Searched refs:CA (Results 1 – 25 of 505) sorted by relevance
12345678910>>...21
/external/openssl/android.testssl/ |
D | testssl | 22 CA="-CApath ../certs" 24 CA="-CAfile $3" 39 $ssltest -ssl2 -server_auth $CA $extra || exit 1 43 $ssltest -ssl2 -client_auth $CA $extra || exit 1 46 $ssltest -ssl2 -server_auth -client_auth $CA $extra || exit 1 53 $ssltest -ssl3 -server_auth $CA $extra || exit 1 56 $ssltest -ssl3 -client_auth $CA $extra || exit 1 59 $ssltest -ssl3 -server_auth -client_auth $CA $extra || exit 1 65 $ssltest -server_auth $CA $extra || exit 1 68 $ssltest -client_auth $CA $extra || exit 1 [all …]
|
D | server2.pem | 1 issuer= /C=AU/ST=Queensland/O=CryptSoft Pty Ltd/CN=Test CA (1024 bit) 32 subject=/C=US/O=AT&T Bell Laboratories/OU=Prototype Research CA 33 issuer= /C=US/O=AT&T Bell Laboratories/OU=Prototype Research CA 51 subject=/C=AU/ST=Queensland/O=CryptSoft Pty Ltd/CN=Test CA (1024 bit) 225 /OU=Certification Services Division/CN=Thawte Server CA 228 /OU=Certification Services Division/CN=Thawte Server CA 268 Tims test GCI CA 314 subject=/L=Internet/O=VeriSign, Inc./OU=VeriSign Class 2 CA - Individual Subscriber 315 issuer= /L=Internet/O=VeriSign, Inc./OU=VeriSign Class 2 CA - Individual Subscriber
|
D | CAss.cnf | 25 commonName_value = Dodgy CA 42 certificate = $dir/cacert.pem # The CA certificate 74 basicConstraints = CA:true,pathlen:1
|
/external/openssl/apps/ |
D | CA.pl.in | 51 $CA="$openssl ca $SSLEAY_CONFIG"; 116 system ("$CA -create_serial " . 134 system ("$CA -policy policy_anything -infiles newreq.pem"); 137 system ("$CA -policy policy_anything -out newcert.pem " . 142 system ("$CA -policy policy_anything -out newcert.pem " . 149 system ("$CA -policy policy_anything -out newcert.pem " .
|
D | CA.pl | 51 $CA="$openssl ca $SSLEAY_CONFIG"; 116 system ("$CA -create_serial " . 134 system ("$CA -policy policy_anything -infiles newreq.pem"); 137 system ("$CA -policy policy_anything -out newcert.pem " . 142 system ("$CA -policy policy_anything -out newcert.pem " . 149 system ("$CA -policy policy_anything -out newcert.pem " .
|
D | CA.com | 1 $! CA - wrapper around ca to make it easier to use ... basically ca requires 5 $! CA -newca ... will setup the right stuff 6 $! CA -newreq ... will generate a certificate request 7 $! CA -sign ... will sign the generated request and output 148 $ CA -policy policy_anything -infiles newreq.pem 157 $ CA -policy policy_anything -out newcert.pem -infiles newreq.pem 171 $ CA -policy policy_anything -out newcert.pem -infiles tmp.pem
|
D | CA.sh | 66 CA="$OPENSSL ca $SSLEAY_CONFIG" 132 $CA -create_serial -out ${CATOP}/$CACERT $CADAYS -batch \ 141 $CA -policy policy_anything -infiles newreq.pem 156 $CA -policy policy_anything -out newcert.pem -infiles newreq.pem 162 $CA -policy policy_anything -out newcert.pem -extensions v3_ca -infiles newreq.pem 169 $CA -policy policy_anything -out newcert.pem -infiles tmp.pem
|
