/external/libcxx/test/std/utilities/function.objects/func.require/ |
D | bullet_5.pass.cpp | 254 typedef A const CA; in main() typedef 260 runTestCase< R(CA&), 1, ConstCaster >(); in main() 261 runTestCase< R(CA&, CA&), 2, ConstCaster >(); in main() 262 runTestCase< R(CA&, CA&, CA&), 3, ConstCaster >(); in main() 292 runFunctorTestCase<R(CA&), 1, LValueCaster, CC>(); in main() 293 runFunctorTestCase<R(CA&) const, 1, ConstCaster, CC>(); in main() 294 runFunctorTestCase<R(CA&) volatile, 1, VolatileCaster, CC>(); in main() 295 runFunctorTestCase<R(CA&) const volatile, 1, CVCaster, CC>(); in main() 296 runFunctorTestCase<R(CA&, CA&), 2, LValueCaster, CC>(); in main() 297 runFunctorTestCase<R(CA&, CA&) const, 2, ConstCaster, CC>(); in main() [all …]
|
/external/autotest/client/site_tests/security_RootCA/ |
D | baseline | 7 "UTN USERFirst Hardware Root CA", 9 "DigiCert Assured ID Root CA", 13 "Certum Trusted Network CA", 15 "Staat der Nederlanden Root CA", 21 "QuoVadis Root CA 3", 25 "Microsec e-Szigno Root CA", 29 "Go Daddy Class 2 CA", 35 "CA Disig", 46 "36:79:CA:35:66:87:72:30:4D:30:A5:FB:87:3B:0F:A7:7B:B7:0D:54": 49 "Security Communication Root CA", [all …]
|
/external/llvm/unittests/LineEditor/ |
D | LineEditor.cpp | 62 LineEditor::CompletionAction CA = LE->getCompletionAction("", 0); in TEST_F() local 63 EXPECT_EQ(LineEditor::CompletionAction::AK_Insert, CA.Kind); in TEST_F() 64 EXPECT_EQ("foo", CA.Text); in TEST_F() 68 CA = LE->getCompletionAction("", 0); in TEST_F() 69 EXPECT_EQ(LineEditor::CompletionAction::AK_ShowCompletions, CA.Kind); in TEST_F() 70 ASSERT_EQ(2u, CA.Completions.size()); in TEST_F() 71 ASSERT_EQ("int foo()", CA.Completions[0]); in TEST_F() 72 ASSERT_EQ("int bar()", CA.Completions[1]); in TEST_F() 80 CA = LE->getCompletionAction("", 0); in TEST_F() 81 EXPECT_EQ(LineEditor::CompletionAction::AK_Insert, CA.Kind); in TEST_F() [all …]
|
/external/llvm/lib/Transforms/Utils/ |
D | CtorUtils.cpp | 41 Constant *CA = ConstantArray::get(ATy, CAList); in removeGlobalCtors() local 44 if (CA->getType() == OldCA->getType()) { in removeGlobalCtors() 45 GCL->setInitializer(CA); in removeGlobalCtors() 51 new GlobalVariable(CA->getType(), GCL->isConstant(), GCL->getLinkage(), in removeGlobalCtors() 52 CA, "", GCL->getThreadLocalMode()); in removeGlobalCtors() 71 ConstantArray *CA = cast<ConstantArray>(GV->getInitializer()); in parseGlobalCtors() local 73 Result.reserve(CA->getNumOperands()); in parseGlobalCtors() 74 for (User::op_iterator i = CA->op_begin(), e = CA->op_end(); i != e; ++i) { in parseGlobalCtors() 95 ConstantArray *CA = cast<ConstantArray>(GV->getInitializer()); in findGlobalCtors() local 97 for (User::op_iterator i = CA->op_begin(), e = CA->op_end(); i != e; ++i) { in findGlobalCtors()
|
/external/curl/docs/ |
