| /external/tpm2-tss/script/ekca/ | 
| D | create_ca.sh | 22 mkdir root-ca 23 pushd root-ca 26 touch root-ca.index 27 echo 00 > root-ca.crlnum 28 echo 1000 > root-ca.serial 31 cp "${EKCADIR}/root-ca.cnf" ./ 32 export OPENSSL_CONF=./root-ca.cnf 37 openssl req -new -out root-ca.req.pem -passout file:pass.txt 42 openssl ca -selfsign \ 43     -in root-ca.req.pem \ [all …] 
 | 
| D | intermed-ca.cnf | 19 [ ca ] 27 serial                  = $dir/intermed-ca.serial 28 database                = $dir/intermed-ca.index 30 certificate             = $dir/intermed-ca.cert.pem 31 private_key             = $dir/private/intermed-ca.key.pem 33 crl                     = $dir/crl/intermed-ca.crl 35 crlnumber               = $dir/intermed-ca.crlnum 70 # Intermediate CA request options 73 default_keyfile         = private/intermed-ca.key.pem 84 # Intermediate CA Request Extensions [all …] 
 | 
| D | root-ca.cnf | 12 [ ca ] 20 serial                  = $dir/root-ca.serial 21 database                = $dir/root-ca.index 23 certificate             = $dir/root-ca.cert.pem 24 private_key             = $dir/private/root-ca.key.pem 26 crl                     = $dir/root-ca.crl 28 crlnumber               = $dir/root-ca.crlnum 51 # Root CA Request Options 54 default_keyfile         = private/root-ca.key.pem 65 # Root CA Request Extensions [all …] 
 | 
| /external/linux-kselftest/tools/testing/selftests/bpf/progs/ | 
| D | bpf_cubic.c | 13  *    "while (ca->ack_cnt > delta)" loop is changed to the equivalent 14  *    "ca->ack_cnt / delta" operation. 94 static inline void bictcp_reset(struct bictcp *ca)  in bictcp_reset()  argument 96 	ca->cnt = 0;  in bictcp_reset() 97 	ca->last_max_cwnd = 0;  in bictcp_reset() 98 	ca->last_cwnd = 0;  in bictcp_reset() 99 	ca->last_time = 0;  in bictcp_reset() 100 	ca->bic_origin_point = 0;  in bictcp_reset() 101 	ca->bic_K = 0;  in bictcp_reset() 102 	ca->delay_min = 0;  in bictcp_reset() [all …] 
 | 
| D | bpf_dctcp.c | 50 					struct dctcp *ca)  in dctcp_reset()  argument 52 	ca->next_seq = tp->snd_nxt;  in dctcp_reset() 54 	ca->old_delivered = tp->delivered;  in dctcp_reset() 55 	ca->old_delivered_ce = tp->delivered_ce;  in dctcp_reset() 62 	struct dctcp *ca = inet_csk_ca(sk);  in BPF_PROG()  local 85 	ca->prior_rcv_nxt = tp->rcv_nxt;  in BPF_PROG() 86 	ca->dctcp_alpha = min(dctcp_alpha_on_init, DCTCP_MAX_ALPHA);  in BPF_PROG() 87 	ca->loss_cwnd = 0;  in BPF_PROG() 88 	ca->ce_state = 0;  in BPF_PROG() 95 	dctcp_reset(tp, ca);  in BPF_PROG() [all …] 
 | 
| /external/python/cpython2/Lib/email/test/data/ | 
| D | msg_43.txt | 26 …ca.gov, xxxxxxxxxxxxx@dot.ca.gov, xxxxxxxxxx@dot.ca.gov, xxxxxxxx@dot.ca.gov, xxxxxxxxxx@dot.ca.go… 41 Reporting-MTA: dns; sacspam01.dot.ca.gov 42 Received-From-MTA: smtp; sacspam01.dot.ca.gov ([127.0.0.1]) 45 Final-Recipient: rfc822; xxxxxxx@dot.ca.gov 51 Final-Recipient: rfc822; xxxxxxxxxxxxx@dot.ca.gov 57 Final-Recipient: rfc822; xxxxxxxxxx@dot.ca.gov 63 Final-Recipient: rfc822; xxxxxxxx@dot.ca.gov 69 Final-Recipient: rfc822; xxxxxxxxxx@dot.ca.gov 75 Final-Recipient: rfc822; xxxxxx@dot.ca.gov 81 Final-Recipient: rfc822; xxxxxxxxxx@dot.ca.gov [all …] 
 | 
| /external/python/cpython3/Lib/test/test_email/data/ | 
