/third_party/libphonenumber/resources/geocoding/en/ |
D | 1.txt | 1144 1209221|Tracy, CA 1145 1209223|Jackson, CA 1146 1209234|Stockton, CA 1147 1209238|Modesto, CA 1148 1209239|Manteca, CA 1149 1209245|Plymouth, CA 1150 1209257|Jackson, CA 1151 1209267|Sutter Creek, CA 1152 1209274|Ione, CA 1153 1209293|West Point, CA [all …]
|
/third_party/openssl/test/ |
D | danetest.in | 30 # subject= CN = Issuer CA 38 # subject= CN = Root CA 177 issuer= /CN=Issuer CA 191 subject= /CN=Issuer CA 192 issuer= /CN=Root CA 205 subject= /CN=Root CA 206 issuer= /CN=Root CA 224 issuer= /CN=Issuer CA 238 subject= /CN=Issuer CA 239 issuer= /CN=Root CA [all …]
|
D | CAtsa.cnf | 33 certificate = $dir/cacert.pem # The CA certificate 43 # For the CA policy 67 organizationName = Gov-CA Ltd. 79 # TSA server cert is not a CA cert. 80 basicConstraints=CA:FALSE 92 # This is not a CA cert and not a TSA cert, either (timeStamping usage missing) 93 basicConstraints=CA:FALSE 107 basicConstraints = CA:FALSE 112 # Extensions for a typical CA 116 basicConstraints = critical,CA:true
|
/third_party/node/doc/contributing/maintaining/ |
D | maintaining-root-certs.md | 88 < Parsing: Certplus Root CA G1 89 < Parsing: Certplus Root CA G2 90 < Parsing: OpenTrust Root CA G1 91 < Parsing: OpenTrust Root CA G2 92 < Parsing: OpenTrust Root CA G3 94 < Done (133 CA certs processed, 20 skipped). 96 > Parsing: GlobalSign Root CA - R6 97 > Parsing: OISTE WISeKey Global Root GC CA 104 > Parsing: Certigna Root CA 105 > Done (135 CA certs processed, 16 skipped). [all …]
|
/third_party/skia/third_party/externals/swiftshader/third_party/llvm-10.0/llvm/lib/Transforms/Utils/ |
D | CtorUtils.cpp | 38 Constant *CA = ConstantArray::get(ATy, CAList); in removeGlobalCtors() local 41 if (CA->getType() == OldCA->getType()) { in removeGlobalCtors() 42 GCL->setInitializer(CA); in removeGlobalCtors() 48 new GlobalVariable(CA->getType(), GCL->isConstant(), GCL->getLinkage(), in removeGlobalCtors() 49 CA, "", GCL->getThreadLocalMode()); in removeGlobalCtors() 68 ConstantArray *CA = cast<ConstantArray>(GV->getInitializer()); in parseGlobalCtors() local 70 Result.reserve(CA->getNumOperands()); in parseGlobalCtors() 71 for (auto &V : CA->operands()) { in parseGlobalCtors() 92 ConstantArray *CA = cast<ConstantArray>(GV->getInitializer()); in findGlobalCtors() local 94 for (auto &V : CA->operands()) { in findGlobalCtors()
|
/third_party/openssl/doc/man1/ |
D | CA.pl.pod | 5 CA.pl - friendlier interface for OpenSSL certificate programs 9 B<CA.pl> 14 B<CA.pl> 26 B<CA.pl> B<-pkcs12> [I<certname>] 28 B<CA.pl> B<-verify> I<certfile> ... 30 B<CA.pl> B<-revoke> I<certfile> [I<reason>] 34 The B<CA.pl> script is a perl script that supplies the relevant command line 45 B<CA.pl> script. 47 Under some environments it may not be possible to run the B<CA.pl> script 51 perl -S CA.pl [all …]
|
/third_party/openssl/doc/man3/ |