D | server.pem | 1 issuer= /C=AU/ST=Queensland/O=CryptSoft Pty Ltd/CN=Test CA (1024 bit) 25 subject=/C=US/O=AT&T Bell Laboratories/OU=Prototype Research CA 26 issuer= /C=US/O=AT&T Bell Laboratories/OU=Prototype Research CA 44 subject=/C=AU/ST=Queensland/O=CryptSoft Pty Ltd/CN=Test CA (1024 bit) 218 /OU=Certification Services Division/CN=Thawte Server CA 221 /OU=Certification Services Division/CN=Thawte Server CA 261 Tims test GCI CA 307 subject=/L=Internet/O=VeriSign, Inc./OU=VeriSign Class 2 CA - Individual Subscriber 308 issuer= /L=Internet/O=VeriSign, Inc./OU=VeriSign Class 2 CA - Individual Subscriber
|
D | openssl.cnf | 50 certificate = $dir/cacert.pem # The CA certificate 79 # For type CA, the listed attributes must be the same, and the optional 83 # For the CA policy 168 # requires this to avoid interpreting an end user certificate as a CA. 170 basicConstraints=CA:FALSE 221 basicConstraints = CA:FALSE 227 # Extensions for a typical CA 238 #basicConstraints = critical,CA:true 240 basicConstraints = CA:true 242 # Key usage: this is typical for a CA certificate. However since it will [all …]
|
D | openssl-vms.cnf | 50 certificate = $dir]cacert.pem # The CA certificate 79 # For type CA, the listed attributes must be the same, and the optional 83 # For the CA policy 168 # requires this to avoid interpreting an end user certificate as a CA. 170 basicConstraints=CA:FALSE 221 basicConstraints = CA:FALSE 227 # Extensions for a typical CA 238 #basicConstraints = critical,CA:true 240 basicConstraints = CA:true 242 # Key usage: this is typical for a CA certificate. However since it will [all …]
|
D | server2.pem | 1 issuer= /C=AU/ST=Queensland/O=CryptSoft Pty Ltd/CN=Test CA (1024 bit) 32 subject=/C=US/O=AT&T Bell Laboratories/OU=Prototype Research CA 33 issuer= /C=US/O=AT&T Bell Laboratories/OU=Prototype Research CA 51 subject=/C=AU/ST=Queensland/O=CryptSoft Pty Ltd/CN=Test CA (1024 bit) 225 /OU=Certification Services Division/CN=Thawte Server CA 228 /OU=Certification Services Division/CN=Thawte Server CA 268 Tims test GCI CA 314 subject=/L=Internet/O=VeriSign, Inc./OU=VeriSign Class 2 CA - Individual Subscriber 315 issuer= /L=Internet/O=VeriSign, Inc./OU=VeriSign Class 2 CA - Individual Subscriber
|
D | install.com | 59 $ COPY CA.COM WRK_SSLEXE:CA.COM/LOG 60 $ SET FILE/PROT=W:RE WRK_SSLEXE:CA.COM
|
/external/bouncycastle/src/main/java/org/bouncycastle/x509/ |
D | CertPathReviewerMessages.properties | 157 …te path was issued by a CA that is not in the the trusted-root-certificate-store used for the path… 158 …und.summary = The root certificate of the certificate path was issued by a CA that is not in the t… 159 …CA that is not in the the trusted-root-certificate-store used for the path validation. The name of… 165 …trust root store: There are {0} trusted public keys for the CA "{1}" - please ensure with CA which… 166 …trust root store: There are {0} trusted public keys for the CA "{1}" - please ensure with CA which… 167 …trust root store: There are {0} trusted public keys for the CA "{1}" - please ensure with CA which… 220 CertPathReviewer.noCACert.title = Certificate is no CA certificate 221 CertPathReviewer.noCACert.text = Intermediate certificate is no CA certificate. 222 CertPathReviewer.noCACert.summary = The certificate is no CA certificate. 223 CertPathReviewer.noCACert.details = The certificate is no CA certificate but used as one. [all …]
|
/external/icu4c/data/unidata/norm2/ |
