Home
last modified time | relevance | path

Searched refs:CA (Results 1 – 25 of 505) sorted by relevance

12345678910>>...21

/external/openssl/android.testssl/
Dtestssl22 CA="-CApath ../certs"
24 CA="-CAfile $3"
39 $ssltest -ssl2 -server_auth $CA $extra || exit 1
43 $ssltest -ssl2 -client_auth $CA $extra || exit 1
46 $ssltest -ssl2 -server_auth -client_auth $CA $extra || exit 1
53 $ssltest -ssl3 -server_auth $CA $extra || exit 1
56 $ssltest -ssl3 -client_auth $CA $extra || exit 1
59 $ssltest -ssl3 -server_auth -client_auth $CA $extra || exit 1
65 $ssltest -server_auth $CA $extra || exit 1
68 $ssltest -client_auth $CA $extra || exit 1
[all …]
Dserver2.pem1 issuer= /C=AU/ST=Queensland/O=CryptSoft Pty Ltd/CN=Test CA (1024 bit)
32 subject=/C=US/O=AT&T Bell Laboratories/OU=Prototype Research CA
33 issuer= /C=US/O=AT&T Bell Laboratories/OU=Prototype Research CA
51 subject=/C=AU/ST=Queensland/O=CryptSoft Pty Ltd/CN=Test CA (1024 bit)
225 /OU=Certification Services Division/CN=Thawte Server CA
228 /OU=Certification Services Division/CN=Thawte Server CA
268 Tims test GCI CA
314 subject=/L=Internet/O=VeriSign, Inc./OU=VeriSign Class 2 CA - Individual Subscriber
315 issuer= /L=Internet/O=VeriSign, Inc./OU=VeriSign Class 2 CA - Individual Subscriber
DCAss.cnf25 commonName_value = Dodgy CA
42 certificate = $dir/cacert.pem # The CA certificate
74 basicConstraints = CA:true,pathlen:1
/external/openssl/apps/
DCA.pl.in51 $CA="$openssl ca $SSLEAY_CONFIG";
116 system ("$CA -create_serial " .
134 system ("$CA -policy policy_anything -infiles newreq.pem");
137 system ("$CA -policy policy_anything -out newcert.pem " .
142 system ("$CA -policy policy_anything -out newcert.pem " .
149 system ("$CA -policy policy_anything -out newcert.pem " .
DCA.pl51 $CA="$openssl ca $SSLEAY_CONFIG";
116 system ("$CA -create_serial " .
134 system ("$CA -policy policy_anything -infiles newreq.pem");
137 system ("$CA -policy policy_anything -out newcert.pem " .
142 system ("$CA -policy policy_anything -out newcert.pem " .
149 system ("$CA -policy policy_anything -out newcert.pem " .
DCA.com1 $! CA - wrapper around ca to make it easier to use ... basically ca requires
5 $! CA -newca ... will setup the right stuff
6 $! CA -newreq ... will generate a certificate request
7 $! CA -sign ... will sign the generated request and output
148 $ CA -policy policy_anything -infiles newreq.pem
157 $ CA -policy policy_anything -out newcert.pem -infiles newreq.pem
171 $ CA -policy policy_anything -out newcert.pem -infiles tmp.pem
DCA.sh66 CA="$OPENSSL ca $SSLEAY_CONFIG"
132 $CA -create_serial -out ${CATOP}/$CACERT $CADAYS -batch \
141 $CA -policy policy_anything -infiles newreq.pem
156 $CA -policy policy_anything -out newcert.pem -infiles newreq.pem
162 $CA -policy policy_anything -out newcert.pem -extensions v3_ca -infiles newreq.pem
169 $CA -policy policy_anything -out newcert.pem -infiles tmp.pem
Dserver.pem1 issuer= /C=AU/ST=Queensland/O=CryptSoft Pty Ltd/CN=Test CA (1024 bit)
25 subject=/C=US/O=AT&T Bell Laboratories/OU=Prototype Research CA
26 issuer= /C=US/O=AT&T Bell Laboratories/OU=Prototype Research CA
44 subject=/C=AU/ST=Queensland/O=CryptSoft Pty Ltd/CN=Test CA (1024 bit)
218 /OU=Certification Services Division/CN=Thawte Server CA
221 /OU=Certification Services Division/CN=Thawte Server CA
261 Tims test GCI CA
307 subject=/L=Internet/O=VeriSign, Inc./OU=VeriSign Class 2 CA - Individual Subscriber
308 issuer= /L=Internet/O=VeriSign, Inc./OU=VeriSign Class 2 CA - Individual Subscriber
Dopenssl.cnf50 certificate = $dir/cacert.pem # The CA certificate
79 # For type CA, the listed attributes must be the same, and the optional
83 # For the CA policy
168 # requires this to avoid interpreting an end user certificate as a CA.
