/external/python/cpython2/Lib/lib-tk/ |
Dialog.py | 13 def __init__(self, master=None, cnf={}, **kw): 14 cnf = _cnfmerge((cnf, kw)) 16 Widget._setup(self, master, cnf) 20 cnf['title'], cnf['text'], 21 cnf['bitmap'], cnf['default'], 22 *cnf['strings']))
|
Tix.py | 105 def tix_configure(self, cnf=None, **kw): 118 cnf = _cnfmerge((cnf, kw)) 119 elif cnf: 120 cnf = _cnfmerge(cnf) 121 if cnf is None: 123 if isinstance(cnf, StringType): 124 return self._getconfigure1('tix', 'configure', '-'+cnf) 125 return self.tk.call(('tix', 'configure') + self._options(cnf)) [all...] |
Tkinter.py | 116 cnf = {} 119 cnf.update(c) 123 cnf[k] = v 124 return cnf [all...] |
/external/python/cpython3/Lib/tkinter/ |
dialog.py | 10 def __init__(self, master=None, cnf={}, **kw): 11 cnf = _cnfmerge((cnf, kw)) 13 Widget._setup(self, master, cnf) 17 cnf['title'], cnf['text'], 18 cnf['bitmap'], cnf['default'], 19 *cnf['strings']))
|
tix.py | 101 def tix_configure(self, cnf=None, **kw): 114 cnf = _cnfmerge((cnf, kw)) 115 elif cnf: 116 cnf = _cnfmerge(cnf) 117 if cnf is None: 119 if isinstance(cnf, str): 120 return self._getconfigure1('tix', 'configure', '-'+cnf) 121 return self.tk.call(('tix', 'configure') + self._options(cnf)) [all...] |
__init__.py | 103 cnf = {} 106 cnf.update(c) 110 cnf[k] = v 111 return cnf [all...] |
/external/wpa_supplicant_8/hs20/server/ca/ |
est-csrattrs.sh | 3 openssl asn1parse -genconf est-csrattrs.cnf -out est-csrattrs.der -oid hs20.oid
|
clean.sh | 7 rm -f openssl.cnf.tmp 12 rm -f my-openssl.cnf my-openssl-root.cnf
|
setup.sh | 6 export OPENSSL_CONF=$PWD/openssl.cnf 86 cat openssl-root.cnf | sed "s/@PASSWORD@/$PASS/" \ 87 > my-openssl-root.cnf 89 cat openssl.cnf | sed "s/@PASSWORD@/$PASS/" | 95 > my-openssl.cnf 98 cat my-openssl-root.cnf | sed "s/#@CN@/commonName_default = $CNR/" > openssl.cnf.tmp 105 $OPENSSL req -config openssl.cnf.tmp -batch -new -newkey rsa:4096 -keyout rootCA/private/cakey.pem -out rootCA/careq.pem || fail "Failed to generate Root CA private key" 107 $OPENSSL ca -config openssl.cnf.tmp -md sha256 -create_serial -out rootCA/cacert.pem -days 10957 -batch -keyfile rootCA/private/cakey.pem -passin pass:$PASS -selfsign -extensions v3_ca -outdir rootCA/newcerts -infiles rootCA/careq.pem || fail "Failed to sign Root CA certificate" 119 cat my-openssl.cnf | sed "s/#@CN@/commonName_default = $COMPANY Hotspot 2.0 Intermediate CA/" > openssl.cnf.tm [all...] |
/external/boringssl/src/crypto/x509v3/ |
v3_cpols.c | 149 CONF_VALUE *cnf; 164 cnf = sk_CONF_VALUE_value(vals, i); 165 if (cnf->value || !cnf->name) { 167 X509V3_conf_err(cnf); 170 pstr = cnf->name; 180 X509V3_conf_err(cnf); 188 if (!(pobj = OBJ_txt2obj(cnf->name, 0))) { 190 X509V3_conf_err(cnf); 219 CONF_VALUE *cnf; [all...] |
v3_akey.c | 127 CONF_VALUE *cnf; local 138 cnf = sk_CONF_VALUE_value(values, i); 139 if (!strcmp(cnf->name, "keyid")) { 141 if (cnf->value && !strcmp(cnf->value, "always")) 143 } else if (!strcmp(cnf->name, "issuer")) { 145 if (cnf->value && !strcmp(cnf->value, "always")) 149 ERR_add_error_data(2, "name=", cnf->name);
|
v3_crld.c | 116 CONF_VALUE *cnf) 120 if (!strncmp(cnf->name, "fullname", 9)) { 121 fnm = gnames_from_sectname(ctx, cnf->value); 124 } else if (!strcmp(cnf->name, "relativename")) { 131 dnsect = X509V3_get_section(ctx, cnf->value); 255 CONF_VALUE *cnf; local 262 cnf = sk_CONF_VALUE_value(nval, i); 263 ret = set_dist_point_name(&point->distpoint, ctx, cnf); 268 if (!strcmp(cnf->name, "reasons")) { 269 if (!set_reasons(&point->reasons, cnf->value) 292 CONF_VALUE *cnf; local 418 CONF_VALUE *cnf; local [all...] |
