Home
last modified time | relevance | path

Searched refs:CN (Results 1 – 25 of 1073) sorted by relevance

12345678910>>...43

/third_party/node/test/parallel/
Dtest-tls-check-server-identity.js37 cert: { subject: { CN: 'a.com' } }, property
42 cert: { subject: { CN: 'a.com' } }, property
47 cert: { subject: { CN: 'a.com' } }, property
52 { host: 'a.com', cert: { subject: { CN: 'a.com' } } }, property
53 { host: 'a.com', cert: { subject: { CN: 'A.COM' } } }, property
56 cert: { subject: { CN: 'b.com' } }, property
59 { host: 'a.com', cert: { subject: { CN: 'a.com.' } } }, property
62 cert: { subject: { CN: '.a.com' } }, property
72 cert: { subject: { CN: '8.8.8.8' } }, property
80 cert: { subject: { CN: '8.8.8.8' }, subjectaltname: 'DNS:8.8.8.8' }, property
[all …]
Dtest-tls-cert-chains-concat.js26 assert.strictEqual(peer.subject.CN, 'Ádám Lippai');
27 assert.strictEqual(peer.issuer.CN, 'ca3');
34 assert.strictEqual(next.subject.CN, 'ca3');
35 assert.strictEqual(next.issuer.CN, 'ca1');
39 assert.strictEqual(root.subject.CN, 'ca1');
40 assert.strictEqual(root.issuer.CN, 'ca1');
Dtest-tls-multi-key.js156 checkServerIdentity: (_, c) => assert.strictEqual(c.subject.CN, eccCN),
164 assert.strictEqual(ecdsa.getPeerCertificate().subject.CN, eccCN);
176 checkServerIdentity: (_, c) => assert.strictEqual(c.subject.CN, rsaCN),
184 assert.strictEqual(rsa.getPeerCertificate().subject.CN, rsaCN);
/third_party/openssl/test/
Ddanetest.in22 # subject= CN = example.com
30 # subject= CN = Issuer CA
38 # subject= CN = Root CA
176 subject= /CN=example.com
177 issuer= /CN=Issuer CA
191 subject= /CN=Issuer CA
192 issuer= /CN=Root CA
205 subject= /CN=Root CA
206 issuer= /CN=Root CA
223 subject= /CN=example.com
[all …]
Ddane-cross.in25 subject=CN = server.example
26 issuer=CN = CA
48 subject=CN = CA
49 issuer=CN = Root CA
70 subject=CN = Root CA
71 issuer=CN = Cross Root
92 subject=CN = Cross Root
93 issuer=CN = Cross Root
/third_party/mesa3d/src/mesa/math/
Dm_eval.c212 #define CN(I,J,K) cn[(I)*uinc+(J)*dim+(K)] in _math_de_casteljau_surf() macro
218 du[k] = vs * (CN(1, 0, k) - CN(0, 0, k)) + in _math_de_casteljau_surf()
219 v * (CN(1, 1, k) - CN(0, 1, k)); in _math_de_casteljau_surf()
222 dv[k] = us * (CN(0, 1, k) - CN(0, 0, k)) + in _math_de_casteljau_surf()
223 u * (CN(1, 1, k) - CN(1, 0, k)); in _math_de_casteljau_surf()
226 out[k] = us * (vs * CN(0, 0, k) + v * CN(0, 1, k)) + in _math_de_casteljau_surf()
227 u * (vs * CN(1, 0, k) + v * CN(1, 1, k)); in _math_de_casteljau_surf()
233 DCN(1, 0) = CN(1, 0, k) - CN(0, 0, k); in _math_de_casteljau_surf()
234 DCN(0, 0) = us * CN(0, 0, k) + u * CN(1, 0, k); in _math_de_casteljau_surf()
238 DCN(1, j + 1) = CN(1, j + 1, k) - CN(0, j + 1, k); in _math_de_casteljau_surf()
[all …]
/third_party/mbedtls/tests/suites/
Dtest_suite_x509write.data63 …es/server1.key":"":"C=NL,O=PolarSSL,CN=PolarSSL Server 1":"data_files/test-ca.key":"PolarSSLTest":…
67 …es/server1.key":"":"C=NL,O=PolarSSL,CN=PolarSSL Server 1":"data_files/test-ca.key":"PolarSSLTest":…
71 …es/server1.key":"":"C=NL,O=PolarSSL,CN=PolarSSL Server 1":"data_files/test-ca.key":"PolarSSLTest":…
75 …es/server1.key":"":"C=NL,O=PolarSSL,CN=PolarSSL Server 1":"data_files/test-ca.key":"PolarSSLTest":…
79 …es/server1.key":"":"C=NL,O=PolarSSL,CN=PolarSSL Server 1":"data_files/test-ca.key":"PolarSSLTest":…
83 …es/server1.key":"":"C=NL,O=PolarSSL,CN=PolarSSL Server 1":"data_files/test-ca.key":"PolarSSLTest":…