170 basicConstraints=CA:FALSE
221 basicConstraints = CA:FALSE
227 # Extensions for a typical CA
238 #basicConstraints = critical,CA:true
240 basicConstraints = CA:true
242 # Key usage: this is typical for a CA certificate. However since it will
[all …]
Dopenssl-vms.cnf50 certificate = $dir]cacert.pem # The CA certificate
79 # For type CA, the listed attributes must be the same, and the optional
83 # For the CA policy
168 # requires this to avoid interpreting an end user certificate as a CA.
170 basicConstraints=CA:FALSE
221 basicConstraints = CA:FALSE
227 # Extensions for a typical CA
238 #basicConstraints = critical,CA:true
240 basicConstraints = CA:true
242 # Key usage: this is typical for a CA certificate. However since it will
[all …]
Dserver2.pem1 issuer= /C=AU/ST=Queensland/O=CryptSoft Pty Ltd/CN=Test CA (1024 bit)
32 subject=/C=US/O=AT&T Bell Laboratories/OU=Prototype Research CA
33 issuer= /C=US/O=AT&T Bell Laboratories/OU=Prototype Research CA
51 subject=/C=AU/ST=Queensland/O=CryptSoft Pty Ltd/CN=Test CA (1024 bit)
225 /OU=Certification Services Division/CN=Thawte Server CA
228 /OU=Certification Services Division/CN=Thawte Server CA
268 Tims test GCI CA
314 subject=/L=Internet/O=VeriSign, Inc./OU=VeriSign Class 2 CA - Individual Subscriber
315 issuer= /L=Internet/O=VeriSign, Inc./OU=VeriSign Class 2 CA - Individual Subscriber
Dinstall.com59 $ COPY CA.COM WRK_SSLEXE:CA.COM/LOG
60 $ SET FILE/PROT=W:RE WRK_SSLEXE:CA.COM
/external/bouncycastle/src/main/java/org/bouncycastle/x509/
DCertPathReviewerMessages.properties157 …te path was issued by a CA that is not in the the trusted-root-certificate-store used for the path…
158 …und.summary = The root certificate of the certificate path was issued by a CA that is not in the t…
159CA that is not in the the trusted-root-certificate-store used for the path validation. The name of…
165 …trust root store: There are {0} trusted public keys for the CA "{1}" - please ensure with CA which…
166 …trust root store: There are {0} trusted public keys for the CA "{1}" - please ensure with CA which…
167 …trust root store: There are {0} trusted public keys for the CA "{1}" - please ensure with CA which…