v3_pci.c | 210 CONF_VALUE *cnf = sk_CONF_VALUE_value(vals, i); local 211 if (!cnf->name || (*cnf->name != '@' && !cnf->value)) { 213 X509V3_conf_err(cnf); 216 if (*cnf->name == '@') { 220 sect = X509V3_get_section(ctx, cnf->name + 1); 223 X509V3_conf_err(cnf); 235 if (!process_pci_value(cnf, &language, &pathlen, &policy)) { 236 X509V3_conf_err(cnf); [all...] |
v3_info.c | 165 CONF_VALUE *cnf, ctmp; 175 cnf = sk_CONF_VALUE_value(nval, i); 181 ptmp = strchr(cnf->name, ';'); 186 objlen = ptmp - cnf->name; 188 ctmp.value = cnf->value; 195 BUF_strlcpy(objtmp, cnf->name, objlen + 1);
|
v3_alt.c | 259 CONF_VALUE *cnf; local 266 cnf = sk_CONF_VALUE_value(nval, i); 267 if (!x509v3_name_cmp(cnf->name, "issuer") && cnf->value && 268 !strcmp(cnf->value, "copy")) { 273 if (!(gen = v2i_GENERAL_NAME(method, ctx, cnf))) 329 CONF_VALUE *cnf; local 336 cnf = sk_CONF_VALUE_value(nval, i); 337 if (!x509v3_name_cmp(cnf->name, "email") && cnf->value & 420 CONF_VALUE *cnf; local [all...] |
v3_sxnet.c | 140 CONF_VALUE *cnf; 144 cnf = sk_CONF_VALUE_value(nval, i); 145 if (!SXNET_add_id_asc(&sx, cnf->name, cnf->value, -1))
|
/external/ltp/pan/ |
ltp-scanner.c | 134 char *cnf; /* current filename */ variable
|
/external/boringssl/src/crypto/x509/ |
asn1_gen.c | 126 static ASN1_TYPE *generate_v3(char *str, X509V3_CTX *cnf, int depth, 134 static ASN1_TYPE *asn1_multi(int utype, const char *section, X509V3_CTX *cnf, 141 X509V3_CTX cnf; local 146 X509V3_set_nconf(&cnf, nconf); 147 return ASN1_generate_v3(str, &cnf); 150 ASN1_TYPE *ASN1_generate_v3(char *str, X509V3_CTX *cnf) 153 ASN1_TYPE *ret = generate_v3(str, cnf, 0, &err); 159 static ASN1_TYPE *generate_v3(char *str, X509V3_CTX *cnf, int depth, 188 if (!cnf) { 196 ret = asn1_multi(asn1_tags.utype, asn1_tags.str, cnf, depth, perr) [all...] |
/external/python/cpython2/Demo/tkinter/guido/ |
ManPage.py | 23 def __init__(self, master=None, **cnf): 25 apply(ScrolledText.__init__, (self, master), cnf) 179 def __init__(self, master=None, **cnf): 180 cnf['state'] = DISABLED 181 apply(EditableManPage.__init__, (self, master), cnf)
|
kill.py | 11 def __init__(self, master=None, **cnf): 12 apply(Menubutton.__init__, (self, master), cnf) 50 def __init__(self, master=None, **cnf): 51 Frame.__init__(self, master, cnf)
|
svkill.py | 18 def __init__(self, master=None, **cnf): 19 apply(Menubutton.__init__, (self, master), cnf) 63 def __init__(self, master=None, **cnf): 64 apply(Frame.__init__, (self, master), cnf)
|
/external/owasp/sanitizer/tools/ |
update_tree_in_svn.py | 90 def cnf(src, dst): conflict = True function in function:sync 103 (FILE, DIR) : (recurse, remove, svn_delete, copy, svn_add, cnf), 105 (DIR, FILE) : (remove, svn_delete, mkdir, svn_add, recurse, cnf),
|
/external/python/cpython2/Lib/idlelib/ |
OutputWindow.py | 145 for tag, cnf in self.tagdefs.items(): 146 if cnf: 147 text.tag_configure(tag, **cnf)
|
/external/python/cpython3/Lib/idlelib/ |
outwin.py | 181 for tag, cnf in self.tagdefs.items(): 182 if cnf: 183 text.tag_configure(tag, **cnf)
|
/cts/apps/CtsVerifier/ |
create_test_certs.sh | 13 # CA_default defined in openssl.cnf 30 cat /etc/ssl/openssl.cnf <(printf "\n[SAN]\nsubjectAltName=$SAN") \
|