Home
last modified time | relevance | path

Searched +full:ca +full:- +full:certificates (Results 1 – 25 of 834) sorted by relevance

12345678910>>...34

/external/cronet/net/data/ssl/scripts/
Dgenerate-test-certs.sh4 # Use of this source code is governed by a BSD-style license that can be
7 # This script generates a set of test (end-entity, intermediate, root)
8 # certificates that can be used to test fetching of an intermediate via AIA.
9 set -e -x
11 # The maximum lifetime for any certificates that may go through a "real"
13 # min(OS verifier max lifetime for local certs, built-in verifier max lifetime
16 # The current built-in verifier max lifetime is 39 months
18 # iOS 13/macOS 10.15 - https://support.apple.com/en-us/HT210176
19 # 730 is used here as just a short-hand for 2 years
22 rm -rf out
[all …]
Dgenerate-client-certificates.sh4 # Use of this source code is governed by a BSD-style license that can be
7 # This script generates certificates that can be used to test SSL client
9 # net/data/ssl/certificates, but may be re-generated for manual testing.
11 # This script generates several chains of test client certificates:
13 # 1. A (end-entity) -> B -> C (self-signed root)
14 # 2. D (end-entity) -> E -> C (self-signed root)
15 # 3. F (end-entity) -> E -> C (self-signed root)
16 # 4. G (end-entity, P-256) -> E -> C (self-signed root)
17 # 5. H (end-entity, P-384) -> E -> C (self-signed root)
18 # 6. I (end-entity, P-521) -> E -> C (self-signed root)
[all …]
Dgenerate-multi-root-test-chains.sh4 # Use of this source code is governed by a BSD-style license that can be
9 # while the indication that a CA Foo signed a certificate for CA Bar is denoted
12 # +---+ +-----+
14 # +---+ +-----+
16 # +--v v--+ |
17 # +---+ +---+
19 # +---+ +---+
21 # v v---+
22 # +-----+
24 # +-----+
[all …]
Dgenerate-duplicate-cn-certs.sh4 # Use of this source code is governed by a BSD-style license that can be
7 # This script generates two chains of test certificates:
8 # 1. A1 (end-entity) -> B (self-signed root)
9 # 2. A2 (end-entity) -> B (self-signed root)
15 # nicknames for both certificates.
22 try rm -rf out
26 try /bin/sh -c "echo 01 > out/B-serial"
27 try touch out/B-index.txt
30 try openssl genrsa -out out/A.key 2048
31 try openssl genrsa -out out/B.key 2048
[all …]
Dgenerate-quic-chain.sh4 # Use of this source code is governed by a BSD-style license that can be
7 # This script generates a test chain of (end-entity, intermediate, root)
8 # certificates used to run a test QUIC server.
14 try rm -rf out
18 try /bin/sh -c "echo 01 > out/quic-test-root-serial"
19 try /bin/sh -c "echo 01 > out/quic-test-intermediate-serial"
22 touch out/quic-test-root-index.txt
23 touch out/quic-test-intermediate-index.txt
26 try openssl genrsa -out out/quic-test-root.key 2048
27 try openssl genrsa -out out/quic-test-intermediate.key 2048
[all …]
Dgenerate-redundant-test-chains.sh4 # Use of this source code is governed by a BSD-style license that can be
7 # This script generates two chains of test certificates:
9 # 1. A (end-entity) -> B -> C -> D (self-signed root)
10 # 2. A (end-entity) -> B -> C2 (self-signed root)
12 # in which A, B, C, and D have distinct keypairs. C2 is a self-signed root
27 try rm -rf out
34 try /bin/sh -c "echo $serial > out/$i-serial"
39 try openssl genrsa -out out/A.key 2048
40 try openssl genrsa -out out/B.key 2048
41 try openssl genrsa -out out/C.key 2048
[all …]
Dca.cnf7 CA_COMMON_NAME = Test Root CA
9 [ca]
13 # The default test root, used to generate certificates and CRLs.
19 type = $key_size-$algo-$cert_type
20 database = $dir/$type-index.txt
22 serial = $dir/$type-serial
35 basicConstraints = critical, CA:false
41 # Extensions to add when signing a request for an intermediate/CA cert
42 basicConstraints = critical, CA:true
62 # The request section used to generate the root CA certificate. This should
[all …]
/external/cronet/net/docs/
Dcertificate-transparency.md10 append-only data structure that can log certificates that are issued by
12 By logging certificates, it becomes possible for the public to see what
13 certificates have been issued by a given CA. This allows site operators to
16 the broader community, to examine the certificates a CA has issued and ensure
17 that the CA is complying with their expected or disclosed practices.