220 CertPathReviewer.noCACert.title = Certificate is no CA certificate
221 CertPathReviewer.noCACert.text = Intermediate certificate is no CA certificate.
222 CertPathReviewer.noCACert.summary = The certificate is no CA certificate.
223 CertPathReviewer.noCACert.details = The certificate is no CA certificate but used as one.
[all …]
/external/icu4c/data/unidata/norm2/
Dnfc.txt280 00CA=0045 0302
538 0390=03CA 0301
546 03CA=03B9 0308
871 1EBE=00CA 0301
873 1EC0=00CA 0300
875 1EC2=00CA 0309
877 1EC4=00CA 0303
1122 1FD2=03CA 0300
1125 1FD7=03CA 0342
1341 F947>78CA
[all …]
/external/icu4c/data/misc/
Dzoneinfo64.txt3393 "CA", //Z#78 America/Atikokan
3399 "CA", //Z#84 America/Blanc-Sablon
3404 "CA", //Z#89 America/Cambridge_Bay
3413 "CA", //Z#98 America/Coral_Harbour
3419 "CA", //Z#104 America/Dawson
3420 "CA", //Z#105 America/Dawson_Creek
3424 "CA", //Z#109 America/Edmonton
3430 "CA", //Z#115 America/Glace_Bay
3432 "CA", //Z#117 America/Goose_Bay
3439 "CA", //Z#124 America/Halifax
[all …]
/external/openssl/crypto/pkcs7/t/
Dc.pem1 …=AU/SP=Queensland/L=Brisbane/O=Cryptsoft Pty Ltd/OU=DEMONSTRATION AND TESTING/CN=DEMO ZERO VALUE CA
10 …SP=Queensland, L=Brisbane, O=Cryptsoft Pty Ltd, OU=DEMONSTRATION AND TESTING, CN=DEMO ZERO VALUE CA
Ds.pem10 …=AU/SP=Queensland/L=Brisbane/O=Cryptsoft Pty Ltd/OU=DEMONSTRATION AND TESTING/CN=DEMO ZERO VALUE CA
19 …SP=Queensland, L=Brisbane, O=Cryptsoft Pty Ltd, OU=DEMONSTRATION AND TESTING, CN=DEMO ZERO VALUE CA
Dserver.pem1 …=AU/SP=Queensland/L=Brisbane/O=Cryptsoft Pty Ltd/OU=DEMONSTRATION AND TESTING/CN=DEMO ZERO VALUE CA
10 …SP=Queensland, L=Brisbane, O=Cryptsoft Pty Ltd, OU=DEMONSTRATION AND TESTING, CN=DEMO ZERO VALUE CA
/external/openssl/crypto/pkcs7/
Dinfo.pem1 …=AU/SP=Queensland/L=Brisbane/O=Cryptsoft Pty Ltd/OU=DEMONSTRATION AND TESTING/CN=DEMO ZERO VALUE CA
10 …SP=Queensland, L=Brisbane, O=Cryptsoft Pty Ltd, OU=DEMONSTRATION AND TESTING, CN=DEMO ZERO VALUE CA
/external/openssl/patches/
Dsmall_records.patch321 @@ -70,6 +70,16 @@ $ssltest -client_auth $CA $extra || exit
323 $ssltest -server_auth -client_auth $CA $extra || exit 1
326 +$ssltest -server_auth -client_auth -c_small_records $CA $extra || exit 1
329 +$ssltest -server_auth -client_auth -s_small_records $CA $extra || exit 1
332 +$ssltest -server_auth -client_auth -c_small_records -s_small_records $CA $extra || exit 1
/external/icu4c/data/unidata/
DFractionalUCA.txt1093 17CA; [, DB 69, 05]
1313 3001; [07 CA, 05, 05]
1314 FE51; [07 CA, 05, 1D]
1315 FF64; [07 CA, 05, A3]
1316 FE11; [07 CA, 05, 2B]
2429 02CA; [0B 49, 05, 05]
3000 21CA; [0D 87, 05, 05]
3546 22CA; [0F 67, 05, 05]
4038 23CA; [11 5F, 05, 05]
4606 25CA; [13 A1, 05, 05]
[all …]
/external/icu4c/data/translit/
DInterIndic_Tamil.txt35 \uE01A→ச; # LETTER CA
36 \uE01B→ச; # REMAP (indicExceptions.txt): \u0B9B→ச = LETTER CHA→LETTER CA
38 \uE01D→ச; # REMAP (indicExceptions.txt): \u0B9D→ச = LETTER JHA→LETTER CA
DArmenian_Latin_BGN.txt70 Ծ} $lower → Ts ; # ARMENIAN CAPITAL LETTER CA
71 Ծ → TS ; # ARMENIAN CAPITAL LETTER CA
72 ծ → ts ; # ARMENIAN SMALL LETTER CA
/external/chromium/third_party/icu/source/data/translit/
DInterIndic_Tamil.txt35 \uE01A→ச; # LETTER CA
36 \uE01B→ச; # REMAP (indicExceptions.txt): \u0B9B→ச = LETTER CHA→LETTER CA
38 \uE01D→ச; # REMAP (indicExceptions.txt): \u0B9D→ச = LETTER JHA→LETTER CA
DArmenian_Latin_BGN.txt70 Ծ} $lower → Ts ; # ARMENIAN CAPITAL LETTER CA
71 Ծ → TS ; # ARMENIAN CAPITAL LETTER CA
72 ծ → ts ; # ARMENIAN SMALL LETTER CA

12345678910>>...21