Home
last modified time | relevance | path

Searched full:ca (Results 1 – 25 of 6749) sorted by relevance

12345678910>>...270

/external/tpm2-tss/script/ekca/
Dcreate_ca.sh22 mkdir root-ca
23 pushd root-ca
26 touch root-ca.index
27 echo 00 > root-ca.crlnum
28 echo 1000 > root-ca.serial
31 cp "${EKCADIR}/root-ca.cnf" ./
32 export OPENSSL_CONF=./root-ca.cnf
37 openssl req -new -out root-ca.req.pem -passout file:pass.txt
42 openssl ca -selfsign \
43 -in root-ca.req.pem \
[all …]
/external/linux-kselftest/tools/testing/selftests/bpf/progs/
Dbpf_cubic.c13 * "while (ca->ack_cnt > delta)" loop is changed to the equivalent
14 * "ca->ack_cnt / delta" operation.
94 static inline void bictcp_reset(struct bictcp *ca) in bictcp_reset() argument
96 ca->cnt = 0; in bictcp_reset()
97 ca->last_max_cwnd = 0; in bictcp_reset()
98 ca->last_cwnd = 0; in bictcp_reset()
99 ca->last_time = 0; in bictcp_reset()
100 ca->bic_origin_point = 0; in bictcp_reset()
101 ca->bic_K = 0; in bictcp_reset()
102 ca->delay_min = 0; in bictcp_reset()
[all …]
/external/google-cloud-java/java-security-private-ca/
DCHANGELOG.md3 …-cloud-java/compare/google-cloud-security-private-ca-v2.6.1-SNAPSHOT...google-cloud-security-priva…
25 …ogle-cloud-java/compare/google-cloud-security-private-ca-v2.5.4...google-cloud-security-private-ca
47 ## [2.5.4](https://github.com/googleapis/java-security-private-ca/compare/v2.5.3...v2.5.4) (2022-10…
52 …om/googleapis/java-security-private-ca/issues/472)) ([41f2dc2](https://github.com/googleapis/java-…
53 …om/googleapis/java-security-private-ca/issues/481)) ([744e0c6](https://github.com/googleapis/java-…
54 …om/googleapis/java-security-private-ca/issues/469)) ([9aeda2c](https://github.com/googleapis/java-…
55 …om/googleapis/java-security-private-ca/issues/470)) ([37650e7](https://github.com/googleapis/java-…
56 …om/googleapis/java-security-private-ca/issues/468)) ([5eedec1](https://github.com/googleapis/java-…
57 …om/googleapis/java-security-private-ca/issues/474)) ([3f78d76](https://github.com/googleapis/java-…
58 …om/googleapis/java-security-private-ca/issues/471)) ([fae78b7](https://github.com/googleapis/java-…
[all …]
/external/python/cpython3/Lib/test/test_email/data/
Dmsg_43.txt26ca.gov, xxxxxxxxxxxxx@dot.ca.gov, xxxxxxxxxx@dot.ca.gov, xxxxxxxx@dot.ca.gov, xxxxxxxxxx@dot.ca.go…
41 Reporting-MTA: dns; sacspam01.dot.ca.gov
42 Received-From-MTA: smtp; sacspam01.dot.ca.gov ([127.0.0.1])
45 Final-Recipient: rfc822; xxxxxxx@dot.ca.gov
51 Final-Recipient: rfc822; xxxxxxxxxxxxx@dot.ca.gov
57 Final-Recipient: rfc822; xxxxxxxxxx@dot.ca.gov
63 Final-Recipient: rfc822; xxxxxxxx@dot.ca.gov
69 Final-Recipient: rfc822; xxxxxxxxxx@dot.ca.gov
75 Final-Recipient: rfc822; xxxxxx@dot.ca.gov
81 Final-Recipient: rfc822; xxxxxxxxxx@dot.ca.gov
[all …]
/external/python/cpython2/Lib/email/test/data/
Dmsg_43.txt26ca.gov, xxxxxxxxxxxxx@dot.ca.gov, xxxxxxxxxx@dot.ca.gov, xxxxxxxx@dot.ca.gov, xxxxxxxxxx@dot.ca.go…
