/third_party/python/Lib/tkinter/ |
D | tix.py | 101 def tix_configure(self, cnf=None, **kw): argument 114 cnf = _cnfmerge((cnf, kw)) 115 elif cnf: 116 cnf = _cnfmerge(cnf) 117 if cnf is None: 119 if isinstance(cnf, str): 120 return self._getconfigure1('tix', 'configure', '-'+cnf) 121 return self.tk.call(('tix', 'configure') + self._options(cnf)) 228 def config(self, cnf={}, **kw): argument 229 self.tk.call('tixForm', self._w, *self._options(cnf, kw)) [all …]
|
D | dialog.py | 11 def __init__(self, master=None, cnf={}, **kw): argument 12 cnf = _cnfmerge((cnf, kw)) 14 Widget._setup(self, master, cnf) 18 cnf['title'], cnf['text'], 19 cnf['bitmap'], cnf['default'], 20 *cnf['strings']))
|
D | __init__.py | 108 cnf = {} 111 cnf.update(c) 115 cnf[k] = v 116 return cnf 1468 def _options(self, cnf, kw = None): argument 1471 cnf = _cnfmerge((cnf, kw)) 1473 cnf = _cnfmerge(cnf) 1475 for k, v in cnf.items(): 1616 cnf = {} 1619 cnf[x[0][1:]] = (x[0][1:],) + x[1:] [all …]
|
/third_party/openssl/crypto/asn1/ |
D | asn_mstbl.c | 20 static int stbl_module_init(CONF_IMODULE *md, const CONF *cnf) in stbl_module_init() argument 28 if ((sktmp = NCONF_get_section(cnf, stbl_section)) == NULL) { in stbl_module_init() 64 CONF_VALUE *cnf = NULL; in do_tcreate() local 74 cnf = sk_CONF_VALUE_value(lst, i); in do_tcreate() 75 if (strcmp(cnf->name, "min") == 0) { in do_tcreate() 76 tbl_min = strtoul(cnf->value, &eptr, 0); in do_tcreate() 79 } else if (strcmp(cnf->name, "max") == 0) { in do_tcreate() 80 tbl_max = strtoul(cnf->value, &eptr, 0); in do_tcreate() 83 } else if (strcmp(cnf->name, "mask") == 0) { in do_tcreate() 84 if (!ASN1_str2mask(cnf->value, &tbl_mask) || !tbl_mask) in do_tcreate() [all …]
|
/third_party/boringssl/src/crypto/x509v3/ |
D | v3_cpols.c | 149 CONF_VALUE *cnf; 164 cnf = sk_CONF_VALUE_value(vals, i); 165 if (cnf->value || !cnf->name) { 167 X509V3_conf_err(cnf); 170 pstr = cnf->name; 180 X509V3_conf_err(cnf); 188 if (!(pobj = OBJ_txt2obj(cnf->name, 0))) { 190 X509V3_conf_err(cnf); 219 CONF_VALUE *cnf; in policy_section() local 225 cnf = sk_CONF_VALUE_value(polstrs, i); in policy_section() [all …]
|
D | v3_crld.c | 116 CONF_VALUE *cnf) in set_dist_point_name() argument 120 if (!strncmp(cnf->name, "fullname", 9)) { in set_dist_point_name() 121 fnm = gnames_from_sectname(ctx, cnf->value); in set_dist_point_name() 124 } else if (!strcmp(cnf->name, "relativename")) { in set_dist_point_name() 131 dnsect = X509V3_get_section(ctx, cnf->value); in set_dist_point_name() 255 CONF_VALUE *cnf; in crldp_from_section() local 262 cnf = sk_CONF_VALUE_value(nval, i); in crldp_from_section() 263 ret = set_dist_point_name(&point->distpoint, ctx, cnf); in crldp_from_section() 268 if (!strcmp(cnf->name, "reasons")) { in crldp_from_section() 269 if (!set_reasons(&point->reasons, cnf->value)) in crldp_from_section() [all …]
|
D | v3_akey.c | 127 CONF_VALUE *cnf; in v2i_AUTHORITY_KEYID() local 138 cnf = sk_CONF_VALUE_value(values, i); in v2i_AUTHORITY_KEYID() 139 if (!strcmp(cnf->name, "keyid")) { in v2i_AUTHORITY_KEYID() 141 if (cnf->value && !strcmp(cnf->value, "always")) in v2i_AUTHORITY_KEYID() 143 } else if (!strcmp(cnf->name, "issuer")) { in v2i_AUTHORITY_KEYID() 145 if (cnf->value && !strcmp(cnf->value, "always")) in v2i_AUTHORITY_KEYID() 149 ERR_add_error_data(2, "name=", cnf->name); in v2i_AUTHORITY_KEYID()
