/third_party/libphonenumber/resources/geocoding/en/ |
D | 1.txt | 1144 1209221|Tracy, CA 1145 1209223|Jackson, CA 1146 1209234|Stockton, CA 1147 1209238|Modesto, CA 1148 1209239|Manteca, CA 1149 1209245|Plymouth, CA 1150 1209257|Jackson, CA 1151 1209267|Sutter Creek, CA 1152 1209274|Ione, CA 1153 1209293|West Point, CA [all …]
|
/third_party/openssl/test/ |
D | danetest.in | 30 # subject= CN = Issuer CA 38 # subject= CN = Root CA 177 issuer= /CN=Issuer CA 191 subject= /CN=Issuer CA 192 issuer= /CN=Root CA 205 subject= /CN=Root CA 206 issuer= /CN=Root CA 224 issuer= /CN=Issuer CA 238 subject= /CN=Issuer CA 239 issuer= /CN=Root CA [all …]
|
/third_party/openssl/doc/man1/ |
D | CA.pl.pod | 5 CA.pl - friendlier interface for OpenSSL certificate programs 9 B<CA.pl> 14 B<CA.pl> 26 B<CA.pl> B<-pkcs12> [B<-extra-pkcs12> extra-params] [B<certname>] 28 B<CA.pl> B<-verify> [B<-extra-verify> extra-params] B<certfile>... 30 B<CA.pl> B<-revoke> [B<-extra-ca> extra-params] B<certfile> [B<reason>] 34 The B<CA.pl> script is a perl script that supplies the relevant command line 66 Creates a new CA hierarchy for use with the B<ca> program (or the B<-signcert> 67 and B<-xsign> options). The user is prompted to enter the filename of the CA 69 details of the CA will be prompted for. The relevant files and directories [all …]
|
/third_party/boost/boost/ptr_container/ |
D | ptr_set.hpp | 135 template< typename K, typename C, typename CA, typename A > 136 inline ptr_set<K,C,CA,A>* new_clone( const ptr_set<K,C,CA,A>& r ) in new_clone() argument 141 template< typename K, typename C, typename CA, typename A > 142 inline ptr_multiset<K,C,CA,A>* new_clone( const ptr_multiset<K,C,CA,A>& r ) in new_clone() argument 150 template< typename K, typename C, typename CA, typename A > 151 inline void swap( ptr_set<K,C,CA,A>& l, ptr_set<K,C,CA,A>& r ) in swap() argument 156 template< typename K, typename C, typename CA, typename A > 157 inline void swap( ptr_multiset<K,C,CA,A>& l, ptr_multiset<K,C,CA,A>& r ) in swap() argument
|
D | ptr_map.hpp | 143 template< class K, class T, class C, class CA, class A > 144 inline ptr_map<K,T,C,CA,A>* new_clone( const ptr_map<K,T,C,CA,A>& r ) in new_clone() argument 149 template< class K, class T, class C, class CA, class A > 150 inline ptr_multimap<K,T,C,CA,A>* new_clone( const ptr_multimap<K,T,C,CA,A>& r ) in new_clone() argument 158 template< typename K, typename T, typename C, typename CA, typename A > 159 inline void swap( ptr_map<K,T,C,CA,A>& l, ptr_map<K,T,C,CA,A>& r ) in swap() argument 164 template< typename K, typename T, typename C, typename CA, typename A > 165 inline void swap( ptr_multimap<K,T,C,CA,A>& l, ptr_multimap<K,T,C,CA,A>& r ) in swap() argument
|
D | ptr_unordered_set.hpp | 215 template< typename K, typename H, typename P, typename CA, typename A > 216 inline ptr_unordered_set<K,H,P,CA,A>* 217 new_clone( const ptr_unordered_set<K,H,P,CA,A>& r ) in new_clone() argument 222 template< typename K, typename H, typename P, typename CA, typename A > 223 inline ptr_unordered_multiset<K,H,P,CA,A>* 224 new_clone( const ptr_unordered_multiset<K,H,P,CA,A>& r ) in new_clone() argument 232 template< typename K, typename H, typename P, typename CA, typename A > 233 inline void swap( ptr_unordered_set<K,H,P,CA,A>& l, in swap() argument 234 ptr_unordered_set<K,H,P,CA,A>& r ) in swap() 239 template< typename K, typename H, typename P, typename CA, typename A > [all …]