| D | msg_43.txt | 26 …ca.gov, xxxxxxxxxxxxx@dot.ca.gov, xxxxxxxxxx@dot.ca.gov, xxxxxxxx@dot.ca.gov, xxxxxxxxxx@dot.ca.go… 41 Reporting-MTA: dns; sacspam01.dot.ca.gov 42 Received-From-MTA: smtp; sacspam01.dot.ca.gov ([127.0.0.1]) 45 Final-Recipient: rfc822; xxxxxxx@dot.ca.gov 51 Final-Recipient: rfc822; xxxxxxxxxxxxx@dot.ca.gov 57 Final-Recipient: rfc822; xxxxxxxxxx@dot.ca.gov 63 Final-Recipient: rfc822; xxxxxxxx@dot.ca.gov 69 Final-Recipient: rfc822; xxxxxxxxxx@dot.ca.gov 75 Final-Recipient: rfc822; xxxxxx@dot.ca.gov 81 Final-Recipient: rfc822; xxxxxxxxxx@dot.ca.gov [all …] 
 | 
| /external/mbedtls/tests/suites/ | 
| D | test_suite_x509write.data | 63 …ca.key":"PolarSSLTest":"C=NL,O=PolarSSL,CN=PolarSSL Test CA":"1":"20190210144406":"20290210144406"… 67 …ca.key":"PolarSSLTest":"C=NL,O=PolarSSL,CN=PolarSSL Test CA":"1":"19700210144406":"20290210144406"… 71 …ca.key":"PolarSSLTest":"C=NL,O=PolarSSL,CN=PolarSSL Test CA":"1":"20190210144406":"20500210144406"… 75 …ca.key":"PolarSSLTest":"C=NL,O=PolarSSL,CN=PolarSSL Test CA":"1":"19700210144406":"20500210144406"… 79 …ca.key":"PolarSSLTest":"C=NL,O=PolarSSL,CN=PolarSSL Test CA":"1":"20500210144406":"20590210144406"… 83 …ca.key":"PolarSSLTest":"C=NL,O=PolarSSL,CN=PolarSSL Test CA":"1":"20190210144406":"20290210144406"… 87 …ca.key":"PolarSSLTest":"C=NL,O=PolarSSL,CN=PolarSSL Test CA":"1":"20110212144406":"20210212144406"… 91 …ca.key":"PolarSSLTest":"C=NL,O=PolarSSL,CN=PolarSSL Test CA":"1":"20110212144406":"20210212144406"… 95 …ca.key":"PolarSSLTest":"C=NL,O=PolarSSL,CN=PolarSSL Test CA":"1":"20190210144406":"20290210144406"… 99 …ca.key":"PolarSSLTest":"C=NL,O=PolarSSL,CN=PolarSSL Test CA":"1":"20190210144406":"20290210144406"… [all …] 
 | 
| /external/curl/tests/certs/scripts/ | 
| D | genroot.sh | 46    if [ ! -f $PREFIX-ca.prm ] ; then 47       echo No configuration file $PREFIX-ca.prm 66 echo "openssl genrsa -out $PREFIX-ca.key -passout XXX $KEYSIZE" 67 openssl genrsa -out $PREFIX-ca.key -passout pass:secret $KEYSIZE 69 echo "openssl req -config $PREFIX-ca.prm -new -key $PREFIX-ca.key -out $PREFIX-ca.csr" 70 $OPENSSL req -config $PREFIX-ca.prm -new -key $PREFIX-ca.key -out $PREFIX-ca.csr -passin pass:secret 72 …ial $SERIAL -extfile $PREFIX-ca.prm -days $DURATION -req -signkey $PREFIX-ca.key -in $PREFIX-ca.cs… 74 …ial $SERIAL -extfile $PREFIX-ca.prm -days $DURATION -req -signkey $PREFIX-ca.key -in $PREFIX-ca.cs… 76 echo "openssl x509 -text -in $PREFIX-$SERIAL-ca.cacert -nameopt multiline > $PREFIX-ca.cacert " 77 $OPENSSL x509 -text -in $PREFIX-$SERIAL-ca.cacert -nameopt multiline > $PREFIX-ca.cacert [all …] 
 | 
| /external/cronet/net/data/ssl/scripts/ | 
| D | generate-test-certs.sh | 50     -config ca.cnf 57     -extfile ca.cnf \ 74     -config ca.cnf 77   openssl ca \ 83     -config ca.cnf 128   openssl ca \ 135     -config ca.cnf 138   openssl ca \ 144     -config ca.cnf 149   openssl ca \ [all …] 
 | 
| D | generate-multi-root-test-chains.sh | 9 # while the indication that a CA Foo signed a certificate for CA Bar is denoted 68   CA_COMMON_NAME="${i} Root CA - Multi-root" \ 71     -config redundant-ca.cnf \ 77   CA_COMMON_NAME="${i} Root CA - Multi-root" \ 79   openssl ca \ 80     -config redundant-ca.cnf \ 85     -extfile redundant-ca.cnf \ 95   CA_COMMON_NAME="${i} CA - Multi-root" \ 98     -config redundant-ca.cnf \ 105 CA_COMMON_NAME="D CA - Multi-root" \ [all …] 