D | SSLCERTS | 23 This system is about trust. In your local CA certificate store you have certs 38 by using a CA certificate store that the SSL library can use to make sure the 45 If the remote server uses a self-signed certificate, if you don't install a CA 46 cert store, if the server uses a certificate signed by a CA that isn't 56 2. Get a CA certificate that can verify the remote server and use the proper 57 option to point out this CA cert for verification when connecting. For 62 3. Add the CA cert for your server to the existing default CA certificate 63 store. The default CA certificate store can changed at compile time with the 66 --with-ca-bundle=FILE: use the specified file as CA certificate store. CA 69 --with-ca-path=PATH: use the specified path as CA certificate store. CA [all …]
|
D | SSL-PROBLEMS | 17 CA certs 19 CA certs are used to digitally verify the server's certificate. You need a 23 CA bundle missing intermediate certificates 25 When using said CA bundle to verify a server cert, you will experience 26 problems if your CA cert does not have the certificates for the
|
/external/eigen/blas/fortran/ |
D | lsame.f | 1 LOGICAL FUNCTION LSAME(CA,CB) 8 CHARACTER CA,CB local 36 LSAME = CA .EQ. CB 48 INTA = ICHAR(CA)
|
/external/wpa_supplicant_8/hs20/server/ca/ |
D | openssl.cnf | 1 # OpenSSL configuration file for Hotspot 2.0 PKI (Intermediate CA) 26 certificate = $dir/cacert.pem # The CA certificate 49 # For the CA policy 118 basicConstraints = critical, CA:true, pathlen:0 121 # For SP intermediate CA 128 basicConstraints = critical, CA:true, pathlen:0 178 basicConstraints = CA:FALSE 184 basicConstraints=CA:FALSE 194 basicConstraints=critical, CA:FALSE
|
D | openssl-root.cnf | 1 # OpenSSL configuration file for Hotspot 2.0 PKI (Root CA) 26 certificate = $dir/cacert.pem # The CA certificate 46 # For the CA policy 105 basicConstraints = CA:FALSE 113 basicConstraints = critical,CA:true 123 basicConstraints = CA:FALSE
|
/external/timezonepicker-support/ |
D | zone.tab | 110 CA +4734-05243 America/St_Johns Newfoundland Time, including SE Labrador 111 CA +4439-06336 America/Halifax Atlantic Time - Nova Scotia (most places), PEI 112 CA +4612-05957 America/Glace_Bay Atlantic Time - Nova Scotia - places that did not observe DST 1966… 113 CA +4606-06447 America/Moncton Atlantic Time - New Brunswick 114 CA +5320-06025 America/Goose_Bay Atlantic Time - Labrador - most locations 115 CA +5125-05707 America/Blanc-Sablon Atlantic Standard Time - Quebec - Lower North Shore 116 CA +4531-07334 America/Montreal Eastern Time - Quebec - most locations 117 CA +4339-07923 America/Toronto Eastern Time - Ontario - most locations 118 CA +4901-08816 America/Nipigon Eastern Time - Ontario & Quebec - places that did not observe DST 19… 119 CA +4823-08915 America/Thunder_Bay Eastern Time - Thunder Bay, Ontario [all …]
|
/external/valgrind/VEX/orig_x86/ |
D | manyfp.orig | 64 . 88 C2 8B 46 04 80 CA 08 88 96 74 01 00 00 80 38 00 0F 84 E0 00 00 00 671 …C7 45 D4 00 00 00 00 C7 45 D8 00 00 00 00 8D 5D C8 B9 00 00 00 00 89 D8 89 CA C1 C0 1D C1 C0 03 C1… 882 . 81 C3 75 CA 0B 00 83 EC 2C C7 45 EC 00 00 00 00 8B 45 10 8B 55 10 8B 7D 0C 89 45 F0 31 C0 85 D2 7… 1185 . 8B 95 AC FA FF FF B8 00 00 00 00 8B 8D 80 FA FF FF 8B BD 74 FA FF FF 29 CA 29 95 54 FA FF FF 0F 4… 1260 . 8B B5 28 FB FF FF 89 C2 8B 85 B4 FA FF FF 89 F1 29 C1 39 CA 0F 85 9E F2 FF FF 1398 … 00 00 00 00 8D BC 27 00 00 00 00 8B 4D 08 8B 41 38 89 74 24 08 89 7C 24 04 89 04 24 E8 CA F6 05 00 1500 …C7 45 D4 00 00 00 00 C7 45 D8 00 00 00 00 8D 5D C8 B9 00 00 00 00 89 D8 89 CA C1 C0 1D C1 C0 03 C1… 1622 …30 08 8B 45 E0 03 45 E4 31 D2 DD 45 C8 D9 C3 D9 C9 F7 75 10 D8 CB D9 C9 D8 CA D9 CB DE CC D9 C9 DC… 1778 . DD 45 B8 DD 45 14 DD 45 1C D9 C9 D8 CA D9 C9 D8 CB D9 CA DC 4D 1C D9 CB DC 4D 14 D9 C9 8B 45 DC 8… 1814 . 31 D2 52 53 DF 2C 24 DC CA DE C9 D9 C9 83 C4 08 DD 1F DD 5F 08 31 C0 8D 65 F4 5B 5E 5F C9 C3 [all …]
