Home
last modified time | relevance | path

Searched refs:CA (Results 1 – 25 of 1389) sorted by relevance

12345678910>>...56

/third_party/libphonenumber/resources/geocoding/en/
D1.txt1144 1209221|Tracy, CA
1145 1209223|Jackson, CA
1146 1209234|Stockton, CA
1147 1209238|Modesto, CA
1148 1209239|Manteca, CA
1149 1209245|Plymouth, CA
1150 1209257|Jackson, CA
1151 1209267|Sutter Creek, CA
1152 1209274|Ione, CA
1153 1209293|West Point, CA
[all …]
/third_party/openssl/test/
Ddanetest.in30 # subject= CN = Issuer CA
38 # subject= CN = Root CA
177 issuer= /CN=Issuer CA
191 subject= /CN=Issuer CA
192 issuer= /CN=Root CA
205 subject= /CN=Root CA
206 issuer= /CN=Root CA
224 issuer= /CN=Issuer CA
238 subject= /CN=Issuer CA
239 issuer= /CN=Root CA
[all …]
DCAtsa.cnf33 certificate = $dir/cacert.pem # The CA certificate
43 # For the CA policy
67 organizationName = Gov-CA Ltd.
79 # TSA server cert is not a CA cert.
80 basicConstraints=CA:FALSE
92 # This is not a CA cert and not a TSA cert, either (timeStamping usage missing)
93 basicConstraints=CA:FALSE
107 basicConstraints = CA:FALSE
112 # Extensions for a typical CA
116 basicConstraints = critical,CA:true
/third_party/node/doc/contributing/maintaining/
Dmaintaining-root-certs.md88 < Parsing: Certplus Root CA G1
89 < Parsing: Certplus Root CA G2
90 < Parsing: OpenTrust Root CA G1
91 < Parsing: OpenTrust Root CA G2
92 < Parsing: OpenTrust Root CA G3
94 < Done (133 CA certs processed, 20 skipped).
96 > Parsing: GlobalSign Root CA - R6
97 > Parsing: OISTE WISeKey Global Root GC CA
104 > Parsing: Certigna Root CA
105 > Done (135 CA certs processed, 16 skipped).
[all …]
/third_party/skia/third_party/externals/swiftshader/third_party/llvm-10.0/llvm/lib/Transforms/Utils/
DCtorUtils.cpp38 Constant *CA = ConstantArray::get(ATy, CAList); in removeGlobalCtors() local
41 if (CA->getType() == OldCA->getType()) { in removeGlobalCtors()
42 GCL->setInitializer(CA); in removeGlobalCtors()
48 new GlobalVariable(CA->getType(), GCL->isConstant(), GCL->getLinkage(), in removeGlobalCtors()
49 CA, "", GCL->getThreadLocalMode()); in removeGlobalCtors()
68 ConstantArray *CA = cast<ConstantArray>(GV->getInitializer()); in parseGlobalCtors() local
70 Result.reserve(CA->getNumOperands()); in parseGlobalCtors()
71 for (auto &V : CA->operands()) { in parseGlobalCtors()
92 ConstantArray *CA = cast<ConstantArray>(GV->getInitializer()); in findGlobalCtors() local
94 for (auto &V : CA->operands()) { in findGlobalCtors()
