HomeSort by relevance Sort by last modified time
    Searched refs:cnf (Results 1 - 25 of 71) sorted by null

1 2 3

  /prebuilts/python/darwin-x86/2.7.5/lib/python2.7/lib-tk/
Dialog.py 13 def __init__(self, master=None, cnf={}, **kw):
14 cnf = _cnfmerge((cnf, kw))
16 Widget._setup(self, master, cnf)
20 cnf['title'], cnf['text'],
21 cnf['bitmap'], cnf['default'],
22 *cnf['strings']))
Tix.py 108 def tix_configure(self, cnf=None, **kw):
121 cnf = _cnfmerge((cnf, kw))
122 elif cnf:
123 cnf = _cnfmerge(cnf)
124 if cnf is None:
125 cnf = {}
127 cnf[x[0][1:]] = (x[0][1:],) + x[1:]
128 return cnf
    [all...]
Tkinter.py 113 cnf = {}
116 cnf.update(c)
120 cnf[k] = v
121 return cnf
    [all...]
  /prebuilts/python/linux-x86/2.7.5/lib/python2.7/lib-tk/
Dialog.py 13 def __init__(self, master=None, cnf={}, **kw):
14 cnf = _cnfmerge((cnf, kw))
16 Widget._setup(self, master, cnf)
20 cnf['title'], cnf['text'],
21 cnf['bitmap'], cnf['default'],
22 *cnf['strings']))
Tix.py 108 def tix_configure(self, cnf=None, **kw):
121 cnf = _cnfmerge((cnf, kw))
122 elif cnf:
123 cnf = _cnfmerge(cnf)
124 if cnf is None:
125 cnf = {}
127 cnf[x[0][1:]] = (x[0][1:],) + x[1:]
128 return cnf
    [all...]
Tkinter.py 113 cnf = {}
116 cnf.update(c)
120 cnf[k] = v
121 return cnf
    [all...]
  /external/wpa_supplicant_8/hs20/server/ca/
est-csrattrs.sh 3 openssl asn1parse -genconf est-csrattrs.cnf -out est-csrattrs.der -oid hs20.oid
setup.sh 6 export OPENSSL_CONF=$PWD/openssl.cnf
19 cat openssl-root.cnf | sed "s/#@CN@/commonName_default = Hotspot 2.0 Trust Root CA - 99/" > openssl.cnf.tmp
26 $OPENSSL req -config openssl.cnf.tmp -batch -new -newkey rsa:4096 -keyout rootCA/private/cakey.pem -out rootCA/careq.pem || fail "Failed to generate Root CA private key"
28 $OPENSSL ca -config openssl.cnf.tmp -md sha256 -create_serial -out rootCA/cacert.pem -days 10957 -batch -keyfile rootCA/private/cakey.pem -passin pass:$PASS -selfsign -extensions v3_ca -outdir rootCA/newcerts -infiles rootCA/careq.pem || fail "Failed to sign Root CA certificate"
38 cat openssl.cnf | sed "s/#@CN@/commonName_default = w1.fi Hotspot 2.0 Intermediate CA/" > openssl.cnf.tmp
45 $OPENSSL req -config openssl.cnf.tmp -batch -new -newkey rsa:2048 -keyout demoCA/private/cakey.pem -out demoCA/careq.pem || fail "Failed to generate Intermediate CA private key"
47 $OPENSSL ca -config openssl.cnf.tmp -md sha256 -create_serial -out demoCA/cacert.pem -days 3652 -batch -keyfile rootCA/private/cakey.pem -cert rootCA/cacert.pem -passin pass:$PASS -extensions v3_ca -infiles demoCA/careq.pem || fail "Failed to sign Intermediate CA certificate"
59 cat openssl.cnf | sed "s/#@CN@/commonName_default = ocsp.w1.fi/" > openssl.cnf.tm
    [all...]