|
D | v3_alt.c | 262 CONF_VALUE *cnf; in v2i_issuer_alt() local 269 cnf = sk_CONF_VALUE_value(nval, i); in v2i_issuer_alt() 270 if (!x509v3_name_cmp(cnf->name, "issuer") && cnf->value && in v2i_issuer_alt() 271 !strcmp(cnf->value, "copy")) { in v2i_issuer_alt() 276 if (!(gen = v2i_GENERAL_NAME(method, ctx, cnf))) in v2i_issuer_alt() 332 CONF_VALUE *cnf; in v2i_subject_alt() local 339 cnf = sk_CONF_VALUE_value(nval, i); in v2i_subject_alt() 340 if (!x509v3_name_cmp(cnf->name, "email") && cnf->value && in v2i_subject_alt() 341 !strcmp(cnf->value, "copy")) { in v2i_subject_alt() 344 } else if (!x509v3_name_cmp(cnf->name, "email") && cnf->value && in v2i_subject_alt() [all …]
|
D | v3_pci.c | 210 CONF_VALUE *cnf = sk_CONF_VALUE_value(vals, i); in r2i_pci() local 211 if (!cnf->name || (*cnf->name != '@' && !cnf->value)) { in r2i_pci() 213 X509V3_conf_err(cnf); in r2i_pci() 216 if (*cnf->name == '@') { in r2i_pci() 220 sect = X509V3_get_section(ctx, cnf->name + 1); in r2i_pci() 223 X509V3_conf_err(cnf); in r2i_pci() 235 if (!process_pci_value(cnf, &language, &pathlen, &policy)) { in r2i_pci() 236 X509V3_conf_err(cnf); in r2i_pci()
|
D | v3_info.c | 165 CONF_VALUE *cnf, ctmp; in v2i_AUTHORITY_INFO_ACCESS() local 175 cnf = sk_CONF_VALUE_value(nval, i); in v2i_AUTHORITY_INFO_ACCESS() 181 ptmp = strchr(cnf->name, ';'); in v2i_AUTHORITY_INFO_ACCESS() 186 objlen = ptmp - cnf->name; in v2i_AUTHORITY_INFO_ACCESS() 188 ctmp.value = cnf->value; in v2i_AUTHORITY_INFO_ACCESS() 195 BUF_strlcpy(objtmp, cnf->name, objlen + 1); in v2i_AUTHORITY_INFO_ACCESS()
|
/third_party/openssl/test/smime-certs/ |
D | mksmime-certs.sh | 13 OPENSSL_CONF=./ca.cnf 17 CN="Test S/MIME RSA Root" $OPENSSL req -config ca.cnf -x509 -nodes \ 21 CN="Test S/MIME EE RSA #1" $OPENSSL req -config ca.cnf -nodes \ 25 -extfile ca.cnf -extensions usr_cert -CAcreateserial >>smrsa1.pem 27 CN="Test S/MIME EE RSA #2" $OPENSSL req -config ca.cnf -nodes \ 30 -extfile ca.cnf -extensions usr_cert -CAcreateserial >>smrsa2.pem 32 CN="Test S/MIME EE RSA #3" $OPENSSL req -config ca.cnf -nodes \ 35 -extfile ca.cnf -extensions usr_cert -CAcreateserial >>smrsa3.pem 41 CN="Test S/MIME EE DSA #1" $OPENSSL req -config ca.cnf -nodes \ 44 -extfile ca.cnf -extensions usr_cert -CAcreateserial >>smdsa1.pem [all …]
|
/third_party/openssl/demos/certs/ |
D | mkcerts.sh | 4 OPENSSL_CONF=../../apps/openssl.cnf 8 CN="Test Root CA" $OPENSSL req -config ca.cnf -x509 -nodes \ 11 CN="Test Intermediate CA" $OPENSSL req -config ca.cnf -nodes \ 15 -extfile ca.cnf -extensions v3_ca -CAcreateserial -out intca.pem 18 CN="Test Server Cert" $OPENSSL req -config ca.cnf -nodes \ 22 -extfile ca.cnf -extensions usr_cert -CAcreateserial -out server.pem 25 CN="Test Client Cert" $OPENSSL req -config ca.cnf -nodes \ 29 -extfile ca.cnf -extensions usr_cert -CAcreateserial -out client.pem 32 CN="Test Revoked Cert" $OPENSSL req -config ca.cnf -nodes \ 36 -extfile ca.cnf -extensions usr_cert -CAcreateserial -out rev.pem [all …]
|
/third_party/openssl/crypto/x509v3/ |
D | v3_cpols.c | 96 CONF_VALUE *cnf; variable 113 cnf = sk_CONF_VALUE_value(vals, i); 115 if (cnf->value || !cnf->name) { 118 X509V3_conf_err(cnf); 121 pstr = cnf->name; 131 X509V3_conf_err(cnf); 139 if ((pobj = OBJ_txt2obj(cnf->name, 0)) == NULL) { 142 X509V3_conf_err(cnf); 171 CONF_VALUE *cnf; in policy_section() local 178 cnf = sk_CONF_VALUE_value(polstrs, i); in policy_section() [all …]
