/external/wpa_supplicant_8/hs20/server/ca/ |
D | setup.sh | 107 …$OPENSSL ca -config openssl.cnf.tmp -md sha256 -create_serial -out rootCA/cacert.pem -days 10957 -… 108 …$OPENSSL x509 -in rootCA/cacert.pem -out rootCA/cacert.der -outform DER || fail "Failed to create … 109 …sha256sum rootCA/cacert.der > rootCA/cacert.fingerprint || fail "Failed to create rootCA fingerpri… 128 … sha256 -create_serial -out demoCA/cacert.pem -days 3652 -batch -keyfile rootCA/private/cakey.pem … 131 …$OPENSSL x509 -in demoCA/cacert.pem -out demoCA/cacert.der -outform DER || fail "Failed to create … 132 …sha256sum demoCA/cacert.der > demoCA/cacert.fingerprint || fail "Failed to create demoCA fingerpri… 206 $OPENSSL verify -CAfile rootCA/cacert.pem demoCA/cacert.pem 207 $OPENSSL verify -CAfile rootCA/cacert.pem -untrusted demoCA/cacert.pem *.pem 209 cat rootCA/cacert.pem demoCA/cacert.pem > ca.pem
|
D | ocsp-req.sh | 5 …penssl ocsp -text -CAfile ca.pem -verify_other demoCA/cacert.pem -trust_other -issuer demoCA/cacer…
|
D | ocsp-responder-ica.sh | 3 …ndex.txt -port 8888 -nmin 5 -rsigner demoCA/cacert.pem -rkey demoCA/private/cakey-plain.pem -CA de…
|
D | ocsp-update-cache.sh | 6 -verify_other demoCA/cacert.pem \ 7 -issuer demoCA/cacert.pem \
|
/external/epid-sdk/example/verifysig/src/ |
D | verifysig11.c | 35 EpidCaCertificate const* cacert, void** verifier_precomp, in Verify11() argument 47 cacert, &pub_key); in Verify11() 84 cacert, NULL, &priv_rl_size); in Verify11() 97 cacert, priv_rl, &priv_rl_size); in Verify11() 112 result = Epid11ParseSigRlFile(signed_sig_rl, signed_sig_rl_size, cacert, in Verify11() 125 result = Epid11ParseSigRlFile(signed_sig_rl, signed_sig_rl_size, cacert, in Verify11() 141 result = Epid11ParseGroupRlFile(signed_grp_rl, signed_grp_rl_size, cacert, in Verify11() 154 result = Epid11ParseGroupRlFile(signed_grp_rl, signed_grp_rl_size, cacert, in Verify11()
|
D | verifysig.c | 36 EpidCaCertificate const* cacert, HashAlg hash_alg, in Verify() argument 48 cacert, &pub_key); in Verify() 90 result = EpidParsePrivRlFile(signed_priv_rl, signed_priv_rl_size, cacert, in Verify() 103 result = EpidParsePrivRlFile(signed_priv_rl, signed_priv_rl_size, cacert, in Verify() 119 result = EpidParseSigRlFile(signed_sig_rl, signed_sig_rl_size, cacert, in Verify() 132 result = EpidParseSigRlFile(signed_sig_rl, signed_sig_rl_size, cacert, in Verify() 148 result = EpidParseGroupRlFile(signed_grp_rl, signed_grp_rl_size, cacert, in Verify() 161 result = EpidParseGroupRlFile(signed_grp_rl, signed_grp_rl_size, cacert, in Verify()
|
D | main.c | 112 EpidCaCertificate cacert = {0}; in main() local 339 if (0 != ReadLoud(cacert_file->filename[0], &cacert, sizeof(cacert))) { in main() 348 if (!IsCaCertAuthorizedByRootCa(&cacert, sizeof(cacert))) { in main() 452 ver_rl_size, signed_pubkey, signed_pubkey_size, &cacert, in main() 465 &cacert, &verifier_precmp, &vprecmpi_file_size); in main()
|
/external/curl/tests/certs/scripts/ |
D | genroot.sh | 53 …DURATION -req -signkey $PREFIX-ca.key -in $PREFIX-ca.csr -out $PREFIX-$SERIAL-ca.cacert $DIGESTALGO 56 $OPENSSL x509 -text -in $PREFIX-$SERIAL-ca.cacert -nameopt multiline > $PREFIX-ca.cacert 59 $OPENSSL x509 -in $PREFIX-ca.cacert -outform der -out $PREFIX-ca.der 63 $OPENSSL x509 -in $PREFIX-ca.cacert -text -nameopt multiline > $PREFIX-ca.crt 66 $OPENSSL x509 -noout -text -in $PREFIX-ca.cacert -nameopt multiline
|
/external/curl/tests/certs/ |
D | Makefile.am | 34 EdelCurlRoot-ca.cacert \ 96 build-certs: $(srcdir)/EdelCurlRoot-ca.cacert $(srcdir)/Server-localhost-sv.pem \ 100 $(srcdir)/EdelCurlRoot-ca.cacert: 103 $(srcdir)/Server-localhost-sv.pem: $(srcdir)/EdelCurlRoot-ca.cacert 106 $(srcdir)/Server-localhost.nn-sv.pem: $(srcdir)/EdelCurlRoot-ca.cacert 109 $(srcdir)/Server-localhost0h-sv.pem: $(srcdir)/EdelCurlRoot-ca.cacert 112 $(srcdir)/Server-localhost-firstSAN-sv.pem: $(srcdir)/EdelCurlRoot-ca.cacert 115 $(srcdir)/Server-localhost-lastSAN-sv.pem: $(srcdir)/EdelCurlRoot-ca.cacert
|
/external/epid-sdk/example/signmsg/src/ |
D | main.c | 88 EpidCaCertificate cacert = {0}; in main() local 255 if (0 != ReadLoud(cacert_file->filename[0], &cacert, sizeof(cacert))) { in main() 263 if (!IsCaCertAuthorizedByRootCa(&cacert, sizeof(cacert))) { in main() 360 PrintBuffer(&cacert, sizeof(cacert)); in main() 373 member_precmp_ptr, &sig, &sig_size, &cacert); in main()
|
D | signmsg.c | 41 size_t* sig_len, EpidCaCertificate const* cacert) { in SignMsg() argument 61 sts = EpidParseGroupPubKeyFile(signed_pubkey, signed_pubkey_size, cacert, in SignMsg() 138 sts = EpidParseSigRlFile(signed_sig_rl, signed_sig_rl_size, cacert, NULL, in SignMsg() 154 sts = EpidParseSigRlFile(signed_sig_rl, signed_sig_rl_size, cacert, in SignMsg()
|
/external/curl/docs/cmdline-opts/ |
D | proxy-cacert.d | 1 Long: proxy-cacert 5 See-also: proxy-capath cacert capath proxy 7 Same as --cacert but used in HTTPS proxy context.