41 Reporting-MTA: dns; sacspam01.dot.ca.gov
42 Received-From-MTA: smtp; sacspam01.dot.ca.gov ([127.0.0.1])
45 Final-Recipient: rfc822; xxxxxxx@dot.ca.gov
51 Final-Recipient: rfc822; xxxxxxxxxxxxx@dot.ca.gov
57 Final-Recipient: rfc822; xxxxxxxxxx@dot.ca.gov
63 Final-Recipient: rfc822; xxxxxxxx@dot.ca.gov
69 Final-Recipient: rfc822; xxxxxxxxxx@dot.ca.gov
75 Final-Recipient: rfc822; xxxxxx@dot.ca.gov
81 Final-Recipient: rfc822; xxxxxxxxxx@dot.ca.gov
[all …]
/external/mbedtls/tests/suites/
Dtest_suite_x509write.data63ca.key":"PolarSSLTest":"C=NL,O=PolarSSL,CN=PolarSSL Test CA":"01":"20190210144406":"20290210144406…
67ca.key":"PolarSSLTest":"C=NL,O=PolarSSL,CN=PolarSSL Test CA":"01":"19700210144406":"20290210144406…
71ca.key":"PolarSSLTest":"C=NL,O=PolarSSL,CN=PolarSSL Test CA":"01":"20190210144406":"20500210144406…
75ca.key":"PolarSSLTest":"C=NL,O=PolarSSL,CN=PolarSSL Test CA":"01":"19700210144406":"20500210144406…
79ca.key":"PolarSSLTest":"C=NL,O=PolarSSL,CN=PolarSSL Test CA":"01":"20500210144406":"20590210144406…
83ca.key":"PolarSSLTest":"C=NL,O=PolarSSL,CN=PolarSSL Test CA":"01":"20190210144406":"20290210144406…
87ca.key":"PolarSSLTest":"C=NL,O=PolarSSL,CN=PolarSSL Test CA":"01":"20110212144406":"20210212144406…
91ca.key":"PolarSSLTest":"C=NL,O=PolarSSL,CN=PolarSSL Test CA":"01":"20110212144406":"20210212144406…
95ca.key":"PolarSSLTest":"C=NL,O=PolarSSL,CN=PolarSSL Test CA":"01":"20190210144406":"20290210144406…
99ca.key":"PolarSSLTest":"C=NL,O=PolarSSL,CN=PolarSSL Test CA":"01":"20190210144406":"20290210144406…
[all …]
/external/aws-sdk-java-v2/services/acmpca/src/main/resources/codegen-resources/
Ddocs-2.json3CA). You must first call the <a>CreateCertificateAuthority</a> operation. If successful, the opera…
5CA). You must specify the CA configuration, the revocation configuration, the CA type, and an opti…
6 …ditReport":"<p>Creates an audit report that lists every time that the your CA private key is used.…
7CA). You must provide the ARN (Amazon Resource Name) of the private CA that you want to delete. Yo…
8CA). You specify the private CA on input by its ARN (Amazon Resource Name). The output contains th…
9 …ration. Audit information is created every time the certificate authority (CA) private key is used…
10CA. The ARN of the certificate is returned when you call the <a>IssueCertificate</a> operation. Yo…
11 …vate certificate authority (CA). Both the certificate and the chain are base64 PEM-encoded. The ch…
12CA). The CSR is created when you call the <a>CreateCertificateAuthority</a> operation. Take the CS…
13CA certificate into ACM PCA. Before you can call this operation, you must create the private certi…
[all …]
/external/cronet/net/data/ssl/scripts/
Dgenerate-test-certs.sh50 -config ca.cnf
57 -extfile ca.cnf \
74 -config ca.cnf
77 openssl ca \
83 -config ca.cnf
128 openssl ca \
135 -config ca.cnf
