| /external/tpm2-tss/script/ekca/ |
| D | create_ca.sh | 22 mkdir root-ca 23 pushd root-ca 26 touch root-ca.index 27 echo 00 > root-ca.crlnum 28 echo 1000 > root-ca.serial 31 cp "${EKCADIR}/root-ca.cnf" ./ 32 export OPENSSL_CONF=./root-ca.cnf 37 openssl req -new -out root-ca.req.pem -passout file:pass.txt 42 openssl ca -selfsign \ 43 -in root-ca.req.pem \ [all …]
|
| /external/linux-kselftest/tools/testing/selftests/bpf/progs/ |
| D | bpf_cubic.c | 13 * "while (ca->ack_cnt > delta)" loop is changed to the equivalent 14 * "ca->ack_cnt / delta" operation. 94 static inline void bictcp_reset(struct bictcp *ca) in bictcp_reset() argument 96 ca->cnt = 0; in bictcp_reset() 97 ca->last_max_cwnd = 0; in bictcp_reset() 98 ca->last_cwnd = 0; in bictcp_reset() 99 ca->last_time = 0; in bictcp_reset() 100 ca->bic_origin_point = 0; in bictcp_reset() 101 ca->bic_K = 0; in bictcp_reset() 102 ca->delay_min = 0; in bictcp_reset() [all …]
|
| /external/google-cloud-java/java-security-private-ca/ |
| D | CHANGELOG.md | 3 …-cloud-java/compare/google-cloud-security-private-ca-v2.6.1-SNAPSHOT...google-cloud-security-priva… 25 …ogle-cloud-java/compare/google-cloud-security-private-ca-v2.5.4...google-cloud-security-private-ca… 47 ## [2.5.4](https://github.com/googleapis/java-security-private-ca/compare/v2.5.3...v2.5.4) (2022-10… 52 …om/googleapis/java-security-private-ca/issues/472)) ([41f2dc2](https://github.com/googleapis/java-… 53 …om/googleapis/java-security-private-ca/issues/481)) ([744e0c6](https://github.com/googleapis/java-… 54 …om/googleapis/java-security-private-ca/issues/469)) ([9aeda2c](https://github.com/googleapis/java-… 55 …om/googleapis/java-security-private-ca/issues/470)) ([37650e7](https://github.com/googleapis/java-… 56 …om/googleapis/java-security-private-ca/issues/468)) ([5eedec1](https://github.com/googleapis/java-… 57 …om/googleapis/java-security-private-ca/issues/474)) ([3f78d76](https://github.com/googleapis/java-… 58 …om/googleapis/java-security-private-ca/issues/471)) ([fae78b7](https://github.com/googleapis/java-… [all …]
|
| /external/python/cpython3/Lib/test/test_email/data/ |
| D | msg_43.txt | 26 …ca.gov, xxxxxxxxxxxxx@dot.ca.gov, xxxxxxxxxx@dot.ca.gov, xxxxxxxx@dot.ca.gov, xxxxxxxxxx@dot.ca.go… 41 Reporting-MTA: dns; sacspam01.dot.ca.gov 42 Received-From-MTA: smtp; sacspam01.dot.ca.gov ([127.0.0.1]) 45 Final-Recipient: rfc822; xxxxxxx@dot.ca.gov 51 Final-Recipient: rfc822; xxxxxxxxxxxxx@dot.ca.gov 57 Final-Recipient: rfc822; xxxxxxxxxx@dot.ca.gov 63 Final-Recipient: rfc822; xxxxxxxx@dot.ca.gov 69 Final-Recipient: rfc822; xxxxxxxxxx@dot.ca.gov 75 Final-Recipient: rfc822; xxxxxx@dot.ca.gov 81 Final-Recipient: rfc822; xxxxxxxxxx@dot.ca.gov [all …]
|
| /external/python/cpython2/Lib/email/test/data/ |
