/external/openssl/android.testssl/ |
D | testssl | 22 CA="-CApath ../certs" 24 CA="-CAfile $3" 39 $ssltest -ssl2 -server_auth $CA $extra || exit 1 43 $ssltest -ssl2 -client_auth $CA $extra || exit 1 46 $ssltest -ssl2 -server_auth -client_auth $CA $extra || exit 1 53 $ssltest -ssl3 -server_auth $CA $extra || exit 1 56 $ssltest -ssl3 -client_auth $CA $extra || exit 1 59 $ssltest -ssl3 -server_auth -client_auth $CA $extra || exit 1 65 $ssltest -server_auth $CA $extra || exit 1 68 $ssltest -client_auth $CA $extra || exit 1 [all …]
|
D | CAss.cnf | 25 commonName_value = Dodgy CA 42 certificate = $dir/cacert.pem # The CA certificate 74 basicConstraints = CA:true,pathlen:1
|
/external/webkit/Source/WebKit/android/content/ |
D | address_detector.cpp | 675 CA = 5, // CA California in IsZipValidForState() enumerator 823 CA, CA, CA, CA, CA, CA, CA, CA, CA, XX, // 900-909 in IsZipValidForState() 824 CA, CA, CA, CA, CA, CA, CA, CA, CA, CA, // 910-919 in IsZipValidForState() 825 CA, CA, CA, CA, CA, CA, CA, CA, CA, XX, // 920-929 in IsZipValidForState() 826 CA, CA, CA, CA, CA, CA, CA, CA, CA, CA, // 930-939 in IsZipValidForState() 827 CA, CA, CA, CA, CA, CA, CA, CA, CA, CA, // 940-949 in IsZipValidForState() 828 CA, CA, CA, CA, CA, CA, CA, CA, CA, CA, // 950-959 in IsZipValidForState() 829 CA, CA, AP, AP, AP, AP, AP, HI, HI, GU, // 960-969 in IsZipValidForState()
|
/external/openssl/apps/ |
D | CA.pl | 51 $CA="$openssl ca $SSLEAY_CONFIG"; 116 system ("$CA -create_serial " . 134 system ("$CA -policy policy_anything -infiles newreq.pem"); 137 system ("$CA -policy policy_anything -out newcert.pem " . 142 system ("$CA -policy policy_anything -out newcert.pem " . 149 system ("$CA -policy policy_anything -out newcert.pem " .
|
D | CA.pl.in | 51 $CA="$openssl ca $SSLEAY_CONFIG"; 116 system ("$CA -create_serial " . 134 system ("$CA -policy policy_anything -infiles newreq.pem"); 137 system ("$CA -policy policy_anything -out newcert.pem " . 142 system ("$CA -policy policy_anything -out newcert.pem " . 149 system ("$CA -policy policy_anything -out newcert.pem " .
|
D | CA.sh | 66 CA="$OPENSSL ca $SSLEAY_CONFIG" 132 $CA -create_serial -out ${CATOP}/$CACERT $CADAYS -batch \ 141 $CA -policy policy_anything -infiles newreq.pem 156 $CA -policy policy_anything -out newcert.pem -infiles newreq.pem 162 $CA -policy policy_anything -out newcert.pem -extensions v3_ca -infiles newreq.pem 169 $CA -policy policy_anything -out newcert.pem -infiles tmp.pem
|
D | openssl.cnf | 50 certificate = $dir/cacert.pem # The CA certificate 79 # For type CA, the listed attributes must be the same, and the optional 83 # For the CA policy 168 # requires this to avoid interpreting an end user certificate as a CA. 170 basicConstraints=CA:FALSE 221 basicConstraints = CA:FALSE 227 # Extensions for a typical CA 238 #basicConstraints = critical,CA:true 240 basicConstraints = CA:true 242 # Key usage: this is typical for a CA certificate. However since it will [all …]
|
/external/eigen/blas/ |
D | lsame.f | 1 LOGICAL FUNCTION LSAME(CA,CB) 8 CHARACTER CA,CB local 36 LSAME = CA .EQ. CB 48 INTA = ICHAR(CA)
|
/external/clang/include/clang/StaticAnalyzer/Core/PathSensitive/ |
D | CallEvent.h | 381 static bool classof(const CallEvent *CA) { in classof() argument 382 return CA->getKind() >= CE_BEG_FUNCTION_CALLS && in classof() 383 CA->getKind() <= CE_END_FUNCTION_CALLS; in classof() 408 static bool classof(const CallEvent *CA) { in classof() argument 409 return CA->getKind() >= CE_BEG_SIMPLE_CALLS && in classof() 410 CA->getKind() <= CE_END_SIMPLE_CALLS; in classof() 431 static bool classof(const CallEvent *CA) { in classof() argument 432 return CA->getKind() == CE_Function; in classof() 481 static bool classof(const CallEvent *CA) { in classof() argument 482 return CA->getKind() == CE_Block; in classof() [all …]