138 openssl ca \
144 -config ca.cnf
149 openssl ca \
[all …]
Dgenerate-multi-root-test-chains.sh9 # while the indication that a CA Foo signed a certificate for CA Bar is denoted
68 CA_COMMON_NAME="${i} Root CA - Multi-root" \
71 -config redundant-ca.cnf \
77 CA_COMMON_NAME="${i} Root CA - Multi-root" \
79 openssl ca \
80 -config redundant-ca.cnf \
85 -extfile redundant-ca.cnf \
95 CA_COMMON_NAME="${i} CA - Multi-root" \
98 -config redundant-ca.cnf \
105 CA_COMMON_NAME="D CA - Multi-root" \
[all …]
/external/openthread/third_party/mbedtls/repo/tests/data_files/
DReadme-x509.txt7 - test-ca.crt aka "C=NL, O=PolarSSL, CN=PolarSSL Test CA"
9 test-ca-sha1.crt and test-ca-sha256.crt use the same key, signed with
11 - test-ca2*.crt aka "C=NL, O=PolarSSL, CN=Polarssl Test EC CA"
17 - test-int-ca.crt "C=NL, O=PolarSSL, CN=PolarSSL Test Intermediate CA"
19 - test-int-ca-exp.crt is a copy that is expired
20 - test-int-ca2.crt "C=NL, O=PolarSSL, CN=PolarSSL Test Intermediate EC CA"
21 uses an EC key with NIST P-384, signed by test-ca
23 A third intermediate CA is signed by test-int-ca2.crt:
24 - test-int-ca3.crt "C=UK, O=mbed TLS, CN=mbed TLS Test intermediate CA 3"
28 - enco-ca-prstr.pem: has its CN encoded as a printable string, but child cert
[all …]
/external/mbedtls/tests/data_files/
DReadme-x509.txt7 - test-ca.crt aka "C=NL, O=PolarSSL, CN=PolarSSL Test CA"
9 test-ca-sha1.crt and test-ca-sha256.crt use the same key, signed with
11 - test-ca2*.crt aka "C=NL, O=PolarSSL, CN=Polarssl Test EC CA"
17 - test-int-ca.crt "C=NL, O=PolarSSL, CN=PolarSSL Test Intermediate CA"
19 - test-int-ca-exp.crt is a copy that is expired
20 - test-int-ca2.crt "C=NL, O=PolarSSL, CN=PolarSSL Test Intermediate EC CA"
21 uses an EC key with NIST P-384, signed by test-ca
23 A third intermediate CA is signed by test-int-ca2.crt:
24 - test-int-ca3.crt "C=UK, O=mbed TLS, CN=mbed TLS Test intermediate CA 3"
28 - enco-ca-prstr.pem: has its CN encoded as a printable string, but child cert
[all …]
/external/bazelbuild-rules_java/java/
Drepositories.bzl96 strip_prefix = "zulu8.50.51.263-ca-jdk8.0.275-linux_aarch64",
98 …"https://mirror.bazel.build/openjdk/azul-zulu-8.50.0.51-ca-jdk8.0.275/zulu8.50.51.263-ca-jdk8.0.27…
99 … "https://cdn.azul.com/zulu-embedded/bin/zulu8.50.51.263-ca-jdk8.0.275-linux_aarch64.tar.gz",
125 strip_prefix = "zulu8.50.0.51-ca-jdk8.0.275-linux_x64",
127 …"https://mirror.bazel.build/openjdk/azul-zulu-8.50.0.51-ca-jdk8.0.275/zulu8.50.0.51-ca-jdk8.0.275-…
128 "https://cdn.azul.com/zulu/bin/zulu8.50.0.51-ca-jdk8.0.275-linux_x64.tar.gz",
140 strip_prefix = "zulu8.62.0.19-ca-jdk8.0.332-macosx_aarch64",
142 "https://cdn.azul.com/zulu/bin/zulu8.62.0.19-ca-jdk8.0.332-macosx_aarch64.tar.gz",
154 strip_prefix = "zulu8.50.0.51-ca-jdk8.0.275-macosx_x64",
156 …"https://mirror.bazel.build/openjdk/azul-zulu-8.50.0.51-ca-jdk8.0.275/zulu8.50.0.51-ca-jdk8.0.275-…
[all …]
