Home
last modified time | relevance | path

Searched refs:cnf (Results 1 – 25 of 116) sorted by relevance

12345

/third_party/python/Lib/tkinter/
Dtix.py108 def tix_configure(self, cnf=None, **kw): argument
121 cnf = _cnfmerge((cnf, kw))
122 elif cnf:
123 cnf = _cnfmerge(cnf)
124 if cnf is None:
126 if isinstance(cnf, str):
127 return self._getconfigure1('tix', 'configure', '-'+cnf)
128 return self.tk.call(('tix', 'configure') + self._options(cnf))
235 def config(self, cnf={}, **kw): argument
236 self.tk.call('tixForm', self._w, *self._options(cnf, kw))
[all …]
Ddialog.py11 def __init__(self, master=None, cnf={}, **kw): argument
12 cnf = _cnfmerge((cnf, kw))
14 Widget._setup(self, master, cnf)
18 cnf['title'], cnf['text'],
19 cnf['bitmap'], cnf['default'],
20 *cnf['strings']))
D__init__.py108 cnf = {}
111 cnf.update(c)
115 cnf[k] = v
116 return cnf
1497 def _options(self, cnf, kw = None): argument
1500 cnf = _cnfmerge((cnf, kw))
1502 cnf = _cnfmerge(cnf)
1504 for k, v in cnf.items():
1645 cnf = {}
1648 cnf[x[0][1:]] = (x[0][1:],) + x[1:]
[all …]
/third_party/openssl/crypto/asn1/
Dasn_mstbl.c20 static int stbl_module_init(CONF_IMODULE *md, const CONF *cnf) in stbl_module_init() argument
28 if ((sktmp = NCONF_get_section(cnf, stbl_section)) == NULL) { in stbl_module_init()
64 CONF_VALUE *cnf = NULL; in do_tcreate() local
74 cnf = sk_CONF_VALUE_value(lst, i); in do_tcreate()
75 if (strcmp(cnf->name, "min") == 0) { in do_tcreate()
76 tbl_min = strtoul(cnf->value, &eptr, 0); in do_tcreate()
79 } else if (strcmp(cnf->name, "max") == 0) { in do_tcreate()
80 tbl_max = strtoul(cnf->value, &eptr, 0); in do_tcreate()
83 } else if (strcmp(cnf->name, "mask") == 0) { in do_tcreate()
84 if (!ASN1_str2mask(cnf->value, &tbl_mask) || !tbl_mask) in do_tcreate()
[all …]
Dasn1_gen.c65 static ASN1_TYPE *generate_v3(const char *str, X509V3_CTX *cnf, int depth,
73 static ASN1_TYPE *asn1_multi(int utype, const char *section, X509V3_CTX *cnf,
80 X509V3_CTX cnf; in ASN1_generate_nconf() local
85 X509V3_set_nconf(&cnf, nconf); in ASN1_generate_nconf()
86 return ASN1_generate_v3(str, &cnf); in ASN1_generate_nconf()
89 ASN1_TYPE *ASN1_generate_v3(const char *str, X509V3_CTX *cnf) in ASN1_generate_v3() argument
92 ASN1_TYPE *ret = generate_v3(str, cnf, 0, &err); in ASN1_generate_v3()
98 static ASN1_TYPE *generate_v3(const char *str, X509V3_CTX *cnf, int depth, in generate_v3() argument
127 if (!cnf) { in generate_v3()
135 ret = asn1_multi(asn1_tags.utype, asn1_tags.str, cnf, depth, perr); in generate_v3()
[all …]
/third_party/openssl/demos/certs/
Dmkcerts.sh4 OPENSSL_CONF=../../apps/openssl.cnf
8 CN="Test Root CA" $OPENSSL req -config ca.cnf -x509 -nodes \
11 CN="Test Intermediate CA" $OPENSSL req -config ca.cnf -nodes \
15 -extfile ca.cnf -extensions v3_ca -CAcreateserial -out intca.pem
18 CN="Test Server Cert" $OPENSSL req -config ca.cnf -nodes \
22 -extfile ca.cnf -extensions usr_cert -CAcreateserial -out server.pem
25 CN="Test Client Cert" $OPENSSL req -config ca.cnf -nodes \
29 -extfile ca.cnf -extensions usr_cert -CAcreateserial -out client.pem
32 CN="Test Revoked Cert" $OPENSSL req -config ca.cnf -nodes \
36 -extfile ca.cnf -extensions usr_cert -CAcreateserial -out rev.pem
[all …]
/third_party/openssl/crypto/x509/
Dv3_cpols.c97 CONF_VALUE *cnf; variable
114 cnf = sk_CONF_VALUE_value(vals, i);
115 if (cnf->value != NULL || cnf->name == NULL) {