20 * https://www.certificate-transparency.org
21 …nsparency and Nimbus](https://blog.cloudflare.com/introducing-certificate-transparency-and-nimbus/)
30 [Certificate Transparency in Chrome](https://github.com/chromium/ct-policy/blob/master/ct_policy.md)
37 a stapled OCSP response, or directly by the TLS server. Nearly every CA
44 way to enable CT support. If you obtain a certificate from your CA and it does
[all …]
Dcertificate_lifetimes.md4 reducing the maximum allowed lifetimes of TLS certificates.
8 Beginning with Chrome 85, TLS server certificates issued on or after
9 2020-09-01 00:00:00 UTC will be required to have a validity period of 398 days
10 or less. This will only apply to TLS server certificates from CAs that are
12 "publicly trusted CAs", and will not apply to locally-operated CAs that have
15 Certificates that do not comply with this requirement will not work, and may
18 If a certificate that does not comply with this requirement is issued by a CA
20 failure to comply with the security policies necessary to being a trusted CA,
21 and may result in the removal of trust of that CA’s certificates.
26 of the certificate is on or after 2020-09-01 00:00:00 UTC, or if the first
[all …]
/external/curl/docs/
DSSLCERTS.md1 <!--
4 SPDX-License-Identifier: curl
5 -->
11 ----------
16 ----------
20 you. Scroll down for details on how the OS-native engines handle SSL
21 certificates. If you are not sure, then run "curl -V" and read the results. If
26 -----------------
28 This system is about trust. In your local CA certificate store you have certs
30 the server certificates you see are valid. They are signed by one of the
[all …]
Dmk-ca-bundle.md1 ---
3 SPDX-License-Identifier: curl
4 Title: mk-ca-bundle
6 Source: mk-ca-bundle
7 See-also:
8 - curl (1)
9 ---
13 mk-ca-bundle - convert Mozilla's certificate bundle to PEM format
17 mk-ca-bundle [options] [output]
22 HTTPS, then parses it and extracts the included certificates into PEM format.
[all …]
/external/cronet/net/data/ssl/chrome_root_store/
Dfaq.md10 [digital certificates](https://en.wikipedia.org/wiki/Public_key_certificate)
11 (often referred to as “certificates,” “HTTPS certificates,” or “server
12 authentication certificates”) to ensure the connections it makes on behalf
13 of its users are secure and private. Certificates bind a domain name to a
18 that a recognized system known as a “Certification Authority” (CA) issued
19 its certificate. Certificates issued by a CA not recognized by Chrome or a
23 applications what certificates to trust. The
24 [Chrome Root Store](https://g.co/chrome/root-store) contains the set of
25 certificates Chrome trusts by default.
51 See the troubleshooting steps [here](#can-you-help_i_m-experiencing-problems).
[all …]
/external/openscreen/cast/common/certificate/
Dcast_cert_validator_unittest.cc2 // Use of this source code is governed by a BSD-style license that can be
22 // Uses the built-in trust store for Cast. This is how certificates are
26 // Instead of using the built-in trust store, use root certificate in the
30 // TrustAnchors in the built-in store are setup.
40 // * |expected_policy| - The policy that should have been identified for the
42 // * |time| - The timestamp to use when verifying the certificate.
43 // * |trust_store_dependency| - Which trust store to use when verifying (see
45 // * |optional_signed_data_file_name| - optional path to a PEM file containing
74 // built-in Cast roots). in RunTest()
76 fake_trust_store->certs.emplace_back(fake_root); in RunTest()
[all …]
/external/rust/crates/x509-cert/src/ext/pkix/constraints/
Dbasic.rs8 /// cA BOOLEAN DEFAULT FALSE,
13 /// [RFC 5280 Section 4.2.1.9]: https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.9
18 pub ca: bool, field
31 ) -> bool { in critical()
32 // https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.9 in critical()
33 // Conforming CAs MUST include this extension in all CA certificates in critical()
35 // certificates and MUST mark the extension as critical in such in critical()
36 // certificates. This extension MAY appear as a critical or non- in critical()
37 // critical extension in CA certificates that contain public keys used in critical()
39 // certificates. Such CA certificates include ones that contain public in critical()
[all …]
/external/cronet/third_party/boringssl/src/pki/testdata/ssl/certificates/
DREADME1 This directory contains various certificates for use with SSL-related
4 ===== Real-world certificates that need manual updating
5 - google.binary.p7b
6 - google.chain.pem
7 - google.pem_cert.p7b
8 - google.pem_pkcs7.p7b
9 - google.pkcs7.p7b
10 - google.single.der
11 - google.single.pem : Certificates for testing parsing of different formats.