clean.sh 7 rm -f openssl.cnf.tmp
  /external/chromium_org/third_party/boringssl/src/crypto/x509v3/
v3_cpols.c 143 CONF_VALUE *cnf;
158 cnf = sk_CONF_VALUE_value(vals, i);
159 if(cnf->value || !cnf->name ) {
161 X509V3_conf_err(cnf);
164 pstr = cnf->name;
174 X509V3_conf_err(cnf);
181 if(!(pobj = OBJ_txt2obj(cnf->name, 0))) {
183 X509V3_conf_err(cnf);
207 CONF_VALUE *cnf;
    [all...]
v3_akey.c 119 CONF_VALUE *cnf; local
131 cnf = sk_CONF_VALUE_value(values, i);
132 if(!strcmp(cnf->name, "keyid"))
135 if(cnf->value && !strcmp(cnf->value, "always"))
138 else if(!strcmp(cnf->name, "issuer"))
141 if(cnf->value && !strcmp(cnf->value, "always"))
147 ERR_add_error_data(2, "name=", cnf->name);
v3_crld.c 117 CONF_VALUE *cnf)
121 if (!strncmp(cnf->name, "fullname", 9))
123 fnm = gnames_from_sectname(ctx, cnf->value);
127 else if (!strcmp(cnf->name, "relativename"))
135 dnsect = X509V3_get_section(ctx, cnf->value);
273 CONF_VALUE *cnf; local
281 cnf = sk_CONF_VALUE_value(nval, i);
282 ret = set_dist_point_name(&point->distpoint, ctx, cnf);
287 if (!strcmp(cnf->name, "reasons"))
289 if (!set_reasons(&point->reasons, cnf->value)
316 CONF_VALUE *cnf; local
448 CONF_VALUE *cnf; local
    [all...]
v3_pci.c 261 CONF_VALUE *cnf = sk_CONF_VALUE_value(vals, i); local
262 if (!cnf->name || (*cnf->name != '@' && !cnf->value))
265 X509V3_conf_err(cnf);
268 if (*cnf->name == '@')
273 sect = X509V3_get_section(ctx, cnf->name + 1);
277 X509V3_conf_err(cnf);
292 if (!process_pci_value(cnf,
295 X509V3_conf_err(cnf);
    [all...]
  /external/openssl/crypto/x509v3/
v3_cpols.c 139 CONF_VALUE *cnf;
153 cnf = sk_CONF_VALUE_value(vals, i);
154 if(cnf->value || !cnf->name ) {
156 X509V3_conf_err(cnf);
159 pstr = cnf->name;
169 X509V3_conf_err(cnf);
176 if(!(pobj = OBJ_txt2obj(cnf->name, 0))) {
178 X509V3_conf_err(cnf);
202 CONF_VALUE *cnf;
    [all...]
v3_crld.c 116 CONF_VALUE *cnf)
120 if (!strncmp(cnf->name, "fullname", 9))
122 fnm = gnames_from_sectname(ctx, cnf->value);
126 else if (!strcmp(cnf->name, "relativename"))
134 dnsect = X509V3_get_section(ctx, cnf->value);
274 CONF_VALUE *cnf; local
282 cnf = sk_CONF_VALUE_value(nval, i);
283 ret = set_dist_point_name(&point->distpoint, ctx, cnf);
288 if (!strcmp(cnf->name, "reasons"))
290 if (!set_reasons(&point->reasons, cnf->value)
317 CONF_VALUE *cnf; local
450 CONF_VALUE *cnf; local
    [all...]
v3_akey.c 116 CONF_VALUE *cnf; local
128 cnf = sk_CONF_VALUE_value(values, i);
129 if(!strcmp(cnf->name, "keyid"))
132 if(cnf->value && !strcmp(cnf->value, "always"))
135 else if(!strcmp(cnf->name, "issuer"))
138 if(cnf->value && !strcmp(cnf->value, "always"))
144 ERR_add_error_data(2, "name=", cnf->name);
v3_pci.c 256 CONF_VALUE *cnf = sk_CONF_VALUE_value(vals, i); local
257 if (!cnf->name || (*cnf->name != '@' && !cnf->value))
260 X509V3_conf_err(cnf);
263 if (*cnf->name == '@')
268 sect = X509V3_get_section(ctx, cnf->name + 1);
272 X509V3_conf_err(cnf);
287 if (!process_pci_value(cnf,
290 X509V3_conf_err(cnf);
    [all...]