D | SSL_CTX_set0_CA_list.pod | 18 - get or set CA list 42 The functions described here set and manage the list of CA names that are sent 45 For TLS versions 1.2 and earlier the list of CA names is only sent from the 46 server to the client when requesting a client certificate. So any list of CA 47 names set is never sent from client to server and the list of CA names retrieved 50 For TLS 1.3 the list of CA names is sent using the B<certificate_authorities> 54 In most cases it is not necessary to set CA names on the client side. The list 55 of CA names that are acceptable to the client will be sent in plaintext to the 58 and therefore setting CA names on the client side will have no impact if that 62 The "client CA list" functions below only have an effect when called on the [all …]
|
D | SSL_CTX_load_verify_locations.pod | 9 - set default locations for trusted CA certificates 32 locations for B<ctx>, at which CA certificates for verification purposes 40 which CA certificates are loaded should be used. There is one default directory, 42 The default CA certificates directory is called F<certs> in the default OpenSSL 46 The default CA certificates file is called F<cert.pem> in the default 65 If B<CAfile> is not NULL, it points to a file of CA certificates in PEM 66 format. The file can contain several CA certificates identified by 69 ... (CA certificate in base64 encoding) ... 78 If B<CApath> is not NULL, it points to a directory containing CA certificates 79 in PEM format. The files each contain one CA certificate. The files are [all …]
|
D | X509_check_ca.pod | 5 X509_check_ca - check if given certificate is CA certificate 15 This function checks if given certificate is CA certificate (can be used 21 Function return 0, if it is not CA certificate, 1 if it is proper X509v3 22 CA certificate with B<basicConstraints> extension CA:TRUE, 26 extension telling that it is CA certificate.
|
D | X509_check_purpose.pod | 17 checked to determine if it's a possible CA with various levels of certainty 38 For non-CA checks 50 For CA checks the below integers could be returned with the following meanings: 56 =item E<32>0 not a CA or does not have the purpose represented by I<id> 58 =item E<32>1 is a CA. 61 New versions will not return this value. May be a CA 67 =item E<32>5 legacy Netscape specific CA Flags present
|
/third_party/curl/docs/ |
D | SSLCERTS.md | 22 This system is about trust. In your local CA certificate store you have certs 38 by using a CA certificate store that the SSL library can use to make sure the 42 certificates in the CA store, you can be sure that the remote server really is 45 If the remote server uses a self-signed certificate, if you do not install a CA 46 cert store, if the server uses a certificate signed by a CA that is not 56 2. Get a CA certificate that can verify the remote server and use the proper 57 option to point out this CA cert for verification when connecting. For 62 3. Add the CA cert for your server to the existing default CA certificate 63 store. The default CA certificate store can be changed at compile time with 66 `--with-ca-bundle=FILE`: use the specified file as the CA certificate [all …]