 | 
| D | generate-redundant-test-chains.sh | 45 CA_COMMON_NAME="D Root CA" \ 51     -config redundant-ca.cnf 54 CA_COMMON_NAME="D Root CA" \ 59     -extfile redundant-ca.cnf \ 65 CA_COMMON_NAME="C CA" \ 71     -config redundant-ca.cnf 74 CA_COMMON_NAME="C CA" \ 79     -extfile redundant-ca.cnf \ 87   name="$i Intermediate CA" 88   CA_COMMON_NAME="$i CA" \ [all …] 
 | 
| /external/mbedtls/tests/data_files/ | 
| D | Readme-x509.txt | 7 - test-ca.crt aka "C=NL, O=PolarSSL, CN=PolarSSL Test CA" 9   test-ca-sha1.crt and test-ca-sha256.crt use the same key, signed with 11 - test-ca2*.crt aka "C=NL, O=PolarSSL, CN=Polarssl Test EC CA" 17 - test-int-ca.crt "C=NL, O=PolarSSL, CN=PolarSSL Test Intermediate CA" 19     - test-int-ca-exp.crt is a copy that is expired 20 - test-int-ca2.crt "C=NL, O=PolarSSL, CN=PolarSSL Test Intermediate EC CA" 21   uses an EC key with NIST P-384, signed by test-ca 23 A third intermediate CA is signed by test-int-ca2.crt: 24 - test-int-ca3.crt "C=UK, O=mbed TLS, CN=mbed TLS Test intermediate CA 3" 28 - enco-ca-prstr.pem: has its CN encoded as a printable string, but child cert [all …] 
 | 
| /external/openthread/third_party/mbedtls/repo/tests/data_files/ | 
| D | Readme-x509.txt | 7 - test-ca.crt aka "C=NL, O=PolarSSL, CN=PolarSSL Test CA" 9   test-ca-sha1.crt and test-ca-sha256.crt use the same key, signed with 11 - test-ca2*.crt aka "C=NL, O=PolarSSL, CN=Polarssl Test EC CA" 17 - test-int-ca.crt "C=NL, O=PolarSSL, CN=PolarSSL Test Intermediate CA" 19     - test-int-ca-exp.crt is a copy that is expired 20 - test-int-ca2.crt "C=NL, O=PolarSSL, CN=PolarSSL Test Intermediate EC CA" 21   uses an EC key with NIST P-384, signed by test-ca 23 A third intermediate CA is signed by test-int-ca2.crt: 24 - test-int-ca3.crt "C=UK, O=mbed TLS, CN=mbed TLS Test intermediate CA 3" 28 - enco-ca-prstr.pem: has its CN encoded as a printable string, but child cert [all …] 
 | 
| /external/cronet/net/data/ssl/chrome_root_store/ | 
| D | root_store.md | 7 …e01ce0ba86a64fbfebcc7aab5afc155b37fd76066 | CN=Actalis Authentication Root CA,O=Actalis S.p.A./033… 8 18ce6cfe7bf14e60b2e347b8dfe868cb31d02ebb3ada271569f50343b46db3a4 | CN=Amazon Root CA 3,O=Amazon,C=U… 9 1ba5b2aa8c65401a82960118f80bec4f62304d83cec4713a19c39c011ea46db4 | CN=Amazon Root CA 2,O=Amazon,C=U… 11 8ecde6884f3d87b1125ba31ac3fcb13d7016de7f57cc904fe1cb97c6ae98196e | CN=Amazon Root CA 1,O=Amazon,C=U… 12 e35d28419ed02025cfa69038cd623962458da5c695fbdea3c22b0bfb25897092 | CN=Amazon Root CA 4,O=Amazon,C=U… 13 5c58468d55f58e497e743982d2b50010b6d165374acf83a7d4a32db768c4408e | CN=Certum Trusted Network CA,OU=… 14 b676f2eddae8775cd36cb0f63cd1d4603961f49e6265ba013a2f0307b6d0b804 | CN=Certum Trusted Network CA 2,O… 17 9a114025197c5bb95d94e63d55cd43790847b646b23cdf11ada4a00eff15fb48 | CN=Buypass Class 2 Root CA,O=Buy… 18 edf7ebbca27a2a384d387b7d4010c666e2edb4843e4c29b4ae1d5b9332e6b24d | CN=Buypass Class 3 Root CA,O=Buy… 19 657cfe2fa73faa38462571f332a2363a46fce7020951710702cdfbb6eeda3305 | OU=certSIGN ROOT CA G2,O=CERTSIG… [all …] 
 | 