/third_party/openssl/doc/man1/
DCA.pl.pod5 CA.pl - friendlier interface for OpenSSL certificate programs
9 B<CA.pl>
14 B<CA.pl>
26 B<CA.pl> B<-pkcs12> [I<certname>]
28 B<CA.pl> B<-verify> I<certfile> ...
30 B<CA.pl> B<-revoke> I<certfile> [I<reason>]
34 The B<CA.pl> script is a perl script that supplies the relevant command line
45 B<CA.pl> script.
47 Under some environments it may not be possible to run the B<CA.pl> script
51 perl -S CA.pl
[all …]
/third_party/openssl/doc/man3/
DSSL_CTX_set0_CA_list.pod18 - get or set CA list
42 The functions described here set and manage the list of CA names that are sent
45 For TLS versions 1.2 and earlier the list of CA names is only sent from the
46 server to the client when requesting a client certificate. So any list of CA
47 names set is never sent from client to server and the list of CA names retrieved
50 For TLS 1.3 the list of CA names is sent using the B<certificate_authorities>
54 In most cases it is not necessary to set CA names on the client side. The list
55 of CA names that are acceptable to the client will be sent in plaintext to the
58 and therefore setting CA names on the client side will have no impact if that
62 The "client CA list" functions below only have an effect when called on the
[all …]
DSSL_CTX_load_verify_locations.pod9 - set default locations for trusted CA certificates
32 locations for B<ctx>, at which CA certificates for verification purposes
40 which CA certificates are loaded should be used. There is one default directory,
42 The default CA certificates directory is called F<certs> in the default OpenSSL
46 The default CA certificates file is called F<cert.pem> in the default
65 If B<CAfile> is not NULL, it points to a file of CA certificates in PEM
66 format. The file can contain several CA certificates identified by
69 ... (CA certificate in base64 encoding) ...
78 If B<CApath> is not NULL, it points to a directory containing CA certificates
79 in PEM format. The files each contain one CA certificate. The files are
[all …]
DX509_check_ca.pod5 X509_check_ca - check if given certificate is CA certificate
15 This function checks if given certificate is CA certificate (can be used
21 Function return 0, if it is not CA certificate, 1 if it is proper X509v3
22 CA certificate with B<basicConstraints> extension CA:TRUE,
26 extension telling that it is CA certificate.
DX509_check_purpose.pod17 checked to determine if it's a possible CA with various levels of certainty
38 For non-CA checks
50 For CA checks the below integers could be returned with the following meanings:
56 =item E<32>0 not a CA or does not have the purpose represented by I<id>
58 =item E<32>1 is a CA.
61 New versions will not return this value. May be a CA
67 =item E<32>5 legacy Netscape specific CA Flags present
/third_party/curl/docs/
DSSLCERTS.md22 This system is about trust. In your local CA certificate store you have certs
38 by using a CA certificate store that the SSL library can use to make sure the
42 certificates in the CA store, you can be sure that the remote server really is
45 If the remote server uses a self-signed certificate, if you do not install a CA
46 cert store, if the server uses a certificate signed by a CA that is not
56 2. Get a CA certificate that can verify the remote server and use the proper
57 option to point out this CA cert for verification when connecting. For
62 3. Add the CA cert for your server to the existing default CA certificate
63 store. The default CA certificate store can be changed at compile time with
66 `--with-ca-bundle=FILE`: use the specified file as the CA certificate
[all …]
/third_party/openssl/apps/
DCA.pl.in26 my $CA = "$openssl ca $OPENSSL_CONFIG";
124CA.pl -newcert | -newreq | -newreq-nodes | -xsign | -sign | -signCA | -signcert | -crl | -newca [-…
125 CA.pl -pkcs12 [certname]
126 CA.pl -verify certfile ...
127 CA.pl -revoke certfile [reason]
179 $RET = run("$CA -create_serial"
194 $RET = run("$CA -policy policy_anything -infiles $NEWREQ $EXTRA{ca}");
196 $RET = run("$CA -policy policy_anything -out $NEWCERT"
200 $RET = run("$CA -policy policy_anything -out $NEWCERT"
206 $RET = run("$CA -policy policy_anything -out $NEWCERT"
[all …]
/third_party/node/deps/openssl/openssl/apps/
DCA.pl.in26 my $CA = "$openssl ca $OPENSSL_CONFIG";
124CA.pl -newcert | -newreq | -newreq-nodes | -xsign | -sign | -signCA | -signcert | -crl | -newca [-…
