Home
last modified time | relevance | path

Searched full:ca (Results 1 – 25 of 5171) sorted by relevance

12345678910>>...207

/external/tpm2-tss/script/ekca/
Dcreate_ca.sh22 mkdir root-ca
23 pushd root-ca
26 touch root-ca.index
27 echo 00 > root-ca.crlnum
28 echo 1000 > root-ca.serial
31 cp "${EKCADIR}/root-ca.cnf" ./
32 export OPENSSL_CONF=./root-ca.cnf
37 openssl req -new -out root-ca.req.pem -passout file:pass.txt
42 openssl ca -selfsign \
43 -in root-ca.req.pem \
[all …]
Dintermed-ca.cnf19 [ ca ]
27 serial = $dir/intermed-ca.serial
28 database = $dir/intermed-ca.index
30 certificate = $dir/intermed-ca.cert.pem
31 private_key = $dir/private/intermed-ca.key.pem
33 crl = $dir/crl/intermed-ca.crl
35 crlnumber = $dir/intermed-ca.crlnum
70 # Intermediate CA request options
73 default_keyfile = private/intermed-ca.key.pem
84 # Intermediate CA Request Extensions
[all …]
Droot-ca.cnf12 [ ca ]
20 serial = $dir/root-ca.serial
21 database = $dir/root-ca.index
23 certificate = $dir/root-ca.cert.pem
24 private_key = $dir/private/root-ca.key.pem
26 crl = $dir/root-ca.crl
28 crlnumber = $dir/root-ca.crlnum
51 # Root CA Request Options
54 default_keyfile = private/root-ca.key.pem
65 # Root CA Request Extensions
[all …]
/external/linux-kselftest/tools/testing/selftests/bpf/progs/
Dbpf_cubic.c13 * "while (ca->ack_cnt > delta)" loop is changed to the equivalent
14 * "ca->ack_cnt / delta" operation.
94 static inline void bictcp_reset(struct bictcp *ca) in bictcp_reset() argument
96 ca->cnt = 0; in bictcp_reset()
97 ca->last_max_cwnd = 0; in bictcp_reset()
98 ca->last_cwnd = 0; in bictcp_reset()
99 ca->last_time = 0; in bictcp_reset()
100 ca->bic_origin_point = 0; in bictcp_reset()
101 ca->bic_K = 0; in bictcp_reset()
102 ca->delay_min = 0; in bictcp_reset()
[all …]
Dbpf_dctcp.c50 struct dctcp *ca) in dctcp_reset() argument
52 ca->next_seq = tp->snd_nxt; in dctcp_reset()
54 ca->old_delivered = tp->delivered; in dctcp_reset()
55 ca->old_delivered_ce = tp->delivered_ce; in dctcp_reset()
62 struct dctcp *ca = inet_csk_ca(sk); in BPF_PROG() local
85 ca->prior_rcv_nxt = tp->rcv_nxt; in BPF_PROG()
86 ca->dctcp_alpha = min(dctcp_alpha_on_init, DCTCP_MAX_ALPHA); in BPF_PROG()
87 ca->loss_cwnd = 0; in BPF_PROG()
88 ca->ce_state = 0; in BPF_PROG()
95 dctcp_reset(tp, ca); in BPF_PROG()
[all …]
/external/python/cpython2/Lib/email/test/data/
Dmsg_43.txt26ca.gov, xxxxxxxxxxxxx@dot.ca.gov, xxxxxxxxxx@dot.ca.gov, xxxxxxxx@dot.ca.gov, xxxxxxxxxx@dot.ca.go…
41 Reporting-MTA: dns; sacspam01.dot.ca.gov
42 Received-From-MTA: smtp; sacspam01.dot.ca.gov ([127.0.0.1])
45 Final-Recipient: rfc822; xxxxxxx@dot.ca.gov
51 Final-Recipient: rfc822; xxxxxxxxxxxxx@dot.ca.gov
57 Final-Recipient: rfc822; xxxxxxxxxx@dot.ca.gov
63 Final-Recipient: rfc822; xxxxxxxx@dot.ca.gov
69 Final-Recipient: rfc822; xxxxxxxxxx@dot.ca.gov
75 Final-Recipient: rfc822; xxxxxx@dot.ca.gov
81 Final-Recipient: rfc822; xxxxxxxxxx@dot.ca.gov
[all …]
/external/python/cpython3/Lib/test/test_email/data/
Dmsg_43.txt26ca.gov, xxxxxxxxxxxxx@dot.ca.gov, xxxxxxxxxx@dot.ca.gov, xxxxxxxx@dot.ca.gov, xxxxxxxxxx@dot.ca.go…