|
/external/clang/include/clang/StaticAnalyzer/Core/PathSensitive/ |
D | CallEvent.h | 427 static bool classof(const CallEvent *CA) { in classof() argument 428 return CA->getKind() >= CE_BEG_FUNCTION_CALLS && in classof() 429 CA->getKind() <= CE_END_FUNCTION_CALLS; in classof() 464 static bool classof(const CallEvent *CA) { in classof() argument 465 return CA->getKind() == CE_Function; in classof() 571 static bool classof(const CallEvent *CA) { in classof() argument 572 return CA->getKind() == CE_Block; in classof() 607 static bool classof(const CallEvent *CA) { in classof() argument 608 return CA->getKind() >= CE_BEG_CXX_INSTANCE_CALLS && in classof() 609 CA->getKind() <= CE_END_CXX_INSTANCE_CALLS; in classof() [all …]
|
/external/chromium-trace/catapult/third_party/gsutil/third_party/boto/boto/cacerts/ |
D | cacerts.txt | 2 ## boto/cacerts/cacerts.txt -- Bundle of CA Root Certificates 7 ## (CA). These were automatically extracted from Mozilla's root certificates 37 Thawte Server CA 56 Thawte Premium Server CA 76 Equifax Secure CA 131 GlobalSign Root CA 152 GlobalSign Root CA - R2 279 Entrust.net Secure Server CA 306 Entrust.net Premium 2048 Secure Server CA 351 Equifax Secure Global eBusiness CA [all …]
|
/external/cblas/testing/ |
D | c_zblat1.f | 86 COMPLEX*16 CA local 105 DATA SA, CA/0.3D0, (0.4D0,-0.7D0)/ 218 CALL ZSCALTEST(N,CA,CX,INCX) 241 CA = (0.0D0,0.0D0) 246 CALL ZSCALTEST(5,CA,CX,INCX) 287 COMPLEX*16 CA,ZTEMP local 303 DATA CA/(0.4D0,-0.7D0)/ 502 CALL ZAXPYTEST(N,CA,CX,INCX,CY,INCY)
|
/external/eigen/blas/testing/ |
D | zblat1.f | 86 COMPLEX*16 CA local 105 DATA SA, CA/0.3D0, (0.4D0,-0.7D0)/ 218 CALL ZSCAL(N,CA,CX,INCX) 241 CA = (0.0D0,0.0D0) 246 CALL ZSCAL(5,CA,CX,INCX) 287 COMPLEX*16 CA local 304 DATA CA/(0.4D0,-0.7D0)/ 501 CALL ZAXPY(N,CA,CX,INCX,CY,INCY)
|
/external/conscrypt/src/test/resources/ |
D | ca-cert.pem | 6 Issuer: C=GB, O=Certificate Transparency CA, ST=Wales, L=Erw Wen 10 Subject: C=GB, O=Certificate Transparency CA, ST=Wales, L=Erw Wen 30 DirName:/C=GB/O=Certificate Transparency CA/ST=Wales/L=Erw Wen 34 CA:TRUE
|
D | cert.pem | 6 Issuer: C=GB, O=Certificate Transparency CA, ST=Wales, L=Erw Wen 30 DirName:/C=GB/O=Certificate Transparency CA/ST=Wales/L=Erw Wen 34 CA:FALSE
|
/external/chromium-trace/catapult/third_party/gsutil/third_party/httplib2/python2/httplib2/ |
D | cacerts.txt | 42 Verisign/RSA Secure Server CA 60 Thawte Personal Basic CA 83 Thawte Personal Premium CA 106 Thawte Personal Freemail CA 130 Thawte Server CA 153 Thawte Premium Server CA 176 Equifax Secure CA 458 Equifax Secure Global eBusiness CA 478 Equifax Secure eBusiness CA 1 498 Equifax Secure eBusiness CA 2 [all …]
|
/external/chromium-trace/catapult/third_party/gsutil/third_party/httplib2/python3/httplib2/ |