|
D | ptr_deque.hpp | 59 template< typename T, typename CA, typename A > 60 inline ptr_deque<T,CA,A>* new_clone( const ptr_deque<T,CA,A>& r ) in new_clone() argument 68 template< typename T, typename CA, typename A > 69 inline void swap( ptr_deque<T,CA,A>& l, ptr_deque<T,CA,A>& r ) in swap() argument
|
D | ptr_unordered_map.hpp | 223 template< class K, class T, class H, class P, class CA, class A > 224 inline ptr_unordered_map<K,T,H,P,CA,A>* 225 new_clone( const ptr_unordered_map<K,T,H,P,CA,A>& r ) in new_clone() argument 230 template< class K, class T, class H, class P, class CA, class A > 231 inline ptr_unordered_multimap<K,T,H,P,CA,A>* 232 new_clone( const ptr_unordered_multimap<K,T,H,P,CA,A>& r ) in new_clone() argument 240 template< class K, class T, class H, class P, class CA, class A > 241 inline void swap( ptr_unordered_map<K,T,H,P,CA,A>& l, in swap() argument 242 ptr_unordered_map<K,T,H,P,CA,A>& r ) in swap() 247 template< class K, class T, class H, class P, class CA, class A > [all …]
|
D | ptr_vector.hpp | 79 template< typename T, typename CA, typename A > 80 inline ptr_vector<T,CA,A>* new_clone( const ptr_vector<T,CA,A>& r ) in new_clone() argument 88 template< typename T, typename CA, typename A > 89 inline void swap( ptr_vector<T,CA,A>& l, ptr_vector<T,CA,A>& r ) in swap() argument
|
D | ptr_list.hpp | 100 template< typename T, typename CA, typename A > 101 inline ptr_list<T,CA,A>* new_clone( const ptr_list<T,CA,A>& r ) in new_clone() argument 109 template< typename T, typename CA, typename A > 110 inline void swap( ptr_list<T,CA,A>& l, ptr_list<T,CA,A>& r ) in swap() argument
|
/third_party/node/doc/guides/ |
D | maintaining-root-certs.md | 75 < Parsing: Certplus Root CA G1 76 < Parsing: Certplus Root CA G2 77 < Parsing: OpenTrust Root CA G1 78 < Parsing: OpenTrust Root CA G2 79 < Parsing: OpenTrust Root CA G3 81 < Done (133 CA certs processed, 20 skipped). 83 > Parsing: GlobalSign Root CA - R6 84 > Parsing: OISTE WISeKey Global Root GC CA 91 > Parsing: Certigna Root CA 92 > Done (135 CA certs processed, 16 skipped). [all …]
|
/third_party/skia/third_party/externals/swiftshader/third_party/llvm-10.0/llvm/lib/Transforms/Utils/ |
D | CtorUtils.cpp | 38 Constant *CA = ConstantArray::get(ATy, CAList); in removeGlobalCtors() local 41 if (CA->getType() == OldCA->getType()) { in removeGlobalCtors() 42 GCL->setInitializer(CA); in removeGlobalCtors() 48 new GlobalVariable(CA->getType(), GCL->isConstant(), GCL->getLinkage(), in removeGlobalCtors() 49 CA, "", GCL->getThreadLocalMode()); in removeGlobalCtors() 68 ConstantArray *CA = cast<ConstantArray>(GV->getInitializer()); in parseGlobalCtors() local 70 Result.reserve(CA->getNumOperands()); in parseGlobalCtors() 71 for (auto &V : CA->operands()) { in parseGlobalCtors() 92 ConstantArray *CA = cast<ConstantArray>(GV->getInitializer()); in findGlobalCtors() local 94 for (auto &V : CA->operands()) { in findGlobalCtors()
|
/third_party/openssl/doc/man3/ |