41 Reporting-MTA: dns; sacspam01.dot.ca.gov
42 Received-From-MTA: smtp; sacspam01.dot.ca.gov ([127.0.0.1])
45 Final-Recipient: rfc822; xxxxxxx@dot.ca.gov
51 Final-Recipient: rfc822; xxxxxxxxxxxxx@dot.ca.gov
57 Final-Recipient: rfc822; xxxxxxxxxx@dot.ca.gov
63 Final-Recipient: rfc822; xxxxxxxx@dot.ca.gov
69 Final-Recipient: rfc822; xxxxxxxxxx@dot.ca.gov
75 Final-Recipient: rfc822; xxxxxx@dot.ca.gov
81 Final-Recipient: rfc822; xxxxxxxxxx@dot.ca.gov
[all …]
/external/mbedtls/tests/suites/
Dtest_suite_x509write.data63ca.key":"PolarSSLTest":"C=NL,O=PolarSSL,CN=PolarSSL Test CA":"1":"20190210144406":"20290210144406"…
67ca.key":"PolarSSLTest":"C=NL,O=PolarSSL,CN=PolarSSL Test CA":"1":"19700210144406":"20290210144406"…
71ca.key":"PolarSSLTest":"C=NL,O=PolarSSL,CN=PolarSSL Test CA":"1":"20190210144406":"20500210144406"…
75ca.key":"PolarSSLTest":"C=NL,O=PolarSSL,CN=PolarSSL Test CA":"1":"19700210144406":"20500210144406"…
79ca.key":"PolarSSLTest":"C=NL,O=PolarSSL,CN=PolarSSL Test CA":"1":"20500210144406":"20590210144406"…
83ca.key":"PolarSSLTest":"C=NL,O=PolarSSL,CN=PolarSSL Test CA":"1":"20190210144406":"20290210144406"…
87ca.key":"PolarSSLTest":"C=NL,O=PolarSSL,CN=PolarSSL Test CA":"1":"20110212144406":"20210212144406"…
91ca.key":"PolarSSLTest":"C=NL,O=PolarSSL,CN=PolarSSL Test CA":"1":"20110212144406":"20210212144406"…
95ca.key":"PolarSSLTest":"C=NL,O=PolarSSL,CN=PolarSSL Test CA":"1":"20190210144406":"20290210144406"…
99ca.key":"PolarSSLTest":"C=NL,O=PolarSSL,CN=PolarSSL Test CA":"1":"20190210144406":"20290210144406"…
[all …]
/external/curl/tests/certs/scripts/
Dgenroot.sh46 if [ ! -f $PREFIX-ca.prm ] ; then
47 echo No configuration file $PREFIX-ca.prm
66 echo "openssl genrsa -out $PREFIX-ca.key -passout XXX $KEYSIZE"
67 openssl genrsa -out $PREFIX-ca.key -passout pass:secret $KEYSIZE
69 echo "openssl req -config $PREFIX-ca.prm -new -key $PREFIX-ca.key -out $PREFIX-ca.csr"
70 $OPENSSL req -config $PREFIX-ca.prm -new -key $PREFIX-ca.key -out $PREFIX-ca.csr -passin pass:secret
72 …ial $SERIAL -extfile $PREFIX-ca.prm -days $DURATION -req -signkey $PREFIX-ca.key -in $PREFIX-ca.cs…
74 …ial $SERIAL -extfile $PREFIX-ca.prm -days $DURATION -req -signkey $PREFIX-ca.key -in $PREFIX-ca.cs…
76 echo "openssl x509 -text -in $PREFIX-$SERIAL-ca.cacert -nameopt multiline > $PREFIX-ca.cacert "
77 $OPENSSL x509 -text -in $PREFIX-$SERIAL-ca.cacert -nameopt multiline > $PREFIX-ca.cacert
[all …]
/external/cronet/net/data/ssl/scripts/
Dgenerate-test-certs.sh50 -config ca.cnf
57 -extfile ca.cnf \
74 -config ca.cnf
77 openssl ca \
83 -config ca.cnf
128 openssl ca \
135 -config ca.cnf
138 openssl ca \
144 -config ca.cnf
149 openssl ca \
[all …]
Dgenerate-multi-root-test-chains.sh9 # while the indication that a CA Foo signed a certificate for CA Bar is denoted
68 CA_COMMON_NAME="${i} Root CA - Multi-root" \
71 -config redundant-ca.cnf \
77 CA_COMMON_NAME="${i} Root CA - Multi-root" \
79 openssl ca \
80 -config redundant-ca.cnf \
85 -extfile redundant-ca.cnf \
95 CA_COMMON_NAME="${i} CA - Multi-root" \
98 -config redundant-ca.cnf \