| D | root_store.textproto | 13 # CN=Actalis Authentication Root CA, O=Actalis S.p.A./03358520967, L=Milan, C=IT 20 # CN=Amazon Root CA 3, O=Amazon, C=US 27 # CN=Amazon Root CA 2, O=Amazon, C=US 42 # CN=Amazon Root CA 1, O=Amazon, C=US 49 # CN=Amazon Root CA 4, O=Amazon, C=US 56 # CN=Certum Trusted Network CA, OU=Certum Certification Authority, O=Unizeto Technologies S.A., C=PL 63 # CN=Certum Trusted Network CA 2, OU=Certum Certification Authority, O=Unizeto Technologies S.A., C… 80 # CN=Buypass Class 2 Root CA, O=Buypass AS-983163327, C=NO 85 # CN=Buypass Class 3 Root CA, O=Buypass AS-983163327, C=NO 92 # OU=certSIGN ROOT CA G2, O=CERTSIGN SA, C=RO [all …] 
 | 
| /external/cronet/net/data/crl_unittest/ | 
| D | generate_crl_test_data.py | 91                                 'CA:%s' % ('TRUE' if is_ca else 'FALSE'))]) 106 ROOT_CA = CreateCert('Test CA', None) 109 CA = CreateCert('Test Intermediate CA', ROOT_CA,  variable 111 CA_NO_KEYUSAGE = CreateCert('Test Intermediate CA', ROOT_CA, 112                             pkey=CA['pkey'], key_usage=None) 113 CA_KEYUSAGE_NOCRLSIGN = CreateCert('Test Intermediate CA', ROOT_CA, 114                                    pkey=CA['pkey'], 117 # A different CA with a different name and key. 118 OTHER_CA = CreateCert('Test Other Intermediate CA', ROOT_CA) 122 LEAF = CreateCert('Test Cert', CA, crl_dp='URI:http://example.com/foo.crl', is_ca=False) [all …] 
 | 
| /external/curl/docs/ | 
| D | SSLCERTS.md | 22 This system is about trust. In your local CA certificate store you have certs 38 by using a CA certificate store that the SSL library can use to make sure the 42 certificates in the CA store, you can be sure that the remote server really is 45 If the remote server uses a self-signed certificate, if you do not install a CA 46 cert store, if the server uses a certificate signed by a CA that is not 56  2. Get a CA certificate that can verify the remote server and use the proper 57     option to point out this CA cert for verification when connecting. For 62  3. Add the CA cert for your server to the existing default CA certificate 63     store. The default CA certificate store can be changed at compile time with 66     `--with-ca-bundle=FILE`: use the specified file as the CA certificate [all …] 
 | 
| /external/clang/test/SemaCXX/ | 
| D | err_typecheck_assign_const_filecheck.cpp | 58 void test1(A a, const A Ca) {  in test1()  argument 61   Ca.b.c.d.e.Mnum = 5;  in test1() 63   Ca.b.c.d.e.Snum = 5;  in test1() 64   Ca.b.c.Md.e.num = 5;  in test1() 65   Ca.Mb.Cc.d.e.Mnum = 5;  in test1() 66   Ca.Mb.getC().d.e.num = 5;  in test1() 67   Ca.getSB().c.d.e.num = 5;  in test1() 69   Ca.Cb.Cc.Cd.Ce.Snum = 5;  in test1() 75 void test2(A a, const A Ca) {  in test2()  argument 76   Ca.b.c.d.e.num = 5;  in test2() [all …] 
 | 
| /external/python/httplib2/script/ | 
| D | generate-tls | 19 	openssl rsa -in ca.key -check -noout 32 	[[ -f ca.key ]] || openssl genrsa -out ca.key $rsa_bits 37 	echo "- generate CA" >&2 38 …sl req -batch -new -nodes -x509 -days $days -subj "$subj_prefix/CN=$org-CA" -key ca.key -out ca.pem 39 …openssl req -batch -new -nodes -x509 -days $days -subj "$subj_prefix/CN=$org-CA-unused" -key ca.ke… 43 …openssl x509 -req -in tmp.csr -CA ca.pem -CAkey ca.key -CAcreateserial -out client.crt -days $days… 45 	cat client.crt ca.pem client.key >client_chain.pem 49 …openssl x509 -req -in tmp.csr -CA ca.pem -CAkey ca.key -CAcreateserial -out client_encrypted.crt -… 54 …openssl x509 -req -in tmp.csr -CA ca.pem -CAkey ca.key -CAcreateserial -out server.crt -days $days… 56 	cat server.crt ca.pem server.key >server_chain.pem