|
/third_party/openssl/apps/ |
D | CA.pl.in | 26 my $CA = "$openssl ca $OPENSSL_CONFIG"; 124 …CA.pl -newcert | -newreq | -newreq-nodes | -xsign | -sign | -signCA | -signcert | -crl | -newca [-… 125 CA.pl -pkcs12 [certname] 126 CA.pl -verify certfile ... 127 CA.pl -revoke certfile [reason] 179 $RET = run("$CA -create_serial" 194 $RET = run("$CA -policy policy_anything -infiles $NEWREQ $EXTRA{ca}"); 196 $RET = run("$CA -policy policy_anything -out $NEWCERT" 200 $RET = run("$CA -policy policy_anything -out $NEWCERT" 206 $RET = run("$CA -policy policy_anything -out $NEWCERT" [all …]
|
/third_party/node/deps/openssl/openssl/apps/ |
D | CA.pl.in | 26 my $CA = "$openssl ca $OPENSSL_CONFIG"; 124 …CA.pl -newcert | -newreq | -newreq-nodes | -xsign | -sign | -signCA | -signcert | -crl | -newca [-… 125 CA.pl -pkcs12 [certname] 126 CA.pl -verify certfile ... 127 CA.pl -revoke certfile [reason] 179 $RET = run("$CA -create_serial" 194 $RET = run("$CA -policy policy_anything -infiles $NEWREQ $EXTRA{ca}"); 196 $RET = run("$CA -policy policy_anything -out $NEWCERT" 200 $RET = run("$CA -policy policy_anything -out $NEWCERT" 206 $RET = run("$CA -policy policy_anything -out $NEWCERT" [all …]
|
/third_party/node/tools/ |
D | certdata.txt | 75 # Certificate "GlobalSign Root CA" 77 # Issuer: CN=GlobalSign Root CA,OU=Root CA,O=GlobalSign nv-sa,C=BE 79 # Subject: CN=GlobalSign Root CA,OU=Root CA,O=GlobalSign nv-sa,C=BE 88 CKA_LABEL UTF8 "GlobalSign Root CA" 172 # Trust for "GlobalSign Root CA" 173 # Issuer: CN=GlobalSign Root CA,OU=Root CA,O=GlobalSign nv-sa,C=BE 175 # Subject: CN=GlobalSign Root CA,OU=Root CA,O=GlobalSign nv-sa,C=BE 184 CKA_LABEL UTF8 "GlobalSign Root CA" 387 # Fingerprint (SHA1): 61:EF:43:D7:7F:CA:D4:61:51:BC:98:E0:C3:59:12:AF:9F:EB:63:11 511 # Fingerprint (SHA1): 61:EF:43:D7:7F:CA:D4:61:51:BC:98:E0:C3:59:12:AF:9F:EB:63:11 [all …]
|
/third_party/mbedtls/tests/data_files/ |
D | test-ca.opensslconf | 8 commonName = PolarSSL Test CA 13 basicConstraints = CA:true 18 basicConstraints = CA:true 53 basicConstraints = CA:true 57 basicConstraints = CA:true 61 basicConstraints = CA:true 65 basicConstraints = CA:true 76 basicConstraints = CA:true
|
D | Readme-x509.txt | 7 - test-ca.crt aka "C=NL, O=PolarSSL, CN=PolarSSL Test CA" 11 - test-ca2*.crt aka "C=NL, O=PolarSSL, CN=Polarssl Test EC CA" 17 - test-int-ca.crt "C=NL, O=PolarSSL, CN=PolarSSL Test Intermediate CA" 20 - test-int-ca2.crt "C=NL, O=PolarSSL, CN=PolarSSL Test Intermediate EC CA" 23 A third intermediate CA is signed by test-int-ca2.crt: 24 - test-int-ca3.crt "C=UK, O=mbed TLS, CN=mbed TLS Test intermediate CA 3" 30 - test-ca-v1.crt: v1 "CA", signs 31 server1-v1.crt: v1 "intermediate CA", signs 41 - issuing CA: 1 -> test-ca.crt 61 the RSA test CA. [all …]
|
/third_party/mbedtls/tests/suites/ |
