/macosx-10.10.1/ICU-531.30/icuSources/tools/tzcode/ |
H A D | icuregions | 10 America/Montreal CA
|
/macosx-10.10.1/OpenSSL098-52/src/test/ |
H A D | testca | 18 $SH ../apps/CA.sh -newca <<EOF 27 $SH ../apps/CA.sh -newreq 35 $SH ../apps/CA.sh -sign <<EOF 44 $SH ../apps/CA.sh -verify newcert.pem 50 #usage: CA -newcert|-newreq|-newca|-sign|-verify
|
H A D | testfipsssl | 25 CA="-CApath ../certs" 27 CA="-CAfile $3" 48 $ssltest -tls1 -server_auth $CA $extra || exit 1 51 $ssltest -tls1 -client_auth $CA $extra || exit 1 54 $ssltest -tls1 -server_auth -client_auth $CA $extra || exit 1 60 $ssltest -bio_pair -tls1 -server_auth $CA $extra || exit 1 63 $ssltest -bio_pair -tls1 -client_auth $CA $extra || exit 1 66 $ssltest -bio_pair -tls1 -server_auth -client_auth $CA $extra || exit 1 79 $ssltest -bio_pair -server_auth $CA $extra || exit 1 82 $ssltest -bio_pair -client_auth $CA [all...] |
H A D | testssl | 22 CA="-CApath ../certs" 24 CA="-CAfile $3" 39 $ssltest -ssl2 -server_auth $CA $extra || exit 1 43 $ssltest -ssl2 -client_auth $CA $extra || exit 1 46 $ssltest -ssl2 -server_auth -client_auth $CA $extra || exit 1 53 $ssltest -ssl3 -server_auth $CA $extra || exit 1 56 $ssltest -ssl3 -client_auth $CA $extra || exit 1 59 $ssltest -ssl3 -server_auth -client_auth $CA $extra || exit 1 65 $ssltest -server_auth $CA $extra || exit 1 68 $ssltest -client_auth $CA [all...] |
H A D | CAssdsa.cnf | 5 # hacked by iang to do DSA certs - CA 23 commonName_value = Hermanos Locos CA
|
H A D | CAssrsa.cnf | 5 # create RSA certs - CA 23 commonName_value = Hermanos Locos CA
|
H A D | Uss.cnf | 33 basicConstraints = CA:false
|
H A D | testca.com | 21 $ @[-.apps]CA.com -input sys$ca_input -newca 27 $ @[-.apps]CA.com -newreq 33 $ @[-.apps]CA.com -input sys$ca_input -sign 38 $ @[-.apps]CA.com -verify newcert.pem 48 $! #usage: CA -newcert|-newreq|-newca|-sign|-verify
|
H A D | testss | 91 echo "sign user certificate request with the just created CA via 'x509'" 92 $x509cmd -CAcreateserial -in $Ureq -days 30 -req -out $Ucert -CA $CAcert -CAkey $CAkey -extfile $Uconf -extensions v3_ee >err.ss 113 $x509cmd -CAcreateserial -in $P1req -days 30 -req -out $P1cert -CA $Ucert -CAkey $Ukey -extfile $P1conf -extensions v3_proxy >err.ss 135 $x509cmd -CAcreateserial -in $P2req -days 30 -req -out $P2cert -CA $P1cert -CAkey $P1key -extfile $P2conf -extensions v3_proxy >err.ss 148 echo The generated CA certificate is $CAcert 149 echo The generated CA private key is $CAkey
|
H A D | CAss.cnf | 25 commonName_value = Dodgy CA 42 certificate = $dir/cacert.pem # The CA certificate 74 basicConstraints = CA:true,pathlen:1
|
H A D | P1ss.cnf | 34 basicConstraints=CA:FALSE
|
H A D | testgen | 5 CA=../certs/testca.pem
|
/macosx-10.10.1/Security-57031.1.35/SecurityTests/clxutils/certcrl/testSubjects/emptyCert/ |
H A D | emptyCert.scr | 15 cert = CA.cer 23 cert = CA.cer 32 cert = CA.cer 41 cert = CA.cer 48 cert = CA.cer
|
/macosx-10.10.1/Security-57031.1.35/SecurityTests/clxutils/certcrl/testSubjects/implicitAnchor/ |
H A D | implicitAnchor.scr | 13 cert = CA.cer 21 cert = CA.cer 30 cert = CA.cer
|
/macosx-10.10.1/llvmCore-3425.0.34/lib/Transforms/IPO/ |
H A D | InlineSimple.cpp | 32 InlineCostAnalyzer CA; member in class:__anon10343::SimpleInliner 43 return CA.getInlineCost(CS, getInlineThreshold(CS)); 65 CA.setTargetData(getAnalysisIfAvailable<TargetData>());
|
/macosx-10.10.1/OpenSSL098-52/src/apps/ |
H A D | CA.pl.in | 3 # CA - wrapper around ca to make it easier to use ... basically ca requires 7 # CA -newca ... will setup the right stuff 8 # CA -newreq[-nodes] ... will generate a certificate request 9 # CA -sign ... will sign the generated request and output 16 # 12-Jan-96 tjh Added more things ... including CA -signcert which 30 # 27-Apr-98 snh Translation into perl, fix existing CA bug. 51 $CA="$openssl ca $SSLEAY_CONFIG"; 67 print STDERR "usage: CA -newcert|-newreq|-newreq-nodes|-newca|-sign|-verify\n"; 102 print "CA certificate filename (or enter to create)\n"; 107 # ask user for existing CA certificat [all...] |