|
/external/valgrind/main/VEX/orig_x86/ |
D | manyfp.orig | 64 . 88 C2 8B 46 04 80 CA 08 88 96 74 01 00 00 80 38 00 0F 84 E0 00 00 00 671 …C7 45 D4 00 00 00 00 C7 45 D8 00 00 00 00 8D 5D C8 B9 00 00 00 00 89 D8 89 CA C1 C0 1D C1 C0 03 C1… 882 . 81 C3 75 CA 0B 00 83 EC 2C C7 45 EC 00 00 00 00 8B 45 10 8B 55 10 8B 7D 0C 89 45 F0 31 C0 85 D2 7… 1185 . 8B 95 AC FA FF FF B8 00 00 00 00 8B 8D 80 FA FF FF 8B BD 74 FA FF FF 29 CA 29 95 54 FA FF FF 0F 4… 1260 . 8B B5 28 FB FF FF 89 C2 8B 85 B4 FA FF FF 89 F1 29 C1 39 CA 0F 85 9E F2 FF FF 1398 … 00 00 00 00 8D BC 27 00 00 00 00 8B 4D 08 8B 41 38 89 74 24 08 89 7C 24 04 89 04 24 E8 CA F6 05 00 1500 …C7 45 D4 00 00 00 00 C7 45 D8 00 00 00 00 8D 5D C8 B9 00 00 00 00 89 D8 89 CA C1 C0 1D C1 C0 03 C1… 1622 …30 08 8B 45 E0 03 45 E4 31 D2 DD 45 C8 D9 C3 D9 C9 F7 75 10 D8 CB D9 C9 D8 CA D9 CB DE CC D9 C9 DC… 1778 . DD 45 B8 DD 45 14 DD 45 1C D9 C9 D8 CA D9 C9 D8 CB D9 CA DC 4D 1C D9 CB DC 4D 14 D9 C9 8B 45 DC 8… 1814 . 31 D2 52 53 DF 2C 24 DC CA DE C9 D9 C9 83 C4 08 DD 1F DD 5F 08 31 C0 8D 65 F4 5B 5E 5F C9 C3 [all …]
|
/external/llvm/lib/Transforms/IPO/ |
D | InlineSimple.cpp | 32 InlineCostAnalyzer CA; member in __anon0a85f6360111::SimpleInliner 43 return CA.getInlineCost(CS, getInlineThreshold(CS)); in getInlineCost() 65 CA.setTargetData(getAnalysisIfAvailable<TargetData>()); in doInitialization()
|
/external/webkit/Source/WebKit2/WebProcess/WebPage/win/ |
D | LayerTreeHostWin.cpp | 29 #if USE(CA) 37 #if USE(CA) && HAVE(WKQCA) in supportsAcceleratedCompositing()
|
/external/eigen/blas/testing/ |
D | zblat1.f | 86 COMPLEX*16 CA local 105 DATA SA, CA/0.3D0, (0.4D0,-0.7D0)/ 218 CALL ZSCAL(N,CA,CX,INCX) 241 CA = (0.0D0,0.0D0) 246 CALL ZSCAL(5,CA,CX,INCX) 287 COMPLEX*16 CA local 304 DATA CA/(0.4D0,-0.7D0)/ 501 CALL ZAXPY(N,CA,CX,INCX,CY,INCY)
|
/external/openssh/ |
D | PROTOCOL.certkeys | 26 specify CA keys in ~/.ssh/known_hosts. 37 that is used to sign challenges. ssh-keygen performs the CA signing 121 The nonce field is a CA-provided random bitstring of arbitrary length 132 serial is an optional certificate serial number set by the CA to 133 provide an abbreviated way to refer to certificates from that CA. 134 If a CA does not wish to number its certificates it must set this 140 key id is a free-form text field that is filled in by the CA at the time 168 signature key contains the CA key used to sign the certificate. 169 The valid key types for CA keys are ssh-rsa, ssh-dss and the ECDSA types 173 be signed by a DSS or ECDSA CA key and vice-versa. [all …]
|
/external/llvm/lib/Analysis/ |
D | InlineCost.cpp | 665 CallAnalyzer CA(TD, *F, InlineConstants::IndirectCallThreshold); in visitCallSite() local 666 if (CA.analyzeCall(CS)) { in visitCallSite() 669 Cost -= std::max(0, InlineConstants::IndirectCallThreshold - CA.getCost()); in visitCallSite() 1008 CallAnalyzer CA(TD, *Callee, Threshold); in getInlineCost() local 1009 bool ShouldInline = CA.analyzeCall(CS); in getInlineCost() 1011 DEBUG(CA.dump()); in getInlineCost() 1014 if (!ShouldInline && CA.getCost() < CA.getThreshold()) in getInlineCost() 1016 if (ShouldInline && CA.getCost() >= CA.getThreshold()) in getInlineCost() 1019 return llvm::InlineCost::get(CA.getCost(), CA.getThreshold()); in getInlineCost()
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/x509/ |