87 …es/server1.key":"":"C=NL,O=PolarSSL,CN=PolarSSL Server 1":"data_files/test-ca.key":"PolarSSLTest":…
91 …es/server1.key":"":"C=NL,O=PolarSSL,CN=PolarSSL Server 1":"data_files/test-ca.key":"PolarSSLTest":…
95 …es/server1.key":"":"C=NL,O=PolarSSL,CN=PolarSSL Server 1":"data_files/test-ca.key":"PolarSSLTest":…
99 …es/server1.key":"":"C=NL,O=PolarSSL,CN=PolarSSL Server 1":"data_files/test-ca.key":"PolarSSLTest":…
[all …]
Dtest_suite_x509parse.data3 …: 01\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=Pol…
7 …: 01\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=Pol…
11 …: 02\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=Pol…
15 …: 02\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=Pol…
19 …: 03\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=Pol…
23 …: 03\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=Pol…
27 …: 06\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=Pol…
31 …: 07\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=Pol…
35 …: 08\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=Pol…
39 …: 09\nissuer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nsubject name \: C=NL, O=Pol…
[all …]
/third_party/skia/third_party/externals/swiftshader/third_party/llvm-10.0/llvm/lib/Target/Lanai/
DLanaiISelDAGToDAG.cpp94 bool canBeRepresentedAsSls(const ConstantSDNode &CN) { in canBeRepresentedAsSls() argument
96 return isInt<21>(CN.getSExtValue()) && ((CN.getSExtValue() & 0x3) == 0); in canBeRepresentedAsSls()
104 if (ConstantSDNode *CN = dyn_cast<ConstantSDNode>(Addr)) { in selectAddrSls() local
107 if (canBeRepresentedAsSls(*CN)) { in selectAddrSls()
108 int32_t Imm = CN->getSExtValue(); in selectAddrSls()
109 Offset = CurDAG->getTargetConstant(Imm, DL, CN->getValueType(0)); in selectAddrSls()
126 if (ConstantSDNode *CN = dyn_cast<ConstantSDNode>(Addr)) { in selectAddrRiSpls() local
129 if (isInt<16>(CN->getSExtValue())) { in selectAddrRiSpls()
130 int16_t Imm = CN->getSExtValue(); in selectAddrRiSpls()
131 Offset = CurDAG->getTargetConstant(Imm, DL, CN->getValueType(0)); in selectAddrRiSpls()
[all …]
/third_party/openssl/test/certs/
Dec_privkey_with_chain.pem1 Private Key for CN=Ca-ENROLLMENT-INTERMEDIATE-3
8 Subject: CN=Ca-ENROLLMENT-INTERMEDIATE-3
9 Issuer: CN=Ca-ENROLLMENT-INTERMEDIATE-2
26 Subject: CN=Ca-ENROLLMENT-INTERMEDIATE-2
27 Issuer: CN=Ca-ENROLLMENT-INTERMEDIATE-1
43 Subject: CN=Ca-ENROLLMENT-INTERMEDIATE-1
44 Issuer: CN=Ca-ENROLLMENT-ROOT
60 Subject: CN=Ca-ENROLLMENT-ROOT
61 Issuer: CN=Ca-ENROLLMENT-ROOT
/third_party/openssl/test/smime-certs/
Dmksmime-certs.sh17 CN="Test S/MIME RSA Root" $OPENSSL req -config ca.cnf -x509 -noenc \
21 CN="Test S/MIME EE RSA #1" $OPENSSL req -config ca.cnf -noenc \
27 CN="Test S/MIME EE RSA #2" $OPENSSL req -config ca.cnf -noenc \
32 CN="Test S/MIME EE RSA #3" $OPENSSL req -config ca.cnf -noenc \
41 CN="Test S/MIME EE DSA #1" $OPENSSL req -config ca.cnf -noenc \
45 CN="Test S/MIME EE DSA #2" $OPENSSL req -config ca.cnf -noenc \
49 CN="Test S/MIME EE DSA #3" $OPENSSL req -config ca.cnf -noenc \
59 CN="Test S/MIME EE EC #1" $OPENSSL req -config ca.cnf -noenc \
63 CN="Test S/MIME EE EC #2" $OPENSSL req -config ca.cnf -noenc \
78 CN="Test S/MIME EE DH #1" $OPENSSL req -config ca.cnf -noenc \
Dca.cnf8 # This definition stops the following lines choking if HOME or CN
11 CN = "Not Defined"
30 # Take CN from environment so it can come from a script.