| D | msg_43.txt | 26 …ca.gov, xxxxxxxxxxxxx@dot.ca.gov, xxxxxxxxxx@dot.ca.gov, xxxxxxxx@dot.ca.gov, xxxxxxxxxx@dot.ca.go… 41 Reporting-MTA: dns; sacspam01.dot.ca.gov 42 Received-From-MTA: smtp; sacspam01.dot.ca.gov ([127.0.0.1]) 45 Final-Recipient: rfc822; xxxxxxx@dot.ca.gov 51 Final-Recipient: rfc822; xxxxxxxxxxxxx@dot.ca.gov 57 Final-Recipient: rfc822; xxxxxxxxxx@dot.ca.gov 63 Final-Recipient: rfc822; xxxxxxxx@dot.ca.gov 69 Final-Recipient: rfc822; xxxxxxxxxx@dot.ca.gov 75 Final-Recipient: rfc822; xxxxxx@dot.ca.gov 81 Final-Recipient: rfc822; xxxxxxxxxx@dot.ca.gov [all …]
|
| /external/mbedtls/tests/suites/ |
| D | test_suite_x509write.data | 63 …ca.key":"PolarSSLTest":"C=NL,O=PolarSSL,CN=PolarSSL Test CA":"01":"20190210144406":"20290210144406… 67 …ca.key":"PolarSSLTest":"C=NL,O=PolarSSL,CN=PolarSSL Test CA":"01":"19700210144406":"20290210144406… 71 …ca.key":"PolarSSLTest":"C=NL,O=PolarSSL,CN=PolarSSL Test CA":"01":"20190210144406":"20500210144406… 75 …ca.key":"PolarSSLTest":"C=NL,O=PolarSSL,CN=PolarSSL Test CA":"01":"19700210144406":"20500210144406… 79 …ca.key":"PolarSSLTest":"C=NL,O=PolarSSL,CN=PolarSSL Test CA":"01":"20500210144406":"20590210144406… 83 …ca.key":"PolarSSLTest":"C=NL,O=PolarSSL,CN=PolarSSL Test CA":"01":"20190210144406":"20290210144406… 87 …ca.key":"PolarSSLTest":"C=NL,O=PolarSSL,CN=PolarSSL Test CA":"01":"20110212144406":"20210212144406… 91 …ca.key":"PolarSSLTest":"C=NL,O=PolarSSL,CN=PolarSSL Test CA":"01":"20110212144406":"20210212144406… 95 …ca.key":"PolarSSLTest":"C=NL,O=PolarSSL,CN=PolarSSL Test CA":"01":"20190210144406":"20290210144406… 99 …ca.key":"PolarSSLTest":"C=NL,O=PolarSSL,CN=PolarSSL Test CA":"01":"20190210144406":"20290210144406… [all …]
|
| /external/aws-sdk-java-v2/services/acmpca/src/main/resources/codegen-resources/ |
| D | docs-2.json | 3 …CA). You must first call the <a>CreateCertificateAuthority</a> operation. If successful, the opera… 5 …CA). You must specify the CA configuration, the revocation configuration, the CA type, and an opti… 6 …ditReport":"<p>Creates an audit report that lists every time that the your CA private key is used.… 7 …CA). You must provide the ARN (Amazon Resource Name) of the private CA that you want to delete. Yo… 8 …CA). You specify the private CA on input by its ARN (Amazon Resource Name). The output contains th… 9 …ration. Audit information is created every time the certificate authority (CA) private key is used… 10 …CA. The ARN of the certificate is returned when you call the <a>IssueCertificate</a> operation. Yo… 11 …vate certificate authority (CA). Both the certificate and the chain are base64 PEM-encoded. The ch… 12 …CA). The CSR is created when you call the <a>CreateCertificateAuthority</a> operation. Take the CS… 13 …CA certificate into ACM PCA. Before you can call this operation, you must create the private certi… [all …]
|
| /external/cronet/net/data/ssl/scripts/ |
| D | generate-test-certs.sh | 50 -config ca.cnf 57 -extfile ca.cnf \ 74 -config ca.cnf 77 openssl ca \ 83 -config ca.cnf 128 openssl ca \ 135 -config ca.cnf 138 openssl ca \ 144 -config ca.cnf 149 openssl ca \ [all …]
|