105 CA_COMMON_NAME="D CA - Multi-root" \
[all …]
Dgenerate-redundant-test-chains.sh45 CA_COMMON_NAME="D Root CA" \
51 -config redundant-ca.cnf
54 CA_COMMON_NAME="D Root CA" \
59 -extfile redundant-ca.cnf \
65 CA_COMMON_NAME="C CA" \
71 -config redundant-ca.cnf
74 CA_COMMON_NAME="C CA" \
79 -extfile redundant-ca.cnf \
87 name="$i Intermediate CA"
88 CA_COMMON_NAME="$i CA" \
[all …]
/external/mbedtls/tests/data_files/
DReadme-x509.txt7 - test-ca.crt aka "C=NL, O=PolarSSL, CN=PolarSSL Test CA"
9 test-ca-sha1.crt and test-ca-sha256.crt use the same key, signed with
11 - test-ca2*.crt aka "C=NL, O=PolarSSL, CN=Polarssl Test EC CA"
17 - test-int-ca.crt "C=NL, O=PolarSSL, CN=PolarSSL Test Intermediate CA"
19 - test-int-ca-exp.crt is a copy that is expired
20 - test-int-ca2.crt "C=NL, O=PolarSSL, CN=PolarSSL Test Intermediate EC CA"
21 uses an EC key with NIST P-384, signed by test-ca
23 A third intermediate CA is signed by test-int-ca2.crt:
24 - test-int-ca3.crt "C=UK, O=mbed TLS, CN=mbed TLS Test intermediate CA 3"
28 - enco-ca-prstr.pem: has its CN encoded as a printable string, but child cert
[all …]
/external/openthread/third_party/mbedtls/repo/tests/data_files/
DReadme-x509.txt7 - test-ca.crt aka "C=NL, O=PolarSSL, CN=PolarSSL Test CA"
9 test-ca-sha1.crt and test-ca-sha256.crt use the same key, signed with
11 - test-ca2*.crt aka "C=NL, O=PolarSSL, CN=Polarssl Test EC CA"
17 - test-int-ca.crt "C=NL, O=PolarSSL, CN=PolarSSL Test Intermediate CA"
19 - test-int-ca-exp.crt is a copy that is expired
20 - test-int-ca2.crt "C=NL, O=PolarSSL, CN=PolarSSL Test Intermediate EC CA"
21 uses an EC key with NIST P-384, signed by test-ca
23 A third intermediate CA is signed by test-int-ca2.crt:
24 - test-int-ca3.crt "C=UK, O=mbed TLS, CN=mbed TLS Test intermediate CA 3"
28 - enco-ca-prstr.pem: has its CN encoded as a printable string, but child cert
[all …]
/external/cronet/net/data/ssl/chrome_root_store/
Droot_store.md7 …e01ce0ba86a64fbfebcc7aab5afc155b37fd76066 | CN=Actalis Authentication Root CA,O=Actalis S.p.A./033…
8 18ce6cfe7bf14e60b2e347b8dfe868cb31d02ebb3ada271569f50343b46db3a4 | CN=Amazon Root CA 3,O=Amazon,C=U…
9 1ba5b2aa8c65401a82960118f80bec4f62304d83cec4713a19c39c011ea46db4 | CN=Amazon Root CA 2,O=Amazon,C=U…
11 8ecde6884f3d87b1125ba31ac3fcb13d7016de7f57cc904fe1cb97c6ae98196e | CN=Amazon Root CA 1,O=Amazon,C=U…
12 e35d28419ed02025cfa69038cd623962458da5c695fbdea3c22b0bfb25897092 | CN=Amazon Root CA 4,O=Amazon,C=U…
13 5c58468d55f58e497e743982d2b50010b6d165374acf83a7d4a32db768c4408e | CN=Certum Trusted Network CA,OU=…
14 b676f2eddae8775cd36cb0f63cd1d4603961f49e6265ba013a2f0307b6d0b804 | CN=Certum Trusted Network CA 2,O…
17 9a114025197c5bb95d94e63d55cd43790847b646b23cdf11ada4a00eff15fb48 | CN=Buypass Class 2 Root CA,O=Buy…
18 edf7ebbca27a2a384d387b7d4010c666e2edb4843e4c29b4ae1d5b9332e6b24d | CN=Buypass Class 3 Root CA,O=Buy…
19 657cfe2fa73faa38462571f332a2363a46fce7020951710702cdfbb6eeda3305 | OU=certSIGN ROOT CA G2,O=CERTSIG…
[all …]
Droot_store.textproto13 # CN=Actalis Authentication Root CA, O=Actalis S.p.A./03358520967, L=Milan, C=IT