/external/cronet/net/data/ssl/chrome_root_store/
Droot_store.md7 …e01ce0ba86a64fbfebcc7aab5afc155b37fd76066 | CN=Actalis Authentication Root CA,O=Actalis S.p.A./033…
8 18ce6cfe7bf14e60b2e347b8dfe868cb31d02ebb3ada271569f50343b46db3a4 | CN=Amazon Root CA 3,O=Amazon,C=U…
9 1ba5b2aa8c65401a82960118f80bec4f62304d83cec4713a19c39c011ea46db4 | CN=Amazon Root CA 2,O=Amazon,C=U…
10 8ecde6884f3d87b1125ba31ac3fcb13d7016de7f57cc904fe1cb97c6ae98196e | CN=Amazon Root CA 1,O=Amazon,C=U…
11 e35d28419ed02025cfa69038cd623962458da5c695fbdea3c22b0bfb25897092 | CN=Amazon Root CA 4,O=Amazon,C=U…
12 5c58468d55f58e497e743982d2b50010b6d165374acf83a7d4a32db768c4408e | CN=Certum Trusted Network CA,OU=…
13 b676f2eddae8775cd36cb0f63cd1d4603961f49e6265ba013a2f0307b6d0b804 | CN=Certum Trusted Network CA 2,O…
16 9a114025197c5bb95d94e63d55cd43790847b646b23cdf11ada4a00eff15fb48 | CN=Buypass Class 2 Root CA,O=Buy…
17 edf7ebbca27a2a384d387b7d4010c666e2edb4843e4c29b4ae1d5b9332e6b24d | CN=Buypass Class 3 Root CA,O=Buy…
18 657cfe2fa73faa38462571f332a2363a46fce7020951710702cdfbb6eeda3305 | OU=certSIGN ROOT CA G2,O=CERTSIG…
[all …]
Droot_store.textproto13 # CN=Actalis Authentication Root CA, O=Actalis S.p.A./03358520967, L=Milan, C=IT
20 # CN=Amazon Root CA 3, O=Amazon, C=US
27 # CN=Amazon Root CA 2, O=Amazon, C=US
34 # CN=Amazon Root CA 1, O=Amazon, C=US
41 # CN=Amazon Root CA 4, O=Amazon, C=US
48 # CN=Certum Trusted Network CA, OU=Certum Certification Authority, O=Unizeto Technologies S.A., C=PL
55 # CN=Certum Trusted Network CA 2, OU=Certum Certification Authority, O=Unizeto Technologies S.A., C…
72 # CN=Buypass Class 2 Root CA, O=Buypass AS-983163327, C=NO
77 # CN=Buypass Class 3 Root CA, O=Buypass AS-983163327, C=NO
84 # OU=certSIGN ROOT CA G2, O=CERTSIGN SA, C=RO
[all …]
/external/cronet/third_party/boringssl/src/pki/testdata/crl_unittest/
Dgenerate_crl_test_data.py91 'CA:%s' % ('TRUE' if is_ca else 'FALSE'))])
106 ROOT_CA = CreateCert('Test CA', None)
109 CA = CreateCert('Test Intermediate CA', ROOT_CA, variable
111 CA_NO_KEYUSAGE = CreateCert('Test Intermediate CA', ROOT_CA,
112 pkey=CA['pkey'], key_usage=None)
113 CA_KEYUSAGE_NOCRLSIGN = CreateCert('Test Intermediate CA', ROOT_CA,
114 pkey=CA['pkey'],
117 # A different CA with a different name and key.
118 OTHER_CA = CreateCert('Test Other Intermediate CA', ROOT_CA)
122 LEAF = CreateCert('Test Cert', CA, crl_dp='URI:http://example.com/foo.crl', is_ca=False)
[all …]
/external/cronet/net/data/crl_unittest/
Dgenerate_crl_test_data.py91 'CA:%s' % ('TRUE' if is_ca else 'FALSE'))])
106 ROOT_CA = CreateCert('Test CA', None)
109 CA = CreateCert('Test Intermediate CA', ROOT_CA, variable
111 CA_NO_KEYUSAGE = CreateCert('Test Intermediate CA', ROOT_CA,
112 pkey=CA['pkey'], key_usage=None)
113 CA_KEYUSAGE_NOCRLSIGN = CreateCert('Test Intermediate CA', ROOT_CA,
114 pkey=CA['pkey'],
117 # A different CA with a different name and key.