H A D | CA.sh | 3 # CA - wrapper around ca to make it easier to use ... basically ca requires 7 # CA -newca ... will setup the right stuff 8 # CA -newreq ... will generate a certificate request 9 # CA -sign ... will sign the generated request and output 16 # 12-Jan-96 tjh Added more things ... including CA -signcert which 66 CA="$OPENSSL ca $SSLEAY_CONFIG" 116 echo "CA certificate filename (or enter to create)" 119 # ask user for existing CA certificate 129 echo "Making CA certificate ..." 132 $CA [all...] |
H A D | openssl-vms.cnf | 45 certificate = $dir]cacert.pem # The CA certificate 74 # For type CA, the listed attributes must be the same, and the optional 78 # For the CA policy 164 # requires this to avoid interpreting an end user certificate as a CA. 166 basicConstraints=CA:FALSE 214 basicConstraints = CA:FALSE 220 # Extensions for a typical CA 231 #basicConstraints = critical,CA:true 233 basicConstraints = CA:true 235 # Key usage: this is typical for a CA certificat [all...] |
H A D | openssl.cnf | 45 certificate = $dir/cacert.pem # The CA certificate 74 # For type CA, the listed attributes must be the same, and the optional 78 # For the CA policy 164 # requires this to avoid interpreting an end user certificate as a CA. 166 basicConstraints=CA:FALSE 214 basicConstraints = CA:FALSE 220 # Extensions for a typical CA 231 #basicConstraints = critical,CA:true 233 basicConstraints = CA:true 235 # Key usage: this is typical for a CA certificat [all...] |
H A D | CA.com | 1 $! CA - wrapper around ca to make it easier to use ... basically ca requires 5 $! CA -newca ... will setup the right stuff 6 $! CA -newreq ... will generate a certificate request 7 $! CA -sign ... will sign the generated request and output 14 $! 12-Jan-96 tjh Added more things ... including CA -signcert which 35 $ CA = openssl + " ca " + SSLEAY_CONFIG 57 $ echo "usage: CA -newcert|-newreq|-newca|-sign|-verify" 117 /PROMPT="CA certificate filename (or enter to create): " 123 $ echo "Making CA certificate ..." 148 $ CA [all...] |
/macosx-10.10.1/OpenSSL098-52/src/util/ |
H A D | mkcerts.sh | 55 echo creating $CAbits bit CA cert request 65 Test CA (1024 bit) 72 echo problems generating CA request 78 echo signing CA 82 -CA pca-cert.pem -CAkey pca-key.pem \ 86 echo problems signing CA cert 119 -CA ca-cert.pem -CAkey ca-key.pem \ 156 -CA ca-cert.pem -CAkey ca-key.pem \ 193 -CA ca-cert.pem -CAkey ca-key.pem \
|
/macosx-10.10.1/cxxfilt-11/cxxfilt/bfd/ |
H A D | cpu-i960.c | 59 "80960CA" or "80960MC". */ 125 CORE CA 139 #define CA bfd_mach_i960_ca /*6*/ macro 146 { ERROR, CORE, KA, KB, MC, XA, CA, JX, HX }, 147 { CORE, CORE, KA, KB, MC, XA, CA, JX, HX }, 152 { CA, CA, ERROR, ERROR, ERROR, ERROR, CA, ERROR, ERROR},
|
/macosx-10.10.1/Security-57031.1.35/SecurityTests/ |
H A D | CreateCerts.sh | 35 echo "**** Generating CA keys and certs..." 36 # generate CA certs 37 ${OPENSSL} req -x509 -nodes -days 365 -subj '/CN=SecurityTest CA Cert (RSA)' -newkey rsa:1024 -keyout CAKey.rsa.pem -out CACert.rsa.pem 38 ${OPENSSL} req -x509 -nodes -days 365 -subj '/CN=SecurityTest CA Cert (ECC)' -newkey ec:ecparam.pem -keyout CAKey.ecc.pem -out CACert.ecc.pem 58 ${OPENSSL} x509 -req -in ServerReq.rsa.pem -CA CACert.rsa.pem -CAkey CAKey.rsa.pem -set_serial 1 -out ServerCert.rsa.rsa.pem 59 ${OPENSSL} x509 -req -in ServerReq.rsa.pem -CA CACert.ecc.pem -CAkey CAKey.ecc.pem -set_serial 2 -out ServerCert.rsa.ecc.pem 60 ${OPENSSL} x509 -req -in ServerReq.ecc.pem -CA CACert.rsa.pem -CAkey CAKey.rsa.pem -set_serial 3 -out ServerCert.ecc.rsa.pem 61 ${OPENSSL} x509 -req -in ServerReq.ecc.pem -CA CACert.ecc.pem -CAkey CAKey.ecc.pem -set_serial 4 -out ServerCert.ecc.ecc.pem 64 ${OPENSSL} x509 -req -in ClientReq.rsa.pem -CA CACert.rsa.pem -CAkey CAKey.rsa.pem -set_serial 1001 -out ClientCert.rsa.rsa.pem 65 ${OPENSSL} x509 -req -in ClientReq.rsa.pem -CA CACer [all...] |
/macosx-10.10.1/OpenSSL098-52/src/VMS/ |
H A D | openssl_utils.com | 27 $ CA :== $SSLEXE:OPENSSL CA
|
/macosx-10.10.1/OpenSSL098-52/src/demos/tunala/ |
H A D | test.sh | 11 -cacert CA.pem -cert A-client.pem -server 0 \ 15 -cacert CA.pem -cert A-server.pem -server 1 \
|