125 CA.pl -pkcs12 [certname]
126 CA.pl -verify certfile ...
127 CA.pl -revoke certfile [reason]
179 $RET = run("$CA -create_serial"
194 $RET = run("$CA -policy policy_anything -infiles $NEWREQ $EXTRA{ca}");
196 $RET = run("$CA -policy policy_anything -out $NEWCERT"
200 $RET = run("$CA -policy policy_anything -out $NEWCERT"
206 $RET = run("$CA -policy policy_anything -out $NEWCERT"
[all …]
/third_party/node/tools/
Dcertdata.txt75 # Certificate "GlobalSign Root CA"
77 # Issuer: CN=GlobalSign Root CA,OU=Root CA,O=GlobalSign nv-sa,C=BE
79 # Subject: CN=GlobalSign Root CA,OU=Root CA,O=GlobalSign nv-sa,C=BE
88 CKA_LABEL UTF8 "GlobalSign Root CA"
172 # Trust for "GlobalSign Root CA"
173 # Issuer: CN=GlobalSign Root CA,OU=Root CA,O=GlobalSign nv-sa,C=BE
175 # Subject: CN=GlobalSign Root CA,OU=Root CA,O=GlobalSign nv-sa,C=BE
184 CKA_LABEL UTF8 "GlobalSign Root CA"
387 # Fingerprint (SHA1): 61:EF:43:D7:7F:CA:D4:61:51:BC:98:E0:C3:59:12:AF:9F:EB:63:11
511 # Fingerprint (SHA1): 61:EF:43:D7:7F:CA:D4:61:51:BC:98:E0:C3:59:12:AF:9F:EB:63:11
[all …]
/third_party/mbedtls/tests/data_files/
Dtest-ca.opensslconf8 commonName = PolarSSL Test CA
13 basicConstraints = CA:true
18 basicConstraints = CA:true
53 basicConstraints = CA:true
57 basicConstraints = CA:true
61 basicConstraints = CA:true
65 basicConstraints = CA:true
76 basicConstraints = CA:true
DReadme-x509.txt7 - test-ca.crt aka "C=NL, O=PolarSSL, CN=PolarSSL Test CA"
11 - test-ca2*.crt aka "C=NL, O=PolarSSL, CN=Polarssl Test EC CA"
17 - test-int-ca.crt "C=NL, O=PolarSSL, CN=PolarSSL Test Intermediate CA"
20 - test-int-ca2.crt "C=NL, O=PolarSSL, CN=PolarSSL Test Intermediate EC CA"
23 A third intermediate CA is signed by test-int-ca2.crt:
24 - test-int-ca3.crt "C=UK, O=mbed TLS, CN=mbed TLS Test intermediate CA 3"
30 - test-ca-v1.crt: v1 "CA", signs
31 server1-v1.crt: v1 "intermediate CA", signs
41 - issuing CA: 1 -> test-ca.crt
61 the RSA test CA.
[all …]
/third_party/mbedtls/tests/suites/
Dtest_suite_x509write.data63 …:"data_files/test-ca.key":"PolarSSLTest":"C=NL,O=PolarSSL,CN=PolarSSL Test CA":"01":"2019021014440…
67 …:"data_files/test-ca.key":"PolarSSLTest":"C=NL,O=PolarSSL,CN=PolarSSL Test CA":"01":"1970021014440…
71 …:"data_files/test-ca.key":"PolarSSLTest":"C=NL,O=PolarSSL,CN=PolarSSL Test CA":"01":"2019021014440…
75 …:"data_files/test-ca.key":"PolarSSLTest":"C=NL,O=PolarSSL,CN=PolarSSL Test CA":"01":"1970021014440…
79 …:"data_files/test-ca.key":"PolarSSLTest":"C=NL,O=PolarSSL,CN=PolarSSL Test CA":"01":"2050021014440…
83 …:"data_files/test-ca.key":"PolarSSLTest":"C=NL,O=PolarSSL,CN=PolarSSL Test CA":"01":"2019021014440…
87 …:"data_files/test-ca.key":"PolarSSLTest":"C=NL,O=PolarSSL,CN=PolarSSL Test CA":"01":"2011021214440…