| D | generate-multi-root-test-chains.sh | 9 # while the indication that a CA Foo signed a certificate for CA Bar is denoted 68 CA_COMMON_NAME="${i} Root CA - Multi-root" \ 71 -config redundant-ca.cnf \ 77 CA_COMMON_NAME="${i} Root CA - Multi-root" \ 79 openssl ca \ 80 -config redundant-ca.cnf \ 85 -extfile redundant-ca.cnf \ 95 CA_COMMON_NAME="${i} CA - Multi-root" \ 98 -config redundant-ca.cnf \ 105 CA_COMMON_NAME="D CA - Multi-root" \ [all …]
|
| /external/openthread/third_party/mbedtls/repo/tests/data_files/ |
| D | Readme-x509.txt | 7 - test-ca.crt aka "C=NL, O=PolarSSL, CN=PolarSSL Test CA" 9 test-ca-sha1.crt and test-ca-sha256.crt use the same key, signed with 11 - test-ca2*.crt aka "C=NL, O=PolarSSL, CN=Polarssl Test EC CA" 17 - test-int-ca.crt "C=NL, O=PolarSSL, CN=PolarSSL Test Intermediate CA" 19 - test-int-ca-exp.crt is a copy that is expired 20 - test-int-ca2.crt "C=NL, O=PolarSSL, CN=PolarSSL Test Intermediate EC CA" 21 uses an EC key with NIST P-384, signed by test-ca 23 A third intermediate CA is signed by test-int-ca2.crt: 24 - test-int-ca3.crt "C=UK, O=mbed TLS, CN=mbed TLS Test intermediate CA 3" 28 - enco-ca-prstr.pem: has its CN encoded as a printable string, but child cert [all …]
|
| /external/mbedtls/tests/data_files/ |
| D | Readme-x509.txt | 7 - test-ca.crt aka "C=NL, O=PolarSSL, CN=PolarSSL Test CA" 9 test-ca-sha1.crt and test-ca-sha256.crt use the same key, signed with 11 - test-ca2*.crt aka "C=NL, O=PolarSSL, CN=Polarssl Test EC CA" 17 - test-int-ca.crt "C=NL, O=PolarSSL, CN=PolarSSL Test Intermediate CA" 19 - test-int-ca-exp.crt is a copy that is expired 20 - test-int-ca2.crt "C=NL, O=PolarSSL, CN=PolarSSL Test Intermediate EC CA" 21 uses an EC key with NIST P-384, signed by test-ca 23 A third intermediate CA is signed by test-int-ca2.crt: 24 - test-int-ca3.crt "C=UK, O=mbed TLS, CN=mbed TLS Test intermediate CA 3" 28 - enco-ca-prstr.pem: has its CN encoded as a printable string, but child cert [all …]
|
| /external/bazelbuild-rules_java/java/ |
| D | repositories.bzl | 96 strip_prefix = "zulu8.50.51.263-ca-jdk8.0.275-linux_aarch64", 98 …"https://mirror.bazel.build/openjdk/azul-zulu-8.50.0.51-ca-jdk8.0.275/zulu8.50.51.263-ca-jdk8.0.27… 99 … "https://cdn.azul.com/zulu-embedded/bin/zulu8.50.51.263-ca-jdk8.0.275-linux_aarch64.tar.gz", 125 strip_prefix = "zulu8.50.0.51-ca-jdk8.0.275-linux_x64", 127 …"https://mirror.bazel.build/openjdk/azul-zulu-8.50.0.51-ca-jdk8.0.275/zulu8.50.0.51-ca-jdk8.0.275-… 128 "https://cdn.azul.com/zulu/bin/zulu8.50.0.51-ca-jdk8.0.275-linux_x64.tar.gz", 140 strip_prefix = "zulu8.62.0.19-ca-jdk8.0.332-macosx_aarch64", 142 "https://cdn.azul.com/zulu/bin/zulu8.62.0.19-ca-jdk8.0.332-macosx_aarch64.tar.gz", 154 strip_prefix = "zulu8.50.0.51-ca-jdk8.0.275-macosx_x64", 156 …"https://mirror.bazel.build/openjdk/azul-zulu-8.50.0.51-ca-jdk8.0.275/zulu8.50.0.51-ca-jdk8.0.275-… [all …]
|
| /external/cronet/net/data/ssl/chrome_root_store/ |