D | SSL_CTX_set0_CA_list.pod | 18 - get or set CA list 42 The functions described here set and manage the list of CA names that are sent 45 For TLS versions 1.2 and earlier the list of CA names is only sent from the 46 server to the client when requesting a client certificate. So any list of CA 47 names set is never sent from client to server and the list of CA names retrieved 50 For TLS 1.3 the list of CA names is sent using the B<certificate_authorities> 54 In most cases it is not necessary to set CA names on the client side. The list 55 of CA names that are acceptable to the client will be sent in plaintext to the 58 and therefore setting CA names on the client side will have no impact if that 62 The "client CA list" functions below only have an effect when called on the [all …]
|
D | SSL_CTX_load_verify_locations.pod | 7 default locations for trusted CA certificates 25 which CA certificates for verification purposes are located. The certificates 29 which CA certificates are loaded should be used. There is one default directory 30 and one default file. The default CA certificates directory is called "certs" in 32 variable can be defined to override this location. The default CA certificates 46 If B<CAfile> is not NULL, it points to a file of CA certificates in PEM 47 format. The file can contain several CA certificates identified by 50 ... (CA certificate in base64 encoding) ... 59 If B<CApath> is not NULL, it points to a directory containing CA certificates 60 in PEM format. The files each contain one CA certificate. The files are [all …]
|
D | X509_check_ca.pod | 5 X509_check_ca - check if given certificate is CA certificate 15 This function checks if given certificate is CA certificate (can be used 20 Function return 0, if it is not CA certificate, 1 if it is proper X509v3 21 CA certificate with B<basicConstraints> extension CA:TRUE, 25 extension telling that it is CA certificate.
|
/third_party/mbedtls/tests/data_files/ |
D | test-ca.opensslconf | 8 commonName = PolarSSL Test CA 13 basicConstraints = CA:true 38 basicConstraints = CA:true 42 basicConstraints = CA:true 46 basicConstraints = CA:true 50 basicConstraints = CA:true 61 basicConstraints = CA:true
|
D | Readme-x509.txt | 7 - test-ca.crt aka "C=NL, O=PolarSSL, CN=PolarSSL Test CA" 11 - test-ca2*.crt aka "C=NL, O=PolarSSL, CN=Polarssl Test EC CA" 17 - test-int-ca.crt "C=NL, O=PolarSSL, CN=PolarSSL Test Intermediate CA" 20 - test-int-ca2.crt "C=NL, O=PolarSSL, CN=PolarSSL Test Intermediate EC CA" 23 A third intermediate CA is signed by test-int-ca2.crt: 24 - test-int-ca3.crt "C=UK, O=mbed TLS, CN=mbed TLS Test intermediate CA 3" 30 - test-ca-v1.crt: v1 "CA", signs 31 server1-v1.crt: v1 "intermediate CA", signs 41 - issuing CA: 1 -> test-ca.crt 61 the RSA test CA. [all …]
|
/third_party/node/tools/ |
D | certdata.txt | 75 # Certificate "GlobalSign Root CA" 77 # Issuer: CN=GlobalSign Root CA,OU=Root CA,O=GlobalSign nv-sa,C=BE 79 # Subject: CN=GlobalSign Root CA,OU=Root CA,O=GlobalSign nv-sa,C=BE 88 CKA_LABEL UTF8 "GlobalSign Root CA" 172 # Trust for Certificate "GlobalSign Root CA" 173 # Issuer: CN=GlobalSign Root CA,OU=Root CA,O=GlobalSign nv-sa,C=BE 175 # Subject: CN=GlobalSign Root CA,OU=Root CA,O=GlobalSign nv-sa,C=BE 184 CKA_LABEL UTF8 "GlobalSign Root CA" 209 # Certificate "GlobalSign Root CA - R2" 211 # Issuer: CN=GlobalSign,O=GlobalSign,OU=GlobalSign Root CA - R2 [all …]