31 commonName = $ENV::CN
/third_party/node/tools/
Dcertdata.txt77 # Issuer: CN=GlobalSign Root CA,OU=Root CA,O=GlobalSign nv-sa,C=BE
79 # Subject: CN=GlobalSign Root CA,OU=Root CA,O=GlobalSign nv-sa,C=BE
173 # Issuer: CN=GlobalSign Root CA,OU=Root CA,O=GlobalSign nv-sa,C=BE
175 # Subject: CN=GlobalSign Root CA,OU=Root CA,O=GlobalSign nv-sa,C=BE
211 # Issuer: CN=VeriSign Class 1 Public Primary Certification Authority - G3,OU="(c) 1999 VeriSign, In…
213 # Subject: CN=VeriSign Class 1 Public Primary Certification Authority - G3,OU="(c) 1999 VeriSign, I…
335 # Issuer: CN=VeriSign Class 1 Public Primary Certification Authority - G3,OU="(c) 1999 VeriSign, In…
337 # Subject: CN=VeriSign Class 1 Public Primary Certification Authority - G3,OU="(c) 1999 VeriSign, I…
381 # Issuer: CN=VeriSign Class 2 Public Primary Certification Authority - G3,OU="(c) 1999 VeriSign, In…
383 # Subject: CN=VeriSign Class 2 Public Primary Certification Authority - G3,OU="(c) 1999 VeriSign, I…
[all …]
/third_party/openssl/demos/certs/apps/
Dmkxcerts.sh6 CN="OpenSSL Test RSA SHA-1 cert" $OPENSSL req \
9 CN="OpenSSL Test RSA SHA-256 cert" $OPENSSL req \
12 CN="OpenSSL Test RSA SHA-512 cert" $OPENSSL req \
21 CN="OpenSSL Test P-256 SHA-256 cert" $OPENSSL req \
26 CN="OpenSSL Test P-384 SHA-384 cert" $OPENSSL req \
Dmkacerts.sh8 CN="OpenSSL Test Root CA" $OPENSSL req -config apps.cnf -x509 -nodes \
11 CN="OpenSSL Test Intermediate CA" $OPENSSL req -config apps.cnf -nodes \
17 CN="Test Client Cert" $OPENSSL req -config apps.cnf -nodes \
24 CN="Test Server Cert" $OPENSSL req -config apps.cnf -nodes \
31 CN="Test Server Cert #2" $OPENSSL req -config apps.cnf -nodes \
Dapps.cnf5 # This definition stops the following lines choking if HOME or CN
8 CN = "Not Defined"
31 # Take CN from environment so it can come from a script.