|
D | v3_crld.c | 67 CONF_VALUE *cnf) in set_dist_point_name() argument 72 if (strncmp(cnf->name, "fullname", 9) == 0) { in set_dist_point_name() 73 fnm = gnames_from_sectname(ctx, cnf->value); in set_dist_point_name() 76 } else if (strcmp(cnf->name, "relativename") == 0) { in set_dist_point_name() 83 dnsect = X509V3_get_section(ctx, cnf->value); in set_dist_point_name() 207 CONF_VALUE *cnf; in crldp_from_section() local 214 cnf = sk_CONF_VALUE_value(nval, i); in crldp_from_section() 215 ret = set_dist_point_name(&point->distpoint, ctx, cnf); in crldp_from_section() 220 if (strcmp(cnf->name, "reasons") == 0) { in crldp_from_section() 221 if (!set_reasons(&point->reasons, cnf->value)) in crldp_from_section() [all …]
|
D | v3_akey.c | 73 CONF_VALUE *cnf; in v2i_AUTHORITY_KEYID() local 84 cnf = sk_CONF_VALUE_value(values, i); in v2i_AUTHORITY_KEYID() 85 if (strcmp(cnf->name, "keyid") == 0) { in v2i_AUTHORITY_KEYID() 87 if (cnf->value && strcmp(cnf->value, "always") == 0) in v2i_AUTHORITY_KEYID() 89 } else if (strcmp(cnf->name, "issuer") == 0) { in v2i_AUTHORITY_KEYID() 91 if (cnf->value && strcmp(cnf->value, "always") == 0) in v2i_AUTHORITY_KEYID() 95 ERR_add_error_data(2, "name=", cnf->name); in v2i_AUTHORITY_KEYID()
|
D | v3_alt.c | 235 CONF_VALUE *cnf = sk_CONF_VALUE_value(nval, i); in v2i_issuer_alt() local 237 if (!name_cmp(cnf->name, "issuer") in v2i_issuer_alt() 238 && cnf->value && strcmp(cnf->value, "copy") == 0) { in v2i_issuer_alt() 242 GENERAL_NAME *gen = v2i_GENERAL_NAME(method, ctx, cnf); in v2i_issuer_alt() 304 CONF_VALUE *cnf; in v2i_subject_alt() local 316 cnf = sk_CONF_VALUE_value(nval, i); in v2i_subject_alt() 317 if (!name_cmp(cnf->name, "email") in v2i_subject_alt() 318 && cnf->value && strcmp(cnf->value, "copy") == 0) { in v2i_subject_alt() 321 } else if (!name_cmp(cnf->name, "email") in v2i_subject_alt() 322 && cnf->value && strcmp(cnf->value, "move") == 0) { in v2i_subject_alt() [all …]
|
D | v3_pci.c | 256 CONF_VALUE *cnf = sk_CONF_VALUE_value(vals, i); in r2i_pci() local 257 if (!cnf->name || (*cnf->name != '@' && !cnf->value)) { in r2i_pci() 260 X509V3_conf_err(cnf); in r2i_pci() 263 if (*cnf->name == '@') { in r2i_pci() 267 sect = X509V3_get_section(ctx, cnf->name + 1); in r2i_pci() 270 X509V3_conf_err(cnf); in r2i_pci() 282 if (!process_pci_value(cnf, &language, &pathlen, &policy)) { in r2i_pci() 283 X509V3_conf_err(cnf); in r2i_pci()
|
D | v3_info.c | 107 CONF_VALUE *cnf, ctmp; in v2i_AUTHORITY_INFO_ACCESS() local 118 cnf = sk_CONF_VALUE_value(nval, i); in v2i_AUTHORITY_INFO_ACCESS() 125 ptmp = strchr(cnf->name, ';'); in v2i_AUTHORITY_INFO_ACCESS() 131 objlen = ptmp - cnf->name; in v2i_AUTHORITY_INFO_ACCESS() 133 ctmp.value = cnf->value; in v2i_AUTHORITY_INFO_ACCESS() 136 if ((objtmp = OPENSSL_strndup(cnf->name, objlen)) == NULL) { in v2i_AUTHORITY_INFO_ACCESS()
|
/third_party/openssl/demos/bio/ |
D | client-conf.c | 25 CONF_VALUE *cnf; in main() local 52 cnf = sk_CONF_VALUE_value(sect, i); in main() 53 rv = SSL_CONF_cmd(cctx, cnf->name, cnf->value); in main() 58 cnf->name, cnf->value); in main() 62 if (strcmp(cnf->name, "Connect") == 0) { in main() 63 connect_str = cnf->value; in main() 65 fprintf(stderr, "Unknown configuration option %s\n", cnf->name); in main()