|
/third_party/curl/docs/ |
D | SSLCERTS.md | 23 This system is about trust. In your local CA certificate store you have certs 38 by using a CA certificate store that the SSL library can use to make sure the 45 If the remote server uses a self-signed certificate, if you don't install a CA 46 cert store, if the server uses a certificate signed by a CA that isn't 56 2. Get a CA certificate that can verify the remote server and use the proper 57 option to point out this CA cert for verification when connecting. For 62 3. Add the CA cert for your server to the existing default CA certificate 63 store. The default CA certificate store can be changed at compile time with 66 --with-ca-bundle=FILE: use the specified file as CA certificate store. CA 69 --with-ca-path=PATH: use the specified path as CA certificate store. CA [all …]
|
/third_party/boost/libs/ptr_container/doc/ |
D | reversible_ptr_container.rst | 117 template < class T, class CA, class VPC > 118 bool operator==( const reversible_ptr_container<T,CA,VPC>& x, 119 const reversible_ptr_container<T,CA,VPC>& y); 121 template < class T, class CA, class VPC > 122 bool operator<( const reversible_ptr_container<T,CA,VPC>& x, 123 const reversible_ptr_container<T,CA,VPC>& y); 125 template < class T, class CA, class VPC > 126 bool operator!=( const reversible_ptr_container<T,CA,VPC>& x, 127 const reversible_ptr_container<T,CA,VPC>& y); 129 template < class T, class CA, class VPC > [all …]
|
/third_party/mbedtls/tests/data_files/dir4/ |
D | Readme | 3 1. zero pathlen constraint on an intermediate CA (invalid) 8 2. zero pathlen constraint on the root CA (invalid) 13 3. nonzero pathlen constraint on the root CA (invalid) 18 4. nonzero pathlen constraint on an intermediate CA (invalid) 23 5. nonzero pathlen constraint on an intermediate CA with maximum number of elements in the chain (v… 28 6. nonzero pathlen constraint on the root CA with maximum number of elements in the chain (valid) 33 7. pathlen constraint on the root CA with maximum number of elements and a self signed certificate … 39 8. zero pathlen constraint on first intermediate CA (valid)
|
/third_party/openssl/test/smime-certs/ |
D | mksmime-certs.sh | 24 $OPENSSL x509 -req -in req.pem -CA smroot.pem -days 3600 \ 29 $OPENSSL x509 -req -in req.pem -CA smroot.pem -days 3600 \ 34 $OPENSSL x509 -req -in req.pem -CA smroot.pem -days 3600 \ 43 $OPENSSL x509 -req -in req.pem -CA smroot.pem -days 3600 \ 47 $OPENSSL x509 -req -in req.pem -CA smroot.pem -days 3600 \ 51 $OPENSSL x509 -req -in req.pem -CA smroot.pem -days 3600 \ 61 $OPENSSL x509 -req -in req.pem -CA smroot.pem -days 3600 \ 65 $OPENSSL x509 -req -in req.pem -CA smroot.pem -days 3600 \ 69 $OPENSSL x509 -req -in req.pem -CA smroot.pem -days 3600 \ 81 $OPENSSL x509 -req -in req.pem -CA smroot.pem -days 3600 \
|
/third_party/flutter/skia/third_party/externals/harfbuzz/test/shaping/data/in-house/tests/ |
