13) sorted by relevance

/external/cldr/tools/scripts/ansible/
Dcertbot-playbook.yml1 - hosts: letsencrypt
4 - vars/main.yml
5 - local-vars/local.yml
7 - name: Install certbot packages
10 - python3-certbot-nginx
11 - name: setup certbot
13 sudo certbot --nginx --agree-tos -m {{ certbot_admin_email }}
14 -d {{ inventory_hostname }} --non-interactive
15 --keep --redirect --uir --hsts --staple-ocsp --must-staple
/external/curl/docs/cmdline-opts/
Dcert-status.d2 SPDX-License-Identifier: curl
3 Long: cert-status
6 Help: Verify the status of the server cert via OCSP-staple
8 See-also: pinnedpubkey
9 Example: --cert-status $URL
11 ---
13 Certificate Status Request (aka. OCSP stapling) TLS extension.
Ddoh-cert-status.d2 SPDX-License-Identifier: curl
3 Long: doh-cert-status
4 Help: Verify the status of the DoH server cert via OCSP-staple
7 Example: --doh-cert-status --doh-url https://doh.example $URL
8 See-also: doh-insecure
10 ---
11 Same as --cert-status but used for DoH (DNS-over-HTTPS).
/external/python/cryptography/docs/development/
Dtest-vectors.rst15 -------
20 We run vectors from `Project Wycheproof`_ -- a collection of known edge-cases
31 * RSA PKCS #1 from the RSA FTP site (ftp://ftp.rsasecurity.com/pub/pkcs/pkcs-1/
33 * RSA FIPS 186-2 and PKCS1 v1.5 vulnerability test vectors from `NIST CAVP`_.
34 * FIPS 186-2 and FIPS 186-3 DSA test vectors from `NIST CAVP`_.
35 * FIPS 186-2 and FIPS 186-3 ECDSA test vectors from `NIST CAVP`_.
43 * GnuTLS: `enc-rsa-pkcs8.pem`_, `enc2-rsa-pkcs8.pem`_,
44 `unenc-rsa-pkcs8.pem`_, `pkcs12_s2k_pem.c`_. The encoding error in
45 `unenc-rsa-pkcs8.pem`_ was fixed, and the contents of `enc-rsa-pkcs8.pem`_
46 was re-encrypted to include it. The contents of `enc2-rsa-pkcs8.pem`_
[all …]
/external/cronet/net/ssl/
Dssl_server_config.h2 // Use of this source code is governed by a BSD-style license that can be
19 #include "third_party/abseil-cpp/absl/types/optional.h"
26 // A collection of server-side SSL-related configuration settings.
47 // to reject early data that is non-safe to be replayed.
51 // used in addition to those disabled by the net built-in policy.
54 // big-endian form, they should be declared in host byte order, with the
80 // List of DER-encoded X.509 DistinguishedName of certificate authorities
103 // If non-empty, the DER-encoded OCSP response to staple.
106 // If non-empty, the serialized SignedCertificateTimestampList to send in the
125 ECHKeysContainer( // NOLINT(google-explicit-constructor)
[all …]
/external/python/cryptography/docs/x509/
Dreference.rst9 -----BEGIN X509 CRL-----
20 -----END X509 CRL-----
24 -----BEGIN CERTIFICATE REQUEST-----
39 -----END CERTIFICATE REQUEST-----
43 -----BEGIN CERTIFICATE-----
63 -----END CERTIFICATE-----
67 -----BEGIN CERTIFICATE-----
99 -----END CERTIFICATE-----
103 -----BEGIN RSA PUBLIC KEY-----
115 -----END RSA PUBLIC KEY-----
[all …]
/external/curl/src/
Dtool_listhelp.c21 * SPDX-License-Identifier: curl
31 cd $srcroot/docs/cmdline-opts
36 {" --abstract-unix-socket <path>",
39 {" --alt-svc <file name>",
40 "Enable alt-svc with this cache file",
42 {" --anyauth",
45 {"-a, --append",
48 {" --aws-sigv4 <provider1[:provider2[:region[:service]]]>",
51 {" --basic",
54 {" --cacert <file>",
[all …]
/external/python/cryptography/
DCHANGELOG.rst4 .. _v3-3-2:
6 3.3.2 - 2021-02-07
11 integer overflow, leading to buffer overflows. *CVE-2020-36242*
13 .. _v3-3-1:
15 3.3.1 - 2020-12-09
18 * Re-added a legacy symbol causing problems for older ``pyOpenSSL`` users.