118 OTHER_CA = CreateCert('Test Other Intermediate CA', ROOT_CA)
122 LEAF = CreateCert('Test Cert', CA, crl_dp='URI:http://example.com/foo.crl', is_ca=False)
[all …]
/external/rust/crates/grpcio-sys/grpc/src/core/tsi/test_creds/
DREADME19 The ca is self-signed:
22 $ openssl req -x509 -new -newkey rsa:2048 -nodes -keyout ca.key -out ca.pem \
23 -config ca-openssl.cnf -days 3650 -extensions v3_req
26 client is issued by CA:
36 $ openssl x509 -req -CA ca.pem -CAkey ca.key -CAcreateserial -in client.csr \
39 client1 is issued by CA:
49 $ openssl x509 -req -CA ca.pem -CAkey ca.key -CAcreateserial -in client1.csr \
52 client2 is issued by CA:
62 $ openssl x509 -req -CA ca.pem -CAkey ca.key -CAcreateserial -in client2.csr \
65 client-with-spiffe is issued by CA:
[all …]
/external/grpc-grpc/src/core/tsi/test_creds/
DREADME19 The ca is self-signed:
22 $ openssl req -x509 -new -newkey rsa:2048 -nodes -keyout ca.key -out ca.pem \
23 -config ca-openssl.cnf -days 3650 -extensions v3_req
26 client is issued by CA:
36 $ openssl x509 -req -CA ca.pem -CAkey ca.key -CAcreateserial -in client.csr \
39 client1 is issued by CA:
49 $ openssl x509 -req -CA ca.pem -CAkey ca.key -CAcreateserial -in client1.csr \
52 client2 is issued by CA:
62 $ openssl x509 -req -CA ca.pem -CAkey ca.key -CAcreateserial -in client2.csr \
65 client-with-spiffe is issued by CA:
[all …]
/external/python/httplib2/script/
Dgenerate-tls19 openssl rsa -in ca.key -check -noout
32 [[ -f ca.key ]] || openssl genrsa -out ca.key $rsa_bits
37 echo "- generate CA" >&2
38 …sl req -batch -new -nodes -x509 -days $days -subj "$subj_prefix/CN=$org-CA" -key ca.key -out ca.pem
39 …openssl req -batch -new -nodes -x509 -days $days -subj "$subj_prefix/CN=$org-CA-unused" -key ca.ke…
43 …openssl x509 -req -in tmp.csr -CA ca.pem -CAkey ca.key -CAcreateserial -out client.crt -days $days…
45 cat client.crt ca.pem client.key >client_chain.pem
49 …openssl x509 -req -in tmp.csr -CA ca.pem -CAkey ca.key -CAcreateserial -out client_encrypted.crt -…
54 …openssl x509 -req -in tmp.csr -CA ca.pem -CAkey ca.key -CAcreateserial -out server.crt -days $days…
56 cat server.crt ca.pem server.key >server_chain.pem
/external/clang/test/SemaCXX/
Derr_typecheck_assign_const_filecheck.cpp58 void test1(A a, const A Ca) { in test1() argument
61 Ca.b.c.d.e.Mnum = 5; in test1()
63 Ca.b.c.d.e.Snum = 5; in test1()
64 Ca.b.c.Md.e.num = 5; in test1()
65 Ca.Mb.Cc.d.e.Mnum = 5; in test1()
66 Ca.Mb.getC().d.e.num = 5; in test1()
67 Ca.getSB().c.d.e.num = 5; in test1()
69 Ca.Cb.Cc.Cd.Ce.Snum = 5; in test1()
75 void test2(A a, const A Ca) { in test2() argument
76 Ca.b.c.d.e.num = 5; in test2()
[all …]
/external/curl/docs/
DSSLCERTS.md28 This system is about trust. In your local CA certificate store you have certs
44 by using a CA certificate store that the SSL library can use to make sure the
48 certificates in the CA store, you can be sure that the remote server really is
51 If the remote server uses a self-signed certificate, if you do not install a CA
52 cert store, if the server uses a certificate signed by a CA that is not