D | nfc.txt | 280 00CA=0045 0302 538 0390=03CA 0301 546 03CA=03B9 0308 871 1EBE=00CA 0301 873 1EC0=00CA 0300 875 1EC2=00CA 0309 877 1EC4=00CA 0303 1122 1FD2=03CA 0300 1125 1FD7=03CA 0342 1341 F947>78CA [all …]
|
/external/icu4c/data/misc/ |
D | zoneinfo64.txt | 3393 "CA", //Z#78 America/Atikokan 3399 "CA", //Z#84 America/Blanc-Sablon 3404 "CA", //Z#89 America/Cambridge_Bay 3413 "CA", //Z#98 America/Coral_Harbour 3419 "CA", //Z#104 America/Dawson 3420 "CA", //Z#105 America/Dawson_Creek 3424 "CA", //Z#109 America/Edmonton 3430 "CA", //Z#115 America/Glace_Bay 3432 "CA", //Z#117 America/Goose_Bay 3439 "CA", //Z#124 America/Halifax [all …]
|
/external/openssl/crypto/pkcs7/t/ |
D | c.pem | 1 …=AU/SP=Queensland/L=Brisbane/O=Cryptsoft Pty Ltd/OU=DEMONSTRATION AND TESTING/CN=DEMO ZERO VALUE CA 10 …SP=Queensland, L=Brisbane, O=Cryptsoft Pty Ltd, OU=DEMONSTRATION AND TESTING, CN=DEMO ZERO VALUE CA
|
D | s.pem | 10 …=AU/SP=Queensland/L=Brisbane/O=Cryptsoft Pty Ltd/OU=DEMONSTRATION AND TESTING/CN=DEMO ZERO VALUE CA 19 …SP=Queensland, L=Brisbane, O=Cryptsoft Pty Ltd, OU=DEMONSTRATION AND TESTING, CN=DEMO ZERO VALUE CA
|
D | server.pem | 1 …=AU/SP=Queensland/L=Brisbane/O=Cryptsoft Pty Ltd/OU=DEMONSTRATION AND TESTING/CN=DEMO ZERO VALUE CA 10 …SP=Queensland, L=Brisbane, O=Cryptsoft Pty Ltd, OU=DEMONSTRATION AND TESTING, CN=DEMO ZERO VALUE CA
|
/external/openssl/crypto/pkcs7/ |
D | info.pem | 1 …=AU/SP=Queensland/L=Brisbane/O=Cryptsoft Pty Ltd/OU=DEMONSTRATION AND TESTING/CN=DEMO ZERO VALUE CA 10 …SP=Queensland, L=Brisbane, O=Cryptsoft Pty Ltd, OU=DEMONSTRATION AND TESTING, CN=DEMO ZERO VALUE CA
|
/external/openssl/patches/ |
D | small_records.patch | 321 @@ -70,6 +70,16 @@ $ssltest -client_auth $CA $extra || exit 323 $ssltest -server_auth -client_auth $CA $extra || exit 1 326 +$ssltest -server_auth -client_auth -c_small_records $CA $extra || exit 1 329 +$ssltest -server_auth -client_auth -s_small_records $CA $extra || exit 1 332 +$ssltest -server_auth -client_auth -c_small_records -s_small_records $CA $extra || exit 1
|
/external/icu4c/data/unidata/ |
D | FractionalUCA.txt | 1093 17CA; [, DB 69, 05] 1313 3001; [07 CA, 05, 05] 1314 FE51; [07 CA, 05, 1D] 1315 FF64; [07 CA, 05, A3] 1316 FE11; [07 CA, 05, 2B] 2429 02CA; [0B 49, 05, 05] 3000 21CA; [0D 87, 05, 05] 3546 22CA; [0F 67, 05, 05] 4038 23CA; [11 5F, 05, 05] 4606 25CA; [13 A1, 05, 05] [all …]
|
/external/icu4c/data/translit/ |
D | InterIndic_Tamil.txt | 35 \uE01A→ச; # LETTER CA 36 \uE01B→ச; # REMAP (indicExceptions.txt): \u0B9B→ச = LETTER CHA→LETTER CA 38 \uE01D→ச; # REMAP (indicExceptions.txt): \u0B9D→ச = LETTER JHA→LETTER CA
|
D | Armenian_Latin_BGN.txt | 70 Ծ} $lower → Ts ; # ARMENIAN CAPITAL LETTER CA 71 Ծ → TS ; # ARMENIAN CAPITAL LETTER CA 72 ծ → ts ; # ARMENIAN SMALL LETTER CA
|
/external/chromium/third_party/icu/source/data/translit/ |
D | InterIndic_Tamil.txt | 35 \uE01A→ச; # LETTER CA 36 \uE01B→ச; # REMAP (indicExceptions.txt): \u0B9B→ச = LETTER CHA→LETTER CA 38 \uE01D→ச; # REMAP (indicExceptions.txt): \u0B9D→ச = LETTER JHA→LETTER CA
|
D | Armenian_Latin_BGN.txt | 70 Ծ} $lower → Ts ; # ARMENIAN CAPITAL LETTER CA 71 Ծ → TS ; # ARMENIAN CAPITAL LETTER CA 72 ծ → ts ; # ARMENIAN SMALL LETTER CA
|
12345678910>>...21