  /external/chromium_org/net/data/ssl/scripts/
generate-test-certs.sh 30 -config ca.cnf
38 -extfile ca.cnf \
47 -config ee.cnf
53 -config ee.cnf
64 -config ca.cnf
73 -config ca.cnf
83 -config ca.cnf
93 -config ca.cnf
109 -config ../scripts/ee.cnf -newkey rsa:2048 -text \
115 -config ../scripts/ee.cnf -newkey rsa:2048 -text
    [all...]
generate-bad-eku-certs.sh 42 -config ca.cnf
51 -extfile ca.cnf \
65 -config eku-test.cnf \
78 -config ca.cnf
generate-policy-certs.sh 42 -config policy.cnf
52 -extfile policy.cnf \
63 -config policy.cnf
72 -config policy.cnf \
83 -config policy.cnf
92 -config policy.cnf \
generate-redundant-test-chains.sh 51 -config redundant-ca.cnf
59 -extfile redundant-ca.cnf \
71 -config redundant-ca.cnf
79 -extfile redundant-ca.cnf \
94 -config redundant-ca.cnf
107 -config redundant-ca.cnf
118 -config redundant-ca.cnf
125 -config ee.cnf
136 -config redundant-ca.cnf
generate-cross-signed-certs.sh 43 -config ca.cnf
53 -extfile ca.cnf \
64 -extfile ca.cnf \
72 -config ee.cnf
82 -config ca.cnf
generate-multi-root-test-chains.sh 47 -config redundant-ca.cnf
55 -extfile redundant-ca.cnf \
67 -config redundant-ca.cnf
75 -extfile redundant-ca.cnf \
87 -config redundant-ca.cnf
98 -config redundant-ca.cnf
111 -config redundant-ca.cnf
123 -config redundant-ca.cnf
134 -config redundant-ca.cnf
141 -config ee.cnf
    [all...]
generate-aia-certs.sh 39 -config aia-test.cnf
49 -extfile aia-test.cnf \
61 -config aia-test.cnf
70 -config aia-test.cnf \
81 -config aia-test.cnf
91 -config aia-test.cnf \
  /libcore/support/src/test/java/tests/resources/x509/
create.sh 25 openssl req -config ${DIR}/default.cnf -new -key ${DIR}/privkey.pem -nodes -batch > /tmp/cert-rsa-req.pem
27 openssl x509 -extfile ${DIR}/default.cnf -days 3650 -extensions usr_cert -req -signkey ${DIR}/privkey.pem -outform d -set_serial -99999999999999999999 < /tmp/cert-rsa-req.pem > ${DIR}/cert-rsa.der
40 openssl req -config ${DIR}/default.cnf -new -key ${DIR}/privkey.pem -nodes -batch | openssl x509 -extfile ${DIR}/default.cnf -extensions keyUsage_extraLong_cert -req -signkey ${DIR}/privkey.pem -outform d > ${DIR}/cert-keyUsage-extraLong.der
42 openssl req -config ${DIR}/default.cnf -new -key ${DIR}/privkey.pem -nodes -batch | openssl x509 -extfile ${DIR}/default.cnf -extensions extendedKeyUsage_cert -req -signkey ${DIR}/privkey.pem -outform d > ${DIR}/cert-extendedKeyUsage.der
44 openssl req -config ${DIR}/default.cnf -new -key ${DIR}/privkey.pem -nodes -batch | openssl x509 -extfile ${DIR}/default.cnf -extensions ca_cert -req -signkey ${DIR}/privkey.pem -outform d > ${DIR}/cert-ca.der
46 openssl req -config ${DIR}/default.cnf -new -key ${DIR}/privkey.pem -nodes -batch | openssl x509 -extfile ${DIR}/default.cnf -extensions userWithPathLen_cert -req -signkey ${DIR}/privkey.pem -outform d > ${DIR}/cert-userWit (…)
    [all...]

Completed in 652 milliseconds

1 2 3