| D | root_store.md | 7 …e01ce0ba86a64fbfebcc7aab5afc155b37fd76066 | CN=Actalis Authentication Root CA,O=Actalis S.p.A./033… 8 18ce6cfe7bf14e60b2e347b8dfe868cb31d02ebb3ada271569f50343b46db3a4 | CN=Amazon Root CA 3,O=Amazon,C=U… 9 1ba5b2aa8c65401a82960118f80bec4f62304d83cec4713a19c39c011ea46db4 | CN=Amazon Root CA 2,O=Amazon,C=U… 10 8ecde6884f3d87b1125ba31ac3fcb13d7016de7f57cc904fe1cb97c6ae98196e | CN=Amazon Root CA 1,O=Amazon,C=U… 11 e35d28419ed02025cfa69038cd623962458da5c695fbdea3c22b0bfb25897092 | CN=Amazon Root CA 4,O=Amazon,C=U… 12 5c58468d55f58e497e743982d2b50010b6d165374acf83a7d4a32db768c4408e | CN=Certum Trusted Network CA,OU=… 13 b676f2eddae8775cd36cb0f63cd1d4603961f49e6265ba013a2f0307b6d0b804 | CN=Certum Trusted Network CA 2,O… 16 9a114025197c5bb95d94e63d55cd43790847b646b23cdf11ada4a00eff15fb48 | CN=Buypass Class 2 Root CA,O=Buy… 17 edf7ebbca27a2a384d387b7d4010c666e2edb4843e4c29b4ae1d5b9332e6b24d | CN=Buypass Class 3 Root CA,O=Buy… 18 657cfe2fa73faa38462571f332a2363a46fce7020951710702cdfbb6eeda3305 | OU=certSIGN ROOT CA G2,O=CERTSIG… [all …]
|
| D | root_store.textproto | 13 # CN=Actalis Authentication Root CA, O=Actalis S.p.A./03358520967, L=Milan, C=IT 20 # CN=Amazon Root CA 3, O=Amazon, C=US 27 # CN=Amazon Root CA 2, O=Amazon, C=US 34 # CN=Amazon Root CA 1, O=Amazon, C=US 41 # CN=Amazon Root CA 4, O=Amazon, C=US 48 # CN=Certum Trusted Network CA, OU=Certum Certification Authority, O=Unizeto Technologies S.A., C=PL 55 # CN=Certum Trusted Network CA 2, OU=Certum Certification Authority, O=Unizeto Technologies S.A., C… 72 # CN=Buypass Class 2 Root CA, O=Buypass AS-983163327, C=NO 77 # CN=Buypass Class 3 Root CA, O=Buypass AS-983163327, C=NO 84 # OU=certSIGN ROOT CA G2, O=CERTSIGN SA, C=RO [all …]
|
| /external/cronet/third_party/boringssl/src/pki/testdata/crl_unittest/ |
| D | generate_crl_test_data.py | 91 'CA:%s' % ('TRUE' if is_ca else 'FALSE'))]) 106 ROOT_CA = CreateCert('Test CA', None) 109 CA = CreateCert('Test Intermediate CA', ROOT_CA, variable 111 CA_NO_KEYUSAGE = CreateCert('Test Intermediate CA', ROOT_CA, 112 pkey=CA['pkey'], key_usage=None) 113 CA_KEYUSAGE_NOCRLSIGN = CreateCert('Test Intermediate CA', ROOT_CA, 114 pkey=CA['pkey'], 117 # A different CA with a different name and key. 118 OTHER_CA = CreateCert('Test Other Intermediate CA', ROOT_CA) 122 LEAF = CreateCert('Test Cert', CA, crl_dp='URI:http://example.com/foo.crl', is_ca=False) [all …]
|
| /external/cronet/net/data/crl_unittest/ |
| D | generate_crl_test_data.py | 91 'CA:%s' % ('TRUE' if is_ca else 'FALSE'))]) 106 ROOT_CA = CreateCert('Test CA', None) 109 CA = CreateCert('Test Intermediate CA', ROOT_CA, variable 111 CA_NO_KEYUSAGE = CreateCert('Test Intermediate CA', ROOT_CA, 112 pkey=CA['pkey'], key_usage=None) 113 CA_KEYUSAGE_NOCRLSIGN = CreateCert('Test Intermediate CA', ROOT_CA, 114 pkey=CA['pkey'], 117 # A different CA with a different name and key. 118 OTHER_CA = CreateCert('Test Other Intermediate CA', ROOT_CA) 122 LEAF = CreateCert('Test Cert', CA, crl_dp='URI:http://example.com/foo.crl', is_ca=False) [all …]
|
| /external/rust/crates/grpcio-sys/grpc/src/core/tsi/test_creds/ |