|
D | server-conf.c | 33 CONF_VALUE *cnf; in main() local 64 cnf = sk_CONF_VALUE_value(sect, i); in main() 65 rv = SSL_CONF_cmd(cctx, cnf->name, cnf->value); in main() 70 cnf->name, cnf->value); in main() 74 if (strcmp(cnf->name, "Port") == 0) { in main() 75 port = cnf->value; in main() 77 fprintf(stderr, "Unknown configuration option %s\n", cnf->name); in main()
|
/third_party/openssl/demos/certs/apps/ |
D | mkacerts.sh | 8 CN="OpenSSL Test Root CA" $OPENSSL req -config apps.cnf -x509 -nodes \ 11 CN="OpenSSL Test Intermediate CA" $OPENSSL req -config apps.cnf -nodes \ 15 -extfile apps.cnf -extensions v3_ca -CAcreateserial -out intca.pem 17 CN="Test Client Cert" $OPENSSL req -config apps.cnf -nodes \ 21 -extfile apps.cnf -extensions usr_cert -CAcreateserial | \ 24 CN="Test Server Cert" $OPENSSL req -config apps.cnf -nodes \ 28 -extfile apps.cnf -extensions usr_cert -CAcreateserial | \ 31 CN="Test Server Cert #2" $OPENSSL req -config apps.cnf -nodes \ 35 -extfile apps.cnf -extensions usr_cert -CAcreateserial | \
|
D | mkxcerts.sh | 7 -config apps.cnf -extensions usr_cert -x509 -nodes \ 10 -config apps.cnf -extensions usr_cert -x509 -nodes \ 13 -config apps.cnf -extensions usr_cert -x509 -nodes \ 22 -config apps.cnf -extensions ec_cert -x509 -nodes \ 27 -config apps.cnf -extensions ec_cert -x509 -nodes \
|
/third_party/node/test/fixtures/keys/ |
D | Makefile | 87 ca1-cert.pem: ca1.cnf 88 openssl req -new -x509 -days 99999 -config ca1.cnf -keyout ca1-key.pem -out ca1-cert.pem 94 ca2-cert.pem: ca2.cnf 95 openssl req -new -x509 -days 99999 -config ca2.cnf -keyout ca2-key.pem -out ca2-cert.pem 106 ca3-csr.pem: ca3.cnf ca3-key.pem 109 -config ca3.cnf \ 113 ca3-cert.pem: ca3-csr.pem ca3-key.pem ca3.cnf ca1-cert.pem ca1-key.pem 115 -extfile ca3.cnf \ 132 ca4-csr.pem: ca4.cnf ca4-key.pem 135 -config ca4.cnf \ [all …]
|
/third_party/openssl/crypto/conf/ |
D | conf_mod.c | 59 static int module_run(const CONF *cnf, const char *name, const char *value, 66 const CONF *cnf); 67 static CONF_MODULE *module_load_dso(const CONF *cnf, const char *name, 72 int CONF_modules_load(const CONF *cnf, const char *appname, in CONF_modules_load() argument 81 if (!cnf) in CONF_modules_load() 85 vsection = NCONF_get_string(cnf, NULL, appname); in CONF_modules_load() 88 vsection = NCONF_get_string(cnf, NULL, "openssl_conf"); in CONF_modules_load() 95 values = NCONF_get_section(cnf, vsection); in CONF_modules_load() 102 ret = module_run(cnf, vl->name, vl->value, flags); in CONF_modules_load() 151 static int module_run(const CONF *cnf, const char *name, const char *value, in module_run() argument [all …]
|
/third_party/openssl/crypto/engine/ |
D | eng_cnf.c | 41 static int int_engine_configure(const char *name, const char *value, const CONF *cnf) in int_engine_configure() argument 57 ecmds = NCONF_get_section(cnf, value); in int_engine_configure() 115 if (!NCONF_get_number_e(cnf, value, "init", &do_init)) in int_engine_configure() 151 static int int_engine_module_init(CONF_IMODULE *md, const CONF *cnf) in int_engine_module_init() argument 161 elist = NCONF_get_section(cnf, CONF_imodule_get_value(md)); in int_engine_module_init() 171 if (!int_engine_configure(cval->name, cval->value, cnf)) in int_engine_module_init()
|