62 2. Get a CA certificate that can verify the remote server and use the proper
63 option to point out this CA cert for verification when connecting. For
68 3. Add the CA cert for your server to the existing default CA certificate
69 store. The default CA certificate store can be changed at compile time with
72 `--with-ca-bundle=FILE`: use the specified file as the CA certificate
[all …]
/external/grpc-grpc/test/core/tsi/test_creds/crl_data/
DREADME4 The ca is self-signed:
7 $ openssl req -x509 -new -newkey rsa:2048 -nodes -keyout ca.key -out ca.pem \
8 -config ca-openssl.cnf -days 3650 -extensions v3_req
11 valid is issued by CA:
21 $ openssl x509 -req -CA ca.pem -CAkey ca.key -CAcreateserial -in valid.csr \
24 revoked is issued by CA:
34 $ openssl x509 -req -CA ca.pem -CAkey ca.key -CAcreateserial -in revoked.csr \
37 $ openssl ca -revoke revoked.pem -keyfile ca.key -cert ca.pem -days 3650
41 $ openssl ca -gencrl -out current.crl -keyfile ca.key -cert ca.pem -crldays 3650
44 Generate a chain with a leaf cert signed by an intermediate CA and revoke the intermediate certific…
[all …]
/external/conscrypt/openjdk/src/test/resources/
DREADME2 - ca-cert.pem: Root CA certificate
6 - cert.pem / cert-key.pem: Certificate issued by ca-cert.pem, and its private key
29 - test_blocklist_ca_key.pem: Private key for blocklisted CA
31 - test_blocklist_ca.pem: Certificate for blocklisted CA
33 …openssl req -x509 -new -subj "/CN=blacklist test CA" -days 3650 -key test_blocklist_ca_key.pem -ou…
35 - test_nonblocklist_ca_key.pem: Private key for non-blocklisted CA
37 - test_nonblocklist_ca.pem: Certificate for non-blocklisted CA
39 …openssl req -x509 -new -subj "/CN=Test CA" -days 3650 -key test_nonblocklist_ca_key.pem -out test_…
49 - test_leaf_blockedroot.pem: Leaf cert signed by blocked root CA
51 …openssl req -days 3650 -in test_leaf.csr -out test_leaf_blockedroot.pem -CA test_blocklist_ca.pe…
[all …]
/external/cronet/third_party/boringssl/src/pki/testdata/ocsp_unittest/
Dmake_ocsp.py89 ROOT_CA = CreateCert('Test CA', None)
90 CA = CreateCert('Test Intermediate CA', ROOT_CA) variable
91 CA_LINK = CreateCert('Test OCSP Signer', CA, True)
92 CA_BADLINK = CreateCert('Test False OCSP Signer', CA, False)
93 CERT = CreateCert('Test Cert', CA)
197 signer = CA
290 def Store(fname, description, ca, data): argument
291 ca_cert_pem = crypto.dump_certificate(crypto.FILETYPE_PEM, ca[1])
299 ca_cert_pem.replace('CERTIFICATE', 'CA CERTIFICATE'),
308 CA,
[all …]
/external/cronet/net/data/ocsp_unittest/
Dmake_ocsp.py89 ROOT_CA = CreateCert('Test CA', None)
90 CA = CreateCert('Test Intermediate CA', ROOT_CA) variable
91 CA_LINK = CreateCert('Test OCSP Signer', CA, True)
92 CA_BADLINK = CreateCert('Test False OCSP Signer', CA, False)
93 CERT = CreateCert('Test Cert', CA)
197 signer = CA
290 def Store(fname, description, ca, data): argument
291 ca_cert_pem = crypto.dump_certificate(crypto.FILETYPE_PEM, ca[1])
299 ca_cert_pem.replace('CERTIFICATE', 'CA CERTIFICATE'),
308 CA,
[all …]

12345678910>>...270