  | 
| /external/cronet/net/data/ocsp_unittest/ | 
| D | make_ocsp.py | 89 ROOT_CA = CreateCert('Test CA', None) 90 CA = CreateCert('Test Intermediate CA', ROOT_CA)  variable 91 CA_LINK = CreateCert('Test OCSP Signer', CA, True) 92 CA_BADLINK = CreateCert('Test False OCSP Signer', CA, False) 93 CERT = CreateCert('Test Cert', CA) 197     signer = CA 290 def Store(fname, description, ca, data):  argument 291   ca_cert_pem = crypto.dump_certificate(crypto.FILETYPE_PEM, ca[1]) 299       ca_cert_pem.replace('CERTIFICATE', 'CA CERTIFICATE'), 308     CA, [all …] 
 | 
| /external/conscrypt/openjdk/src/test/resources/ | 
| D | README | 2 - ca-cert.pem: Root CA certificate 6 - cert.pem / cert-key.pem: Certificate issued by ca-cert.pem, and its private key 29 - test_blocklist_ca_key.pem: Private key for blocklisted CA 31 - test_blocklist_ca.pem: Certificate for blocklisted CA 33 …openssl req -x509 -new -subj "/CN=blacklist test CA" -days 3650 -key test_blocklist_ca_key.pem -ou… 35 - test_nonblocklist_ca_key.pem: Private key for non-blocklisted CA 37 - test_nonblocklist_ca.pem: Certificate for non-blocklisted CA 39 …openssl req -x509 -new -subj "/CN=Test CA" -days 3650 -key test_nonblocklist_ca_key.pem -out test_… 49 - test_leaf_blockedroot.pem: Leaf cert signed by blocked root CA 51 …openssl  req -days 3650  -in test_leaf.csr -out test_leaf_blockedroot.pem -CA test_blocklist_ca.pe… [all …] 
 | 
| /external/rust/crates/grpcio-sys/grpc/src/core/tsi/test_creds/ | 
| D | README | 19 The ca is self-signed: 22 $ openssl req -x509 -new -newkey rsa:2048 -nodes -keyout ca.key -out ca.pem \ 23   -config ca-openssl.cnf -days 3650 -extensions v3_req 26 client is issued by CA: 36 $ openssl x509 -req -CA ca.pem -CAkey ca.key -CAcreateserial -in client.csr \ 39 client1 is issued by CA: 49 $ openssl x509 -req -CA ca.pem -CAkey ca.key -CAcreateserial -in client1.csr \ 52 client2 is issued by CA: 62 $ openssl x509 -req -CA ca.pem -CAkey ca.key -CAcreateserial -in client2.csr \ 65 server0 is issued by CA: [all …] 
 | 
| /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/asn1/x509/ | 
| D | BasicConstraints.java | 17     ASN1Boolean  cA = ASN1Boolean.getInstance(false);  field in BasicConstraints 56             this.cA = null;  in BasicConstraints() 63                 this.cA = ASN1Boolean.getInstance(seq.getObjectAt(0));  in BasicConstraints() 67                 this.cA = null;  in BasicConstraints() 72                 if (this.cA != null)  in BasicConstraints() 85         boolean cA)  in BasicConstraints()  argument 87         if (cA)  in BasicConstraints() 89             this.cA = ASN1Boolean.getInstance(true);  in BasicConstraints() 93             this.cA = null;  in BasicConstraints() 99      * create a cA=true object for the given path length constraint. [all …] 
 | 
| /external/libffi/testsuite/libffi.call/ | 
| D | many_complex.inc | 56   _Complex T_C_TYPE ca[13]; 63       values[i] = &ca[i]; 64       ca[i] = i + (-20 - i) * I; 72     cc =  many(ca[0], ca[1], ca[2], ca[3], ca[4], ca[5], ca[6], ca[7], ca[8], 73 	       ca[9], ca[10], ca[11], ca[12]);
  |