13 - mit.davidben.der : An expired MIT client certificate.
[all …]
/external/cronet/net/data/ssl/certificates/
DREADME1 This directory contains various certificates for use with SSL-related
4 ===== Real-world certificates that need manual updating
5 - google.binary.p7b
6 - google.chain.pem
7 - google.pem_cert.p7b
8 - google.pem_pkcs7.p7b
9 - google.pkcs7.p7b
10 - google.single.der
11 - google.single.pem : Certificates for testing parsing of different formats.
13 - mit.davidben.der : An expired MIT client certificate.
[all …]
/external/python/cpython2/Doc/library/
Dssl.rst1 :mod:`ssl` --- TLS/SSL wrapper for socket objects
19 --------------
23 sockets, both client-side and server-side. This module uses the OpenSSL
38 Don't use this module without reading the :ref:`ssl-security`. Doing so
44 general information about TLS, SSL, and certificates, the reader is referred to
48 :class:`socket.socket` type, and provides a socket-like wrapper that also
55 helps manage settings and certificates, which can then be inherited
60 ------------------------------------
66 higher-level encryption and authentication layer that's superimposed on the
98 A subclass of :exc:`SSLError` raised by a :ref:`non-blocking SSL socket
[all …]
/external/googleapis/google/cloud/security/privateca/v1beta1/
Dresources.proto7 // http://www.apache.org/licenses/LICENSE-2.0
35 …curity.privateca.v1beta1.CertificateAuthority] can be used to create [Certificates][google.cloud.s…
42 …// Options that affect all certificates issued by a [CertificateAuthority][google.cloud.security.p…
44 // Required. When true, includes a URL to the issuing CA certificate in the
48 // Required. When true, includes a URL to the CRL corresponding to certificates
56 …// [Certificates][google.cloud.security.privateca.v1beta1.Certificate] will not be successfully is…
60 …// Required. All [Certificates][google.cloud.security.privateca.v1beta1.Certificate] issued by the…
69 // [Certificates][google.cloud.security.privateca.v1beta1.Certificate].
71 // Optional. Contains valid, fully-qualified host names. Glob patterns are also
85 // Optional. Contains valid RFC 2822 E-mail addresses. Glob patterns are also
[all …]
/external/google-cloud-java/java-security-private-ca/proto-google-cloud-security-private-ca-v1beta1/src/main/proto/google/cloud/security/privateca/v1beta1/
Dresources.proto7 // http://www.apache.org/licenses/LICENSE-2.0
35 …curity.privateca.v1beta1.CertificateAuthority] can be used to create [Certificates][google.cloud.s…
42 …// Options that affect all certificates issued by a [CertificateAuthority][google.cloud.security.p…
44 // Required. When true, includes a URL to the issuing CA certificate in the
48 // Required. When true, includes a URL to the CRL corresponding to certificates
56 …// [Certificates][google.cloud.security.privateca.v1beta1.Certificate] will not be successfully is…
60 …// Required. All [Certificates][google.cloud.security.privateca.v1beta1.Certificate] issued by the…
69 // [Certificates][google.cloud.security.privateca.v1beta1.Certificate].
71 // Optional. Contains valid, fully-qualified host names. Glob patterns are also
85 // Optional. Contains valid RFC 2822 E-mail addresses. Glob patterns are also
[all …]
/external/googleapis/google/cloud/security/privateca/v1/
Dresources.proto7 // http://www.apache.org/licenses/LICENSE-2.0
39 // [Certificates][google.cloud.security.privateca.v1.Certificate].
53 // Self-signed CA.
56 // Subordinate CA. Could be issued by a Private CA
58 // or an unmanaged CA.
69 // Certificates can be issued from this CA. CRLs will be generated for this
70 // CA. The CA will be part of the
72 // will be used to issue certificates from the
76 // Certificates cannot be issued from this CA. CRLs will still be generated.