D | khmer-mark-order.tests | 1 ../fonts/b6031119874ae9ff1dd65383a335e361c0962220.ttf::U+179F,U+17CA,U+17BE,U+1794:[uni17C1=0+288|u… 8 ../fonts/b6031119874ae9ff1dd65383a335e361c0962220.ttf::U+179F,U+17CA,U+17BE,U+17BB,U+1794:[uni17C1=… 9 ../fonts/b6031119874ae9ff1dd65383a335e361c0962220.ttf::U+179F,U+17CA,U+17C1,U+17B8,U+17BB,U+1794:[u… 10 ../fonts/b6031119874ae9ff1dd65383a335e361c0962220.ttf::U+179F,U+17CA,U+17B8,U+17C1,U+17BB,U+1794:[u… 11 ../fonts/b6031119874ae9ff1dd65383a335e361c0962220.ttf::U+179F,U+17CA,U+17BE,U+17BB,U+17BB,U+1794:[u… 12 ../fonts/b6031119874ae9ff1dd65383a335e361c0962220.ttf::U+179F,U+17CA,U+17C1,U+17B8,U+17BB,U+17BB,U+… 13 ../fonts/b6031119874ae9ff1dd65383a335e361c0962220.ttf::U+179F,U+17CA,U+17B8,U+17C1,U+17BB,U+17BB,U+… 18 ../fonts/b6031119874ae9ff1dd65383a335e361c0962220.ttf::U+179F,U+17CA,U+17BE,U+17B8,U+1794:[uni17C1=… 19 ../fonts/b6031119874ae9ff1dd65383a335e361c0962220.ttf::U+179F,U+17CA,U+17B8,U+17BE,U+1794:[uni179F=… 20 ../fonts/b6031119874ae9ff1dd65383a335e361c0962220.ttf::U+179F,U+17CA,U+17BE,U+17B8,U+17BB,U+1794:[u… [all …]
|
/third_party/harfbuzz/test/shaping/data/in-house/tests/ |
D | khmer-mark-order.tests | 1 ../fonts/b6031119874ae9ff1dd65383a335e361c0962220.ttf::U+179F,U+17CA,U+17BE,U+1794:[uni17C1=0+288|u… 8 ../fonts/b6031119874ae9ff1dd65383a335e361c0962220.ttf::U+179F,U+17CA,U+17BE,U+17BB,U+1794:[uni17C1=… 9 ../fonts/b6031119874ae9ff1dd65383a335e361c0962220.ttf::U+179F,U+17CA,U+17C1,U+17B8,U+17BB,U+1794:[u… 10 ../fonts/b6031119874ae9ff1dd65383a335e361c0962220.ttf::U+179F,U+17CA,U+17B8,U+17C1,U+17BB,U+1794:[u… 11 ../fonts/b6031119874ae9ff1dd65383a335e361c0962220.ttf::U+179F,U+17CA,U+17BE,U+17BB,U+17BB,U+1794:[u… 12 ../fonts/b6031119874ae9ff1dd65383a335e361c0962220.ttf::U+179F,U+17CA,U+17C1,U+17B8,U+17BB,U+17BB,U+… 13 ../fonts/b6031119874ae9ff1dd65383a335e361c0962220.ttf::U+179F,U+17CA,U+17B8,U+17C1,U+17BB,U+17BB,U+… 18 ../fonts/b6031119874ae9ff1dd65383a335e361c0962220.ttf::U+179F,U+17CA,U+17BE,U+17B8,U+1794:[uni17C1=… 19 ../fonts/b6031119874ae9ff1dd65383a335e361c0962220.ttf::U+179F,U+17CA,U+17B8,U+17BE,U+1794:[uni179F=… 20 ../fonts/b6031119874ae9ff1dd65383a335e361c0962220.ttf::U+179F,U+17CA,U+17BE,U+17B8,U+17BB,U+1794:[u… [all …]
|
/third_party/skia/third_party/externals/harfbuzz/test/shape/data/in-house/tests/ |
D | khmer-mark-order.tests | 1 ../fonts/b6031119874ae9ff1dd65383a335e361c0962220.ttf;;U+179F,U+17CA,U+17BE,U+1794;[uni17C1=0+288|u… 8 ../fonts/b6031119874ae9ff1dd65383a335e361c0962220.ttf;;U+179F,U+17CA,U+17BE,U+17BB,U+1794;[uni17C1=… 9 ../fonts/b6031119874ae9ff1dd65383a335e361c0962220.ttf;;U+179F,U+17CA,U+17C1,U+17B8,U+17BB,U+1794;[u… 10 ../fonts/b6031119874ae9ff1dd65383a335e361c0962220.ttf;;U+179F,U+17CA,U+17B8,U+17C1,U+17BB,U+1794;[u… 11 ../fonts/b6031119874ae9ff1dd65383a335e361c0962220.ttf;;U+179F,U+17CA,U+17BE,U+17BB,U+17BB,U+1794;[u… 12 ../fonts/b6031119874ae9ff1dd65383a335e361c0962220.ttf;;U+179F,U+17CA,U+17C1,U+17B8,U+17BB,U+17BB,U+… 13 ../fonts/b6031119874ae9ff1dd65383a335e361c0962220.ttf;;U+179F,U+17CA,U+17B8,U+17C1,U+17BB,U+17BB,U+… 18 ../fonts/b6031119874ae9ff1dd65383a335e361c0962220.ttf;;U+179F,U+17CA,U+17BE,U+17B8,U+1794;[uni17C1=… 19 ../fonts/b6031119874ae9ff1dd65383a335e361c0962220.ttf;;U+179F,U+17CA,U+17B8,U+17BE,U+1794;[uni179F=… 20 ../fonts/b6031119874ae9ff1dd65383a335e361c0962220.ttf;;U+179F,U+17CA,U+17BE,U+17B8,U+17BB,U+1794;[u… [all …]
|