D | test_suite_x509write.data | 63 …:"data_files/test-ca.key":"PolarSSLTest":"C=NL,O=PolarSSL,CN=PolarSSL Test CA":"01":"2019021014440… 67 …:"data_files/test-ca.key":"PolarSSLTest":"C=NL,O=PolarSSL,CN=PolarSSL Test CA":"01":"1970021014440… 71 …:"data_files/test-ca.key":"PolarSSLTest":"C=NL,O=PolarSSL,CN=PolarSSL Test CA":"01":"2019021014440… 75 …:"data_files/test-ca.key":"PolarSSLTest":"C=NL,O=PolarSSL,CN=PolarSSL Test CA":"01":"1970021014440… 79 …:"data_files/test-ca.key":"PolarSSLTest":"C=NL,O=PolarSSL,CN=PolarSSL Test CA":"01":"2050021014440… 83 …:"data_files/test-ca.key":"PolarSSLTest":"C=NL,O=PolarSSL,CN=PolarSSL Test CA":"01":"2019021014440… 87 …:"data_files/test-ca.key":"PolarSSLTest":"C=NL,O=PolarSSL,CN=PolarSSL Test CA":"01":"2011021214440… 91 …:"data_files/test-ca.key":"PolarSSLTest":"C=NL,O=PolarSSL,CN=PolarSSL Test CA":"01":"2011021214440… 95 …:"data_files/test-ca.key":"PolarSSLTest":"C=NL,O=PolarSSL,CN=PolarSSL Test CA":"01":"2019021014440… 99 …:"data_files/test-ca.key":"PolarSSLTest":"C=NL,O=PolarSSL,CN=PolarSSL Test CA":"01":"2019021014440… [all …]
|
/third_party/mbedtls/tests/data_files/dir4/ |
D | Readme | 3 1. zero pathlen constraint on an intermediate CA (invalid) 8 2. zero pathlen constraint on the root CA (invalid) 13 3. nonzero pathlen constraint on the root CA (invalid) 18 4. nonzero pathlen constraint on an intermediate CA (invalid) 23 5. nonzero pathlen constraint on an intermediate CA with maximum number of elements in the chain (v… 28 6. nonzero pathlen constraint on the root CA with maximum number of elements in the chain (valid) 33 7. pathlen constraint on the root CA with maximum number of elements and a self signed certificate … 39 8. zero pathlen constraint on first intermediate CA (valid)
|
/third_party/skia/third_party/externals/harfbuzz/test/shape/data/in-house/tests/ |
D | khmer-mark-order.tests | 1 ../fonts/b6031119874ae9ff1dd65383a335e361c0962220.ttf;;U+179F,U+17CA,U+17BE,U+1794;[uni17C1=0+288|u… 8 ../fonts/b6031119874ae9ff1dd65383a335e361c0962220.ttf;;U+179F,U+17CA,U+17BE,U+17BB,U+1794;[uni17C1=… 9 ../fonts/b6031119874ae9ff1dd65383a335e361c0962220.ttf;;U+179F,U+17CA,U+17C1,U+17B8,U+17BB,U+1794;[u… 10 ../fonts/b6031119874ae9ff1dd65383a335e361c0962220.ttf;;U+179F,U+17CA,U+17B8,U+17C1,U+17BB,U+1794;[u… 11 ../fonts/b6031119874ae9ff1dd65383a335e361c0962220.ttf;;U+179F,U+17CA,U+17BE,U+17BB,U+17BB,U+1794;[u… 12 ../fonts/b6031119874ae9ff1dd65383a335e361c0962220.ttf;;U+179F,U+17CA,U+17C1,U+17B8,U+17BB,U+17BB,U+… 13 ../fonts/b6031119874ae9ff1dd65383a335e361c0962220.ttf;;U+179F,U+17CA,U+17B8,U+17C1,U+17BB,U+17BB,U+… 18 ../fonts/b6031119874ae9ff1dd65383a335e361c0962220.ttf;;U+179F,U+17CA,U+17BE,U+17B8,U+1794;[uni17C1=… 19 ../fonts/b6031119874ae9ff1dd65383a335e361c0962220.ttf;;U+179F,U+17CA,U+17B8,U+17BE,U+1794;[uni179F=… 20 ../fonts/b6031119874ae9ff1dd65383a335e361c0962220.ttf;;U+179F,U+17CA,U+17BE,U+17B8,U+17BB,U+1794;[u… [all …]
|
/third_party/openssl/test/smime-certs/ |
D | mksmime-certs.sh | 24 $OPENSSL x509 -req -in req.pem -CA smroot.pem -days 36500 \ 29 $OPENSSL x509 -req -in req.pem -CA smroot.pem -days 36500 \ 34 $OPENSSL x509 -req -in req.pem -CA smroot.pem -days 36500 \ 43 $OPENSSL x509 -req -in req.pem -CA smroot.pem -days 36500 \ 47 $OPENSSL x509 -req -in req.pem -CA smroot.pem -days 36500 \ 51 $OPENSSL x509 -req -in req.pem -CA smroot.pem -days 36500 \ 61 $OPENSSL x509 -req -in req.pem -CA smroot.pem -days 36500 \ 65 $OPENSSL x509 -req -in req.pem -CA smroot.pem -days 36500 \ 81 $OPENSSL x509 -req -in req.pem -CA smroot.pem -days 36500 \