20 .. _v3-3:
22 3.3 - 2020-12-08
30 64-bit to 1024-bit (8 byte to 128 byte) initialization vectors. This change
38 Diffie-Hellman parameters of less than 512 bits in length. This change is to
[all …]
/external/python/cryptography/src/cryptography/x509/
Dextensions.py61 # Double-check the algorithm structure.
409 "path_length must be a non-negative integer or None"
652 "require_explicit_policy must be a non-negative integer or "
660 "inhibit_policy_mapping must be a non-negative integer or None"
965 # called OCSP Must-Staple when present in the TLS Feature extension in an
968 # status_request_v2 is defined in RFC 6961 and allows multiple OCSP
986 raise ValueError("skip_certs must be a non-negative integer")
/external/rust/crates/quiche/deps/boringssl/src/tool/
Dtransport_common.cc148 hostname[hostname.size() - 1] == ']') { in Connect()
149 hostname = hostname.substr(1, hostname.size() - 2); in Connect()
172 socket(result->ai_family, result->ai_socktype, result->ai_protocol); in Connect()
178 switch (result->ai_family) { in Connect()
181 reinterpret_cast<struct sockaddr_in *>(result->ai_addr); in Connect()
183 inet_ntop(result->ai_family, &sin->sin_addr, buf, sizeof(buf)), in Connect()
184 ntohs(sin->sin_port)); in Connect()
189 reinterpret_cast<struct sockaddr_in6 *>(result->ai_addr); in Connect()
191 inet_ntop(result->ai_family, &sin6->sin6_addr, buf, sizeof(buf)), in Connect()
192 ntohs(sin6->sin6_port)); in Connect()
[all …]
/external/cronet/third_party/boringssl/src/tool/
Dtransport_common.cc148 hostname[hostname.size() - 1] == ']') { in Connect()
149 hostname = hostname.substr(1, hostname.size() - 2); in Connect()
172 socket(result->ai_family, result->ai_socktype, result->ai_protocol); in Connect()
178 switch (result->ai_family) { in Connect()
181 reinterpret_cast<struct sockaddr_in *>(result->ai_addr); in Connect()
183 inet_ntop(result->ai_family, &sin->sin_addr, buf, sizeof(buf)), in Connect()
184 ntohs(sin->sin_port)); in Connect()
189 reinterpret_cast<struct sockaddr_in6 *>(result->ai_addr); in Connect()
191 inet_ntop(result->ai_family, &sin6->sin6_addr, buf, sizeof(buf)), in Connect()
192 ntohs(sin6->sin6_port)); in Connect()
[all …]
/external/boringssl/src/tool/
Dtransport_common.cc148 hostname[hostname.size() - 1] == ']') { in Connect()
149 hostname = hostname.substr(1, hostname.size() - 2); in Connect()
172 socket(result->ai_family, result->ai_socktype, result->ai_protocol); in Connect()
178 switch (result->ai_family) { in Connect()
181 reinterpret_cast<struct sockaddr_in *>(result->ai_addr); in Connect()
183 inet_ntop(result->ai_family, &sin->sin_addr, buf, sizeof(buf)), in Connect()
184 ntohs(sin->sin_port)); in Connect()
189 reinterpret_cast<struct sockaddr_in6 *>(result->ai_addr); in Connect()
191 inet_ntop(result->ai_family, &sin6->sin6_addr, buf, sizeof(buf)), in Connect()
192 ntohs(sin6->sin6_port)); in Connect()
[all …]
/external/python/cryptography/tests/x509/
Dtest_x509.py1 # -*- coding: utf-8 -*-
243 assert crl.next_update.isoformat() == "2016-01-01T00:00:00"
244 assert crl.last_update.isoformat() == "2015-01-01T00:00:00"
507 assert rev.revocation_date.isoformat() == "2015-01-01T00:00:00"
634 crl[-13]
638 assert crl[-1].serial_number == crl[11].serial_number
703 assert cert.serial_number == -18008675309
707 os.path.join("x509", "alternate-rsa-sha1-oid.pem"),
898 os.path.join("x509", "utf8-dnsname.pem"),
914 u"xn--biztosts-fza2j.hu",
[all …]