77 // The CA will be part of the
[all …]
/external/cronet/net/cert/internal/
Drevocation_checker.h2 // Use of this source code is governed by a BSD-style license that can be
21 // For the status of Subscriber Certificates: If the CA publishes a CRL,
22 // then the CA SHALL update and reissue CRLs at least once every seven
27 // For the status of Subscriber Certificates: The CA SHALL update
37 // For the status of Subordinate CA Certificates: The CA SHALL update and
39 // hours after revoking a Subordinate CA Certificate, and the value of the
44 // For the status of Subordinate CA Certificates: The CA SHALL update
47 // Subordinate CA Certificate.
55 // Callers should not rely on the default-initialized value, but should fully
79 // If set to true, considers certificates lacking URLs for OCSP/CRL to be
[all …]
/external/openthread/third_party/mbedtls/repo/tests/data_files/
DReadme-x509.txt1 This documents the X.509 CAs, certificates, and CRLS used for testing.
4 -------------------------
7 - test-ca.crt aka "C=NL, O=PolarSSL, CN=PolarSSL Test CA"
8 uses a RSA-2048 key
9 test-ca-sha1.crt and test-ca-sha256.crt use the same key, signed with
11 - test-ca2*.crt aka "C=NL, O=PolarSSL, CN=Polarssl Test EC CA"
12 uses an EC key with NIST P-384 (aka secp384r1)
14 The files test-ca_cat12 and test-ca_cat21 contain them concatenated both ways.
17 - test-int-ca.crt "C=NL, O=PolarSSL, CN=PolarSSL Test Intermediate CA"
18 uses RSA-4096, signed by test-ca2
[all …]
/external/mbedtls/tests/data_files/
DReadme-x509.txt1 This documents the X.509 CAs, certificates, and CRLS used for testing.
4 -------------------------
7 - test-ca.crt aka "C=NL, O=PolarSSL, CN=PolarSSL Test CA"
8 uses a RSA-2048 key
9 test-ca-sha1.crt and test-ca-sha256.crt use the same key, signed with
11 - test-ca2*.crt aka "C=NL, O=PolarSSL, CN=Polarssl Test EC CA"
12 uses an EC key with NIST P-384 (aka secp384r1)
14 The files test-ca_cat12 and test-ca_cat21 contain them concatenated both ways.
17 - test-int-ca.crt "C=NL, O=PolarSSL, CN=PolarSSL Test Intermediate CA"
18 uses RSA-4096, signed by test-ca2
[all …]
/external/google-cloud-java/java-security-private-ca/proto-google-cloud-security-private-ca-v1/src/main/java/com/google/cloud/security/privateca/v1/
DFetchCaCertsResponse.java8 * https://www.apache.org/licenses/LICENSE-2.0
80 * The certificates that form the CA chain, from leaf to root order.
83 * <code>repeated string certificates = 1;</code>
85 * @return A list containing the certificates.
92 * The certificates that form the CA chain, from leaf to root order.
95 * <code>repeated string certificates = 1;</code>
97 * @return The count of certificates.
104 * The certificates that form the CA chain, from leaf to root order.
107 * <code>repeated string certificates = 1;</code>
110 * @return The certificates at the given index.
[all …]
/external/aws-sdk-java-v2/services/acmpca/src/main/resources/codegen-resources/
Ddocs-2.json3CA). You must first call the <a>CreateCertificateAuthority</a> operation. If successful, the opera…
5CA). You must specify the CA configuration, the revocation configuration, the CA type, and an opti…
6 …ditReport":"<p>Creates an audit report that lists every time that the your CA private key is used.…
7CA). You must provide the ARN (Amazon Resource Name) of the private CA that you want to delete. Yo…
8CA). You specify the private CA on input by its ARN (Amazon Resource Name). The output contains th…
9 …ration. Audit information is created every time the certificate authority (CA) private key is used…
10CA. The ARN of the certificate is returned when you call the <a>IssueCertificate</a> operation. Yo…
11 …vate certificate authority (CA). Both the certificate and the chain are base64 PEM-encoded. The ch…
12CA). The CSR is created when you call the <a>CreateCertificateAuthority</a> operation. Take the CS…
13CA certificate into ACM PCA. Before you can call this operation, you must create the private certi…
[all …]

12345678910>>...34