91 …:"data_files/test-ca.key":"PolarSSLTest":"C=NL,O=PolarSSL,CN=PolarSSL Test CA":"01":"2011021214440…
95 …:"data_files/test-ca.key":"PolarSSLTest":"C=NL,O=PolarSSL,CN=PolarSSL Test CA":"01":"2019021014440…
99 …:"data_files/test-ca.key":"PolarSSLTest":"C=NL,O=PolarSSL,CN=PolarSSL Test CA":"01":"2019021014440…
[all …]
/third_party/mbedtls/tests/data_files/dir4/
DReadme3 1. zero pathlen constraint on an intermediate CA (invalid)
8 2. zero pathlen constraint on the root CA (invalid)
13 3. nonzero pathlen constraint on the root CA (invalid)
18 4. nonzero pathlen constraint on an intermediate CA (invalid)
23 5. nonzero pathlen constraint on an intermediate CA with maximum number of elements in the chain (v…
28 6. nonzero pathlen constraint on the root CA with maximum number of elements in the chain (valid)
33 7. pathlen constraint on the root CA with maximum number of elements and a self signed certificate …
39 8. zero pathlen constraint on first intermediate CA (valid)
/third_party/skia/third_party/externals/harfbuzz/test/shape/data/in-house/tests/
Dkhmer-mark-order.tests1 ../fonts/b6031119874ae9ff1dd65383a335e361c0962220.ttf;;U+179F,U+17CA,U+17BE,U+1794;[uni17C1=0+288|u…
8 ../fonts/b6031119874ae9ff1dd65383a335e361c0962220.ttf;;U+179F,U+17CA,U+17BE,U+17BB,U+1794;[uni17C1=…
9 ../fonts/b6031119874ae9ff1dd65383a335e361c0962220.ttf;;U+179F,U+17CA,U+17C1,U+17B8,U+17BB,U+1794;[u…
10 ../fonts/b6031119874ae9ff1dd65383a335e361c0962220.ttf;;U+179F,U+17CA,U+17B8,U+17C1,U+17BB,U+1794;[u…
11 ../fonts/b6031119874ae9ff1dd65383a335e361c0962220.ttf;;U+179F,U+17CA,U+17BE,U+17BB,U+17BB,U+1794;[u…
12 ../fonts/b6031119874ae9ff1dd65383a335e361c0962220.ttf;;U+179F,U+17CA,U+17C1,U+17B8,U+17BB,U+17BB,U+…
13 ../fonts/b6031119874ae9ff1dd65383a335e361c0962220.ttf;;U+179F,U+17CA,U+17B8,U+17C1,U+17BB,U+17BB,U+…
18 ../fonts/b6031119874ae9ff1dd65383a335e361c0962220.ttf;;U+179F,U+17CA,U+17BE,U+17B8,U+1794;[uni17C1=…
19 ../fonts/b6031119874ae9ff1dd65383a335e361c0962220.ttf;;U+179F,U+17CA,U+17B8,U+17BE,U+1794;[uni179F=…
20 ../fonts/b6031119874ae9ff1dd65383a335e361c0962220.ttf;;U+179F,U+17CA,U+17BE,U+17B8,U+17BB,U+1794;[u…
[all …]
/third_party/openssl/test/smime-certs/
Dmksmime-certs.sh24 $OPENSSL x509 -req -in req.pem -CA smroot.pem -days 36500 \
29 $OPENSSL x509 -req -in req.pem -CA smroot.pem -days 36500 \
34 $OPENSSL x509 -req -in req.pem -CA smroot.pem -days 36500 \
43 $OPENSSL x509 -req -in req.pem -CA smroot.pem -days 36500 \
47 $OPENSSL x509 -req -in req.pem -CA smroot.pem -days 36500 \
51 $OPENSSL x509 -req -in req.pem -CA smroot.pem -days 36500 \
61 $OPENSSL x509 -req -in req.pem -CA smroot.pem -days 36500 \
65 $OPENSSL x509 -req -in req.pem -CA smroot.pem -days 36500 \
81 $OPENSSL x509 -req -in req.pem -CA smroot.pem -days 36500 \