|
/third_party/openssl/test/certs/ |
D | mkcert.sh | 156 cert "$cert" "$exts" -CA "${cacert}.pem" -CAkey "${cakey}.pem" \ 177 cert "$cert" "$exts" -CA "${cacert}.pem" -CAkey "${cakey}.pem" \ 199 cert "$cert" "$exts" -CA "${ca}.pem" -CAkey "${cakey}.pem" \ 216 cert "$cert" "$exts" -CA "${ca}.pem" -CAkey "${cakey}.pem" \ 266 cert "$cert" "$exts" -CA "${ca}.pem" -CAkey "${cakey}.pem" \ 300 cert "$cert" "$exts" -CA "${ca}.pem" -CAkey "${cakey}.pem" \ 329 cert "$cert" "$exts" -CA "${ca}.pem" -CAkey "${cakey}.pem" \ 389 cert "$cert" "$exts" -CA "${ca}.pem" -CAkey "${cakey}.pem" \ 407 cert "$cert" "$exts" -CA "${ca}.pem" -CAkey "${cakey}.pem" \
|
/third_party/skia/third_party/externals/abseil-cpp/absl/time/internal/cctz/testdata/zoneinfo/ |
D | zone1970.tab | 104 CA +4734-05243 America/St_Johns Newfoundland; Labrador (southeast) 105 CA +4439-06336 America/Halifax Atlantic - NS (most areas); PE 106 CA +4612-05957 America/Glace_Bay Atlantic - NS (Cape Breton) 107 CA +4606-06447 America/Moncton Atlantic - New Brunswick 108 CA +5320-06025 America/Goose_Bay Atlantic - Labrador (most areas) 109 CA +5125-05707 America/Blanc-Sablon AST - QC (Lower North Shore) 110 CA +4339-07923 America/Toronto Eastern - ON, QC (most areas) 111 CA +4901-08816 America/Nipigon Eastern - ON, QC (no DST 1967-73) 112 CA +4823-08915 America/Thunder_Bay Eastern - ON (Thunder Bay) 113 CA +6344-06828 America/Iqaluit Eastern - NU (most east areas) [all …]
|
/third_party/node/test/fixtures/keys/ |
D | fake-startcom-root-database.txt | 1 V 22920830184221Z 01 unknown /C=US/ST=CA/L=SF/O=NODEJS/OU=agent8/CN=localhost 2 V 22920830184221Z 02 unknown /C=US/ST=CA/L=SF/O=NODEJS/OU=agent9/CN=localhost 3 V 22960617144652Z 03 unknown /C=US/ST=CA/L=SF/O=NODEJS/OU=agent8/CN=localhost 4 V 22960617144653Z 04 unknown /C=US/ST=CA/L=SF/O=NODEJS/OU=agent9/CN=localhost
|
/third_party/openssl/demos/certs/ |
D | ca.cnf | 38 basicConstraints=critical, CA:FALSE 47 basicConstraints=critical, CA:FALSE 60 basicConstraints=critical, CA:FALSE 70 # Extensions for a typical CA 76 basicConstraints = critical,CA:true 79 # Minimal CA entry to allow generation of CRLs.
|
/third_party/libwebsockets/minimal-examples/secure-streams/minimal-secure-streams-proxy/ |
D | README.md | 26 [2020/02/26 15:41:27:5771] N: lws_tls_client_create_vhost_context: using mem client CA cert 1391 28 [2020/02/26 15:41:27:8682] N: lws_tls_client_create_vhost_context: using mem client CA cert 837 29 [2020/02/26 15:41:27:8683] N: lws_tls_client_create_vhost_context: using mem client CA cert 1043 30 [2020/02/26 15:41:27:8684] N: lws_tls_client_create_vhost_context: using mem client CA cert 1167 31 [2020/02/26 15:41:27:8684] N: lws_tls_client_create_vhost_context: using mem client CA cert 1391
|