| D | README | 19 The ca is self-signed: 22 $ openssl req -x509 -new -newkey rsa:2048 -nodes -keyout ca.key -out ca.pem \ 23 -config ca-openssl.cnf -days 3650 -extensions v3_req 26 client is issued by CA: 36 $ openssl x509 -req -CA ca.pem -CAkey ca.key -CAcreateserial -in client.csr \ 39 client1 is issued by CA: 49 $ openssl x509 -req -CA ca.pem -CAkey ca.key -CAcreateserial -in client1.csr \ 52 client2 is issued by CA: 62 $ openssl x509 -req -CA ca.pem -CAkey ca.key -CAcreateserial -in client2.csr \ 65 client-with-spiffe is issued by CA: [all …]
|
| /external/grpc-grpc/src/core/tsi/test_creds/ |
| D | README | 19 The ca is self-signed: 22 $ openssl req -x509 -new -newkey rsa:2048 -nodes -keyout ca.key -out ca.pem \ 23 -config ca-openssl.cnf -days 3650 -extensions v3_req 26 client is issued by CA: 36 $ openssl x509 -req -CA ca.pem -CAkey ca.key -CAcreateserial -in client.csr \ 39 client1 is issued by CA: 49 $ openssl x509 -req -CA ca.pem -CAkey ca.key -CAcreateserial -in client1.csr \ 52 client2 is issued by CA: 62 $ openssl x509 -req -CA ca.pem -CAkey ca.key -CAcreateserial -in client2.csr \ 65 client-with-spiffe is issued by CA: [all …]
|
| /external/python/httplib2/script/ |
| D | generate-tls | 19 openssl rsa -in ca.key -check -noout 32 [[ -f ca.key ]] || openssl genrsa -out ca.key $rsa_bits 37 echo "- generate CA" >&2 38 …sl req -batch -new -nodes -x509 -days $days -subj "$subj_prefix/CN=$org-CA" -key ca.key -out ca.pem 39 …openssl req -batch -new -nodes -x509 -days $days -subj "$subj_prefix/CN=$org-CA-unused" -key ca.ke… 43 …openssl x509 -req -in tmp.csr -CA ca.pem -CAkey ca.key -CAcreateserial -out client.crt -days $days… 45 cat client.crt ca.pem client.key >client_chain.pem 49 …openssl x509 -req -in tmp.csr -CA ca.pem -CAkey ca.key -CAcreateserial -out client_encrypted.crt -… 54 …openssl x509 -req -in tmp.csr -CA ca.pem -CAkey ca.key -CAcreateserial -out server.crt -days $days… 56 cat server.crt ca.pem server.key >server_chain.pem
|
| /external/clang/test/SemaCXX/ |
| D | err_typecheck_assign_const_filecheck.cpp | 58 void test1(A a, const A Ca) { in test1() argument 61 Ca.b.c.d.e.Mnum = 5; in test1() 63 Ca.b.c.d.e.Snum = 5; in test1() 64 Ca.b.c.Md.e.num = 5; in test1() 65 Ca.Mb.Cc.d.e.Mnum = 5; in test1() 66 Ca.Mb.getC().d.e.num = 5; in test1() 67 Ca.getSB().c.d.e.num = 5; in test1() 69 Ca.Cb.Cc.Cd.Ce.Snum = 5; in test1() 75 void test2(A a, const A Ca) { in test2() argument 76 Ca.b.c.d.e.num = 5; in test2() [all …]
|
| /external/curl/docs/ |
| D | SSLCERTS.md | 28 This system is about trust. In your local CA certificate store you have certs 44 by using a CA certificate store that the SSL library can use to make sure the 48 certificates in the CA store, you can be sure that the remote server really is 51 If the remote server uses a self-signed certificate, if you do not install a CA 52 cert store, if the server uses a certificate signed by a CA that is not 62 2. Get a CA certificate that can verify the remote server and use the proper 63 option to point out this CA cert for verification when connecting. For 68 3. Add the CA cert for your server to the existing default CA certificate 69 store. The default CA certificate store can be changed at compile time with 72 `--with-ca-bundle=FILE`: use the specified file as the CA certificate [all …]