|
D | capath.d | 12 --cacert if the --cacert file contains many CA certificates.
|
/external/grpc-grpc/tools/dockerfile/distribtest/csharp_centos7_x64/ |
D | Dockerfile | 27 RUN curl https://curl.haxx.se/ca/cacert.pem > ~/cacert.pem && cert-sync ~/cacert.pem && rm -f ~/cac…
|
/external/grpc-grpc/tools/dockerfile/distribtest/csharp_jessie_x64/ |
D | Dockerfile | 31 RUN curl https://curl.haxx.se/ca/cacert.pem > ~/cacert.pem && cert-sync ~/cacert.pem && rm -f ~/cac…
|
/external/grpc-grpc/tools/dockerfile/distribtest/csharp_jessie_x86/ |
D | Dockerfile | 31 RUN curl https://curl.haxx.se/ca/cacert.pem > ~/cacert.pem && cert-sync ~/cacert.pem && rm -f ~/cac…
|
/external/grpc-grpc/tools/dockerfile/distribtest/csharp_ubuntu1604_x64/ |
D | Dockerfile | 31 RUN curl https://curl.haxx.se/ca/cacert.pem > ~/cacert.pem && cert-sync ~/cacert.pem && rm -f ~/cac…
|
/external/grpc-grpc/tools/dockerfile/distribtest/csharp_ubuntu1404_x64/ |
D | Dockerfile | 44 RUN curl https://curl.haxx.se/ca/cacert.pem > ~/cacert.pem && cert-sync ~/cacert.pem && rm -f ~/cac…
|
/external/curl/tests/data/ |
D | test404 | 19 FTPS with invalid cacert 22 --ftp-ssl-control --cacert moooo ftps://%HOSTIP:%FTPSPORT/
|
/external/epid-sdk/tools/revokekey/src/ |
D | main.c | 79 EpidCaCertificate cacert; in OpenKey() local 95 if (0 != ReadLoud(cacert_file, &cacert, sizeof(cacert))) { in OpenKey() 99 sts = EpidParseGroupPubKeyFile(signed_pubkey, signed_pubkey_size, &cacert, in OpenKey()
|
/external/epid-sdk/tools/revokegrp/src/ |
D | main.c | 211 EpidCaCertificate cacert = {0}; in MakeRequest() local 230 if (0 != ReadLoud(cacert_file, &cacert, sizeof(cacert))) { in MakeRequest() 252 pubkey_file_size, &cacert, in MakeRequest()
|
/external/epid-sdk/tools/revokesig/src/ |
D | main.c | 299 EpidCaCertificate cacert = {0}; in MakeRequest() local 325 if (0 != ReadLoud(cacert_file, &cacert, sizeof(cacert))) { in MakeRequest() 354 pubkey_file_size, &cacert, in MakeRequest()
|
/external/epid-sdk/example/ |
D | Makefile | 72 cp ./data/cacert.bin ./data/grprl.bin \ 80 cp ./compressed_data/cacert.bin ./compressed_data/grprl.bin \
|
/external/curl/lib/vtls/ |
D | polarssl.c | 77 x509_crt cacert; member 256 memset(&BACKEND->cacert, 0, sizeof(x509_crt)); in polarssl_connect_step1() 259 ret = x509_crt_parse_file(&BACKEND->cacert, in polarssl_connect_step1() 273 ret = x509_crt_parse_path(&BACKEND->cacert, capath); in polarssl_connect_step1() 404 &BACKEND->cacert, in polarssl_connect_step1() 675 x509_crt_free(&BACKEND->cacert); in Curl_polarssl_close()
|
/external/epid-sdk/example/compressed_data/ |
D | README.md | 67 |__ cacert.bin 147 - `cacert.bin` - CA certificate used as default input to signmsg 177 - `cacert.bin` - CA certificate used to check that revocation
|