D | cacerts.txt | 42 Verisign/RSA Secure Server CA 60 Thawte Personal Basic CA 83 Thawte Personal Premium CA 106 Thawte Personal Freemail CA 130 Thawte Server CA 153 Thawte Premium Server CA 176 Equifax Secure CA 458 Equifax Secure Global eBusiness CA 478 Equifax Secure eBusiness CA 1 498 Equifax Secure eBusiness CA 2 [all …]
|
/external/chromium-trace/catapult/third_party/gsutil/gslib/data/ |
D | cacerts.txt | 42 Verisign/RSA Secure Server CA 60 Thawte Personal Basic CA 83 Thawte Personal Premium CA 106 Thawte Personal Freemail CA 130 Thawte Server CA 153 Thawte Premium Server CA 176 Equifax Secure CA 458 Equifax Secure Global eBusiness CA 478 Equifax Secure eBusiness CA 1 498 Equifax Secure eBusiness CA 2 [all …]
|
/external/openssh/ |
D | PROTOCOL.certkeys | 26 specify CA keys in ~/.ssh/known_hosts. 37 that is used to sign challenges. ssh-keygen performs the CA signing 121 The nonce field is a CA-provided random bitstring of arbitrary length 132 serial is an optional certificate serial number set by the CA to 133 provide an abbreviated way to refer to certificates from that CA. 134 If a CA does not wish to number its certificates it must set this 140 key id is a free-form text field that is filled in by the CA at the time 175 signature key contains the CA key used to sign the certificate. 176 The valid key types for CA keys are ssh-rsa, ssh-dss and the ECDSA types 180 be signed by a DSS or ECDSA CA key and vice-versa. [all …]
|
/external/clang/test/CXX/drs/ |
D | dr10xx.cpp | 21 typedef const A CA; typedef 29 case 3: return CA(); in __anon5a1270670102()
|
/external/autotest/client/site_tests/security_OpenSSLBlacklist/src/ |
D | ca.pem | 7 …Issuer: C=US, ST=California, O=Google Inc, OU=Chrome OS, CN=OpenSSL Test CA/emailAddress=security@… 11 …Subject: C=US, ST=California, O=Google Inc, OU=Chrome OS, CN=OpenSSL Test CA/emailAddress=security… 31 …DirName:/C=US/ST=California/O=Google Inc/OU=Chrome OS/CN=OpenSSL Test CA/emailAddress=security@chr… 35 CA:TRUE
|
/external/autotest/client/site_tests/platform_AccurateTime/src/ |
D | ca.pem | 7 …Issuer: C=US, ST=California, O=Google Inc, OU=Chrome OS, CN=OpenSSL Test CA/emailAddress=security@… 11 …Subject: C=US, ST=California, O=Google Inc, OU=Chrome OS, CN=OpenSSL Test CA/emailAddress=security… 31 …DirName:/C=US/ST=California/O=Google Inc/OU=Chrome OS/CN=OpenSSL Test CA/emailAddress=security@chr… 35 CA:TRUE
|
/external/llvm/lib/Analysis/ |
D | InlineCost.cpp | 834 CallAnalyzer CA(TTI, ACT, *F, InlineConstants::IndirectCallThreshold, CS); in visitCallSite() local 835 if (CA.analyzeCall(CS)) { in visitCallSite() 838 Cost -= std::max(0, CA.getThreshold() - CA.getCost()); in visitCallSite() 1404 CallAnalyzer CA(TTIWP->getTTI(*Callee), ACT, *Callee, Threshold, CS); in getInlineCost() local 1405 bool ShouldInline = CA.analyzeCall(CS); in getInlineCost() 1407 DEBUG(CA.dump()); in getInlineCost() 1410 if (!ShouldInline && CA.getCost() < CA.getThreshold()) in getInlineCost() 1412 if (ShouldInline && CA.getCost() >= CA.getThreshold()) in getInlineCost() 1415 return llvm::InlineCost::get(CA.getCost(), CA.getThreshold()); in getInlineCost()
|