|
| /external/grpc-grpc/test/core/tsi/test_creds/crl_data/ |
| D | README | 4 The ca is self-signed: 7 $ openssl req -x509 -new -newkey rsa:2048 -nodes -keyout ca.key -out ca.pem \ 8 -config ca-openssl.cnf -days 3650 -extensions v3_req 11 valid is issued by CA: 21 $ openssl x509 -req -CA ca.pem -CAkey ca.key -CAcreateserial -in valid.csr \ 24 revoked is issued by CA: 34 $ openssl x509 -req -CA ca.pem -CAkey ca.key -CAcreateserial -in revoked.csr \ 37 $ openssl ca -revoke revoked.pem -keyfile ca.key -cert ca.pem -days 3650 41 $ openssl ca -gencrl -out current.crl -keyfile ca.key -cert ca.pem -crldays 3650 44 Generate a chain with a leaf cert signed by an intermediate CA and revoke the intermediate certific… [all …]
|
| /external/conscrypt/openjdk/src/test/resources/ |
| D | README | 2 - ca-cert.pem: Root CA certificate 6 - cert.pem / cert-key.pem: Certificate issued by ca-cert.pem, and its private key 29 - test_blocklist_ca_key.pem: Private key for blocklisted CA 31 - test_blocklist_ca.pem: Certificate for blocklisted CA 33 …openssl req -x509 -new -subj "/CN=blacklist test CA" -days 3650 -key test_blocklist_ca_key.pem -ou… 35 - test_nonblocklist_ca_key.pem: Private key for non-blocklisted CA 37 - test_nonblocklist_ca.pem: Certificate for non-blocklisted CA 39 …openssl req -x509 -new -subj "/CN=Test CA" -days 3650 -key test_nonblocklist_ca_key.pem -out test_… 49 - test_leaf_blockedroot.pem: Leaf cert signed by blocked root CA 51 …openssl req -days 3650 -in test_leaf.csr -out test_leaf_blockedroot.pem -CA test_blocklist_ca.pe… [all …]
|
| /external/cronet/third_party/boringssl/src/pki/testdata/ocsp_unittest/ |
| D | make_ocsp.py | 89 ROOT_CA = CreateCert('Test CA', None) 90 CA = CreateCert('Test Intermediate CA', ROOT_CA) variable 91 CA_LINK = CreateCert('Test OCSP Signer', CA, True) 92 CA_BADLINK = CreateCert('Test False OCSP Signer', CA, False) 93 CERT = CreateCert('Test Cert', CA) 197 signer = CA 290 def Store(fname, description, ca, data): argument 291 ca_cert_pem = crypto.dump_certificate(crypto.FILETYPE_PEM, ca[1]) 299 ca_cert_pem.replace('CERTIFICATE', 'CA CERTIFICATE'), 308 CA, [all …]
|
| /external/cronet/net/data/ocsp_unittest/ |
| D | make_ocsp.py | 89 ROOT_CA = CreateCert('Test CA', None) 90 CA = CreateCert('Test Intermediate CA', ROOT_CA) variable 91 CA_LINK = CreateCert('Test OCSP Signer', CA, True) 92 CA_BADLINK = CreateCert('Test False OCSP Signer', CA, False) 93 CERT = CreateCert('Test Cert', CA) 197 signer = CA 290 def Store(fname, description, ca, data): argument 291 ca_cert_pem = crypto.dump_certificate(crypto.FILETYPE_PEM, ca[1]) 299 ca_cert_pem.replace('CERTIFICATE', 'CA CERTIFICATE'), 308 CA, [all …]
|