20 # CN=Amazon Root CA 3, O=Amazon, C=US
27 # CN=Amazon Root CA 2, O=Amazon, C=US
42 # CN=Amazon Root CA 1, O=Amazon, C=US
49 # CN=Amazon Root CA 4, O=Amazon, C=US
56 # CN=Certum Trusted Network CA, OU=Certum Certification Authority, O=Unizeto Technologies S.A., C=PL
63 # CN=Certum Trusted Network CA 2, OU=Certum Certification Authority, O=Unizeto Technologies S.A., C…
80 # CN=Buypass Class 2 Root CA, O=Buypass AS-983163327, C=NO
85 # CN=Buypass Class 3 Root CA, O=Buypass AS-983163327, C=NO
92 # OU=certSIGN ROOT CA G2, O=CERTSIGN SA, C=RO
[all …]
/external/cronet/net/data/crl_unittest/
Dgenerate_crl_test_data.py91 'CA:%s' % ('TRUE' if is_ca else 'FALSE'))])
106 ROOT_CA = CreateCert('Test CA', None)
109 CA = CreateCert('Test Intermediate CA', ROOT_CA, variable
111 CA_NO_KEYUSAGE = CreateCert('Test Intermediate CA', ROOT_CA,
112 pkey=CA['pkey'], key_usage=None)
113 CA_KEYUSAGE_NOCRLSIGN = CreateCert('Test Intermediate CA', ROOT_CA,
114 pkey=CA['pkey'],
117 # A different CA with a different name and key.
118 OTHER_CA = CreateCert('Test Other Intermediate CA', ROOT_CA)
122 LEAF = CreateCert('Test Cert', CA, crl_dp='URI:http://example.com/foo.crl', is_ca=False)
[all …]
/external/curl/docs/
DSSLCERTS.md22 This system is about trust. In your local CA certificate store you have certs
38 by using a CA certificate store that the SSL library can use to make sure the
42 certificates in the CA store, you can be sure that the remote server really is
45 If the remote server uses a self-signed certificate, if you do not install a CA
46 cert store, if the server uses a certificate signed by a CA that is not
56 2. Get a CA certificate that can verify the remote server and use the proper
57 option to point out this CA cert for verification when connecting. For
62 3. Add the CA cert for your server to the existing default CA certificate
63 store. The default CA certificate store can be changed at compile time with
66 `--with-ca-bundle=FILE`: use the specified file as the CA certificate
[all …]
/external/clang/test/SemaCXX/
Derr_typecheck_assign_const_filecheck.cpp58 void test1(A a, const A Ca) { in test1() argument
61 Ca.b.c.d.e.Mnum = 5; in test1()
63 Ca.b.c.d.e.Snum = 5; in test1()
64 Ca.b.c.Md.e.num = 5; in test1()
65 Ca.Mb.Cc.d.e.Mnum = 5; in test1()
66 Ca.Mb.getC().d.e.num = 5; in test1()
67 Ca.getSB().c.d.e.num = 5; in test1()
69 Ca.Cb.Cc.Cd.Ce.Snum = 5; in test1()
75 void test2(A a, const A Ca) { in test2() argument
76 Ca.b.c.d.e.num = 5; in test2()
[all …]
/external/python/httplib2/script/
Dgenerate-tls19 openssl rsa -in ca.key -check -noout
32 [[ -f ca.key ]] || openssl genrsa -out ca.key $rsa_bits
37 echo "- generate CA" >&2
38 …sl req -batch -new -nodes -x509 -days $days -subj "$subj_prefix/CN=$org-CA" -key ca.key -out ca.pem
39 …openssl req -batch -new -nodes -x509 -days $days -subj "$subj_prefix/CN=$org-CA-unused" -key ca.ke…
43 …openssl x509 -req -in tmp.csr -CA ca.pem -CAkey ca.key -CAcreateserial -out client.crt -days $days…
45 cat client.crt ca.pem client.key >client_chain.pem