D | CertPathReviewerMessages.properties | 157 …te path was issued by a CA that is not in the the trusted-root-certificate-store used for the path… 158 …und.summary = The root certificate of the certificate path was issued by a CA that is not in the t… 159 …CA that is not in the the trusted-root-certificate-store used for the path validation. The name of… 165 …trust root store: There are {0} trusted public keys for the CA "{1}" - please ensure with CA which… 166 …trust root store: There are {0} trusted public keys for the CA "{1}" - please ensure with CA which… 167 …trust root store: There are {0} trusted public keys for the CA "{1}" - please ensure with CA which… 220 CertPathReviewer.noCACert.title = Certificate is no CA certificate 221 CertPathReviewer.noCACert.text = Intermediate certificate is no CA certificate. 222 CertPathReviewer.noCACert.summary = The certificate is no CA certificate. 223 CertPathReviewer.noCACert.details = The certificate is no CA certificate but used as one. [all …]
|
/external/openssl/crypto/pkcs7/t/ |
D | c.pem | 1 …=AU/SP=Queensland/L=Brisbane/O=Cryptsoft Pty Ltd/OU=DEMONSTRATION AND TESTING/CN=DEMO ZERO VALUE CA 10 …SP=Queensland, L=Brisbane, O=Cryptsoft Pty Ltd, OU=DEMONSTRATION AND TESTING, CN=DEMO ZERO VALUE CA
|
D | s.pem | 10 …=AU/SP=Queensland/L=Brisbane/O=Cryptsoft Pty Ltd/OU=DEMONSTRATION AND TESTING/CN=DEMO ZERO VALUE CA 19 …SP=Queensland, L=Brisbane, O=Cryptsoft Pty Ltd, OU=DEMONSTRATION AND TESTING, CN=DEMO ZERO VALUE CA
|
D | server.pem | 1 …=AU/SP=Queensland/L=Brisbane/O=Cryptsoft Pty Ltd/OU=DEMONSTRATION AND TESTING/CN=DEMO ZERO VALUE CA 10 …SP=Queensland, L=Brisbane, O=Cryptsoft Pty Ltd, OU=DEMONSTRATION AND TESTING, CN=DEMO ZERO VALUE CA
|
/external/icu4c/data/unidata/ |
D | FractionalUCA.txt | 1029 17CA; [, DB C9, 05] 1792 29FD; [0A CA, 05, 05] 2475 02CA; [0D 33, 05, 05] 2853 1B65; [0D 63 CA, 05, 05] 3042 21CA; [0D 66 B4, 05, 05] 3113 21EF; [0D 67 CA, 05, 05] 3363 2252; [0D 80 CA, 05, 05] 3586 22CA; [0D 83 F4, 05, 05] 3638 22E8; [0D 84 CA, 05, 05] 3888 236B; [0D 88 CA, 05, 05] [all …]
|
/external/openssl/crypto/pkcs7/ |
D | info.pem | 1 …=AU/SP=Queensland/L=Brisbane/O=Cryptsoft Pty Ltd/OU=DEMONSTRATION AND TESTING/CN=DEMO ZERO VALUE CA 10 …SP=Queensland, L=Brisbane, O=Cryptsoft Pty Ltd, OU=DEMONSTRATION AND TESTING, CN=DEMO ZERO VALUE CA
|
/external/icu4c/data/unidata/norm2/ |
D | nfc.txt | 287 00CA=0045 0302 545 0390=03CA 0301 553 03CA=03B9 0308 878 1EBE=00CA 0301 880 1EC0=00CA 0300 882 1EC2=00CA 0309 884 1EC4=00CA 0303 1129 1FD2=03CA 0300 1132 1FD7=03CA 0342 1348 F947>78CA [all …]
|
/external/libnfc-nci/halimpl/bcm2079x/ |
D | libnfc-brcm.conf | 75 NFA_DM_START_UP_CFG={1F:CB:01:01:A5:01:01:CA:14:00:00:00:00:06:E8:03:00:00:00:00:00:00:00:00:00:00:…
|
/external/icu4c/data/misc/ |
D | zoneinfo64.txt | 3426 "CA", //Z#79 America/Atikokan 3433 "CA", //Z#86 America/Blanc-Sablon 3438 "CA", //Z#91 America/Cambridge_Bay 3447 "CA", //Z#100 America/Coral_Harbour 3453 "CA", //Z#106 America/Dawson 3454 "CA", //Z#107 America/Dawson_Creek 3458 "CA", //Z#111 America/Edmonton 3464 "CA", //Z#117 America/Glace_Bay 3466 "CA", //Z#119 America/Goose_Bay 3473 "CA", //Z#126 America/Halifax [all …]
|
/external/openssl/patches/ |
D | small_records.patch | 321 @@ -70,6 +70,16 @@ $ssltest -client_auth $CA $extra || exit 323 $ssltest -server_auth -client_auth $CA $extra || exit 1 326 +$ssltest -server_auth -client_auth -c_small_records $CA $extra || exit 1 329 +$ssltest -server_auth -client_auth -s_small_records $CA $extra || exit 1 332 +$ssltest -server_auth -client_auth -c_small_records -s_small_records $CA $extra || exit 1
|