/third_party/openssl/test/certs/
Dmkcert.sh156 cert "$cert" "$exts" -CA "${cacert}.pem" -CAkey "${cakey}.pem" \
177 cert "$cert" "$exts" -CA "${cacert}.pem" -CAkey "${cakey}.pem" \
199 cert "$cert" "$exts" -CA "${ca}.pem" -CAkey "${cakey}.pem" \
216 cert "$cert" "$exts" -CA "${ca}.pem" -CAkey "${cakey}.pem" \
266 cert "$cert" "$exts" -CA "${ca}.pem" -CAkey "${cakey}.pem" \
300 cert "$cert" "$exts" -CA "${ca}.pem" -CAkey "${cakey}.pem" \
329 cert "$cert" "$exts" -CA "${ca}.pem" -CAkey "${cakey}.pem" \
389 cert "$cert" "$exts" -CA "${ca}.pem" -CAkey "${cakey}.pem" \
407 cert "$cert" "$exts" -CA "${ca}.pem" -CAkey "${cakey}.pem" \
/third_party/skia/third_party/externals/abseil-cpp/absl/time/internal/cctz/testdata/zoneinfo/
Dzone1970.tab104 CA +4734-05243 America/St_Johns Newfoundland; Labrador (southeast)
105 CA +4439-06336 America/Halifax Atlantic - NS (most areas); PE
106 CA +4612-05957 America/Glace_Bay Atlantic - NS (Cape Breton)
107 CA +4606-06447 America/Moncton Atlantic - New Brunswick
108 CA +5320-06025 America/Goose_Bay Atlantic - Labrador (most areas)
109 CA +5125-05707 America/Blanc-Sablon AST - QC (Lower North Shore)
110 CA +4339-07923 America/Toronto Eastern - ON, QC (most areas)
111 CA +4901-08816 America/Nipigon Eastern - ON, QC (no DST 1967-73)
112 CA +4823-08915 America/Thunder_Bay Eastern - ON (Thunder Bay)
113 CA +6344-06828 America/Iqaluit Eastern - NU (most east areas)
[all …]
/third_party/node/test/fixtures/keys/
Dfake-startcom-root-database.txt1 V 22920830184221Z 01 unknown /C=US/ST=CA/L=SF/O=NODEJS/OU=agent8/CN=localhost
2 V 22920830184221Z 02 unknown /C=US/ST=CA/L=SF/O=NODEJS/OU=agent9/CN=localhost
3 V 22960617144652Z 03 unknown /C=US/ST=CA/L=SF/O=NODEJS/OU=agent8/CN=localhost
4 V 22960617144653Z 04 unknown /C=US/ST=CA/L=SF/O=NODEJS/OU=agent9/CN=localhost
/third_party/openssl/demos/certs/
Dca.cnf38 basicConstraints=critical, CA:FALSE
47 basicConstraints=critical, CA:FALSE
60 basicConstraints=critical, CA:FALSE
70 # Extensions for a typical CA
76 basicConstraints = critical,CA:true
79 # Minimal CA entry to allow generation of CRLs.
/third_party/libwebsockets/minimal-examples/secure-streams/minimal-secure-streams-proxy/
DREADME.md26 [2020/02/26 15:41:27:5771] N: lws_tls_client_create_vhost_context: using mem client CA cert 1391
28 [2020/02/26 15:41:27:8682] N: lws_tls_client_create_vhost_context: using mem client CA cert 837
29 [2020/02/26 15:41:27:8683] N: lws_tls_client_create_vhost_context: using mem client CA cert 1043
30 [2020/02/26 15:41:27:8684] N: lws_tls_client_create_vhost_context: using mem client CA cert 1167
31 [2020/02/26 15:41:27:8684] N: lws_tls_client_create_vhost_context: using mem client CA cert 1391

12345678910>>...56