49 …openssl x509 -req -in tmp.csr -CA ca.pem -CAkey ca.key -CAcreateserial -out client_encrypted.crt -…
54 …openssl x509 -req -in tmp.csr -CA ca.pem -CAkey ca.key -CAcreateserial -out server.crt -days $days…
56 cat server.crt ca.pem server.key >server_chain.pem
/external/cronet/net/data/ocsp_unittest/
Dmake_ocsp.py89 ROOT_CA = CreateCert('Test CA', None)
90 CA = CreateCert('Test Intermediate CA', ROOT_CA) variable
91 CA_LINK = CreateCert('Test OCSP Signer', CA, True)
92 CA_BADLINK = CreateCert('Test False OCSP Signer', CA, False)
93 CERT = CreateCert('Test Cert', CA)
197 signer = CA
290 def Store(fname, description, ca, data): argument
291 ca_cert_pem = crypto.dump_certificate(crypto.FILETYPE_PEM, ca[1])
299 ca_cert_pem.replace('CERTIFICATE', 'CA CERTIFICATE'),
308 CA,
[all …]
/external/conscrypt/openjdk/src/test/resources/
DREADME2 - ca-cert.pem: Root CA certificate
6 - cert.pem / cert-key.pem: Certificate issued by ca-cert.pem, and its private key
29 - test_blocklist_ca_key.pem: Private key for blocklisted CA
31 - test_blocklist_ca.pem: Certificate for blocklisted CA
33 …openssl req -x509 -new -subj "/CN=blacklist test CA" -days 3650 -key test_blocklist_ca_key.pem -ou…
35 - test_nonblocklist_ca_key.pem: Private key for non-blocklisted CA
37 - test_nonblocklist_ca.pem: Certificate for non-blocklisted CA
39 …openssl req -x509 -new -subj "/CN=Test CA" -days 3650 -key test_nonblocklist_ca_key.pem -out test_…
49 - test_leaf_blockedroot.pem: Leaf cert signed by blocked root CA
51 …openssl req -days 3650 -in test_leaf.csr -out test_leaf_blockedroot.pem -CA test_blocklist_ca.pe…
[all …]
/external/rust/crates/grpcio-sys/grpc/src/core/tsi/test_creds/
DREADME19 The ca is self-signed:
22 $ openssl req -x509 -new -newkey rsa:2048 -nodes -keyout ca.key -out ca.pem \
23 -config ca-openssl.cnf -days 3650 -extensions v3_req
26 client is issued by CA:
36 $ openssl x509 -req -CA ca.pem -CAkey ca.key -CAcreateserial -in client.csr \
39 client1 is issued by CA:
49 $ openssl x509 -req -CA ca.pem -CAkey ca.key -CAcreateserial -in client1.csr \
52 client2 is issued by CA:
62 $ openssl x509 -req -CA ca.pem -CAkey ca.key -CAcreateserial -in client2.csr \
65 server0 is issued by CA:
[all …]
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/asn1/x509/
DBasicConstraints.java17 ASN1Boolean cA = ASN1Boolean.getInstance(false); field in BasicConstraints
56 this.cA = null; in BasicConstraints()
63 this.cA = ASN1Boolean.getInstance(seq.getObjectAt(0)); in BasicConstraints()
67 this.cA = null; in BasicConstraints()
72 if (this.cA != null) in BasicConstraints()
85 boolean cA) in BasicConstraints() argument
87 if (cA) in BasicConstraints()
89 this.cA = ASN1Boolean.getInstance(true); in BasicConstraints()
93 this.cA = null; in BasicConstraints()
99 * create a cA=true object for the given path length constraint.
[all …]
/external/libffi/testsuite/libffi.call/
Dmany_complex.inc56 _Complex T_C_TYPE ca[13];
63 values[i] = &ca[i];
64 ca[i] = i + (-20 - i) * I;
72 cc = many(ca[0], ca[1], ca[2], ca[3], ca[4], ca[5], ca[6], ca[7], ca[8],
73 ca[9], ca[10], ca[11], ca[12]);

12345678910>>...207