32 commonName = $ENV::CN
/third_party/typescript/tests/baselines/reference/
DimportCallExpressionShouldNotGetParen.types2 const localeName = "zh-CN";
3 >localeName : "zh-CN"
4 >"zh-CN" : "zh-CN"
11 >localeName : "zh-CN"
29 >localeName : "zh-CN"
/third_party/node/test/fixtures/keys/
Dfake-startcom-root-database.txt1 V 22920830184221Z 01 unknown /C=US/ST=CA/L=SF/O=NODEJS/OU=agent8/CN=localhost
2 V 22920830184221Z 02 unknown /C=US/ST=CA/L=SF/O=NODEJS/OU=agent9/CN=localhost
3 V 22960617144652Z 03 unknown /C=US/ST=CA/L=SF/O=NODEJS/OU=agent8/CN=localhost
4 V 22960617144653Z 04 unknown /C=US/ST=CA/L=SF/O=NODEJS/OU=agent9/CN=localhost
Dfake-startcom-root-database.txt.old1 V 22920830184221Z 01 unknown /C=US/ST=CA/L=SF/O=NODEJS/OU=agent8/CN=localhost
2 V 22920830184221Z 02 unknown /C=US/ST=CA/L=SF/O=NODEJS/OU=agent9/CN=localhost
3 V 22960617144652Z 03 unknown /C=US/ST=CA/L=SF/O=NODEJS/OU=agent8/CN=localhost
/third_party/openssl/demos/certs/
Dmkcerts.sh8 CN="Test Root CA" $OPENSSL req -config ca.cnf -x509 -nodes \
11 CN="Test Intermediate CA" $OPENSSL req -config ca.cnf -nodes \
18 CN="Test Server Cert" $OPENSSL req -config ca.cnf -nodes \
25 CN="Test Client Cert" $OPENSSL req -config ca.cnf -nodes \
32 CN="Test Revoked Cert" $OPENSSL req -config ca.cnf -nodes \
39 CN="Test OCSP Responder Cert" $OPENSSL req -config ca.cnf -nodes \
57 CN="Test Server DH Cert" $OPENSSL req -config ca.cnf -new \
68 CN="Test Client DH Cert" $OPENSSL req -config ca.cnf -new \
Dca.cnf5 # This definition stops the following lines choking if HOME or CN
8 CN = "Not Defined"
30 # Take CN from environment so it can come from a script.
31 commonName = $ENV::CN
/third_party/skia/third_party/externals/swiftshader/third_party/llvm-10.0/llvm/lib/Target/ARC/
DARCISelDAGToDAG.cpp52 const ConstantSDNode *CN = cast<ConstantSDNode>(N); in SelectCMOVPred() local
53 Pred = CurDAG->getTargetConstant(CN->getZExtValue(), SDLoc(N), MVT::i32); in SelectCMOVPred()
155 ConstantSDNode *CN = nullptr; in SelectFrameADDR_ri() local
157 (CN = dyn_cast<ConstantSDNode>(Addr.getOperand(1))) && in SelectFrameADDR_ri()
158 (CN->getSExtValue() % 4 == 0 && CN->getSExtValue() >= 0)) { in SelectFrameADDR_ri()
162 CurDAG->getTargetConstant(CN->getSExtValue(), SDLoc(Addr), MVT::i32); in SelectFrameADDR_ri()
/third_party/icu/ohos_icu4j/src/main/tests/resources/ohos/global/icu/dev/test/util/data/
DlocaleMatcherTest.txt86 @supported=zh-MO, zh-CN
88 @supported=zh-CN, zh-MO
137 @supported=zh-MO, zh-CN
139 @supported=zh-CN, zh-MO
148 @supported=zh-CN, zh-TW, iw
152 zh-Hans-CN >> zh-CN
153 zh-CN >> zh-CN
154 zh >> zh-CN
160 zh-Hans-CN >> zh-CN
161 zh-CN >> zh-CN
[all …]
/third_party/mbedtls/tests/data_files/
DReadme-x509.txt7 - test-ca.crt aka "C=NL, O=PolarSSL, CN=PolarSSL Test CA"
11 - test-ca2*.crt aka "C=NL, O=PolarSSL, CN=Polarssl Test EC CA"
17 - test-int-ca.crt "C=NL, O=PolarSSL, CN=PolarSSL Test Intermediate CA"
20 - test-int-ca2.crt "C=NL, O=PolarSSL, CN=PolarSSL Test Intermediate EC CA"
24 - test-int-ca3.crt "C=UK, O=mbed TLS, CN=mbed TLS Test intermediate CA 3"
28 - enco-ca-prstr.pem: has its CN encoded as a printable string, but child cert
29 enco-cert-utf8str.pem has its issuer's CN encoded as a UTF-8 string.
49 - L -> CN=localhost (useful for local test servers)
56 - cert_example_wildcard.crt: 1 R: wildcard in subject's CN
/third_party/openssl/demos/bio/
Dserver.pem1 subject= C = UK, O = OpenSSL Group, OU = FOR TESTING PURPOSES ONLY, CN = Test Server Cert
2 issuer= C = UK, O = OpenSSL Group, OU = FOR TESTING PURPOSES ONLY, CN = OpenSSL Test Intermediate CA
26 subject= C = UK, O = OpenSSL Group, OU = FOR TESTING PURPOSES ONLY, CN = OpenSSL Test Intermediate …
27 issuer= C = UK, O = OpenSSL Group, OU = FOR TESTING PURPOSES ONLY, CN = OpenSSL Test Root CA

12345678910>>...43