117 X509V3_conf_add_error_name_value(cnf);
120 pstr = cnf->name;
130 "%s", cnf->name);
138 if ((pobj = OBJ_txt2obj(cnf->name, 0)) == NULL) {
141 "%s", cnf->name);
170 CONF_VALUE *cnf; in policy_section() local
177 cnf = sk_CONF_VALUE_value(polstrs, i); in policy_section()
[all …]
Dv3_ist.c46 CONF_VALUE *cnf = sk_CONF_VALUE_value(nval, i); variable
48 if (cnf == NULL) {
51 if (strcmp(cnf->name, "signTool") == 0) {
58 ASN1_STRING_set(ist->signTool, cnf->value, strlen(cnf->value));
59 } else if (strcmp(cnf->name, "cATool") == 0) {
66 ASN1_STRING_set(ist->cATool, cnf->value, strlen(cnf->value));
67 } else if (strcmp(cnf->name, "signToolCert") == 0) {
74 ASN1_STRING_set(ist->signToolCert, cnf->value, strlen(cnf->value));
75 } else if (strcmp(cnf->name, "cAToolCert") == 0) {
82 ASN1_STRING_set(ist->cAToolCert, cnf->value, strlen(cnf->value));
Dv3_crld.c68 CONF_VALUE *cnf) in set_dist_point_name() argument
73 if (strncmp(cnf->name, "fullname", 9) == 0) { in set_dist_point_name()
74 fnm = gnames_from_sectname(ctx, cnf->value); in set_dist_point_name()
77 } else if (strcmp(cnf->name, "relativename") == 0) { in set_dist_point_name()
84 dnsect = X509V3_get_section(ctx, cnf->value); in set_dist_point_name()
206 CONF_VALUE *cnf; in crldp_from_section() local
213 cnf = sk_CONF_VALUE_value(nval, i); in crldp_from_section()
214 ret = set_dist_point_name(&point->distpoint, ctx, cnf); in crldp_from_section()
219 if (strcmp(cnf->name, "reasons") == 0) { in crldp_from_section()
220 if (!set_reasons(&point->reasons, cnf->value)) in crldp_from_section()
[all …]
Dv3_san.c315 CONF_VALUE *cnf = sk_CONF_VALUE_value(nval, i); in v2i_issuer_alt() local
317 if (!ossl_v3_name_cmp(cnf->name, "issuer") in v2i_issuer_alt()
318 && cnf->value && strcmp(cnf->value, "copy") == 0) { in v2i_issuer_alt()
322 GENERAL_NAME *gen = v2i_GENERAL_NAME(method, ctx, cnf); in v2i_issuer_alt()
383 CONF_VALUE *cnf; in v2i_subject_alt() local
395 cnf = sk_CONF_VALUE_value(nval, i); in v2i_subject_alt()
396 if (ossl_v3_name_cmp(cnf->name, "email") == 0 in v2i_subject_alt()
397 && cnf->value && strcmp(cnf->value, "copy") == 0) { in v2i_subject_alt()
400 } else if (ossl_v3_name_cmp(cnf->name, "email") == 0 in v2i_subject_alt()
401 && cnf->value && strcmp(cnf->value, "move") == 0) { in v2i_subject_alt()
[all …]
Dv3_akid.c102 CONF_VALUE *cnf; in v2i_AUTHORITY_KEYID() local
121 cnf = sk_CONF_VALUE_value(values, i); in v2i_AUTHORITY_KEYID()
122 if (strcmp(cnf->name, "keyid") == 0) { in v2i_AUTHORITY_KEYID()
124 if (cnf->value && strcmp(cnf->value, "always") == 0) in v2i_AUTHORITY_KEYID()
126 } else if (strcmp(cnf->name, "issuer") == 0) { in v2i_AUTHORITY_KEYID()
128 if (cnf->value && strcmp(cnf->value, "always") == 0) in v2i_AUTHORITY_KEYID()
132 "name=%s", cnf->name); in v2i_AUTHORITY_KEYID()
Dv3_pci.c251 CONF_VALUE *cnf = sk_CONF_VALUE_value(vals, i); in r2i_pci() local
253 if (!cnf->name || (*cnf->name != '@' && !cnf->value)) { in r2i_pci()
255 X509V3_conf_err(cnf); in r2i_pci()
258 if (*cnf->name == '@') { in r2i_pci()
262 sect = X509V3_get_section(ctx, cnf->name + 1); in r2i_pci()
265 X509V3_conf_err(cnf); in r2i_pci()
277 if (!process_pci_value(cnf, &language, &pathlen, &policy)) { in r2i_pci()
278 X509V3_conf_err(cnf); in r2i_pci()
/third_party/openssl/test/smime-certs/
Dmksmime-certs.sh13 OPENSSL_CONF=./ca.cnf
17 CN="Test S/MIME RSA Root" $OPENSSL req -config ca.cnf -x509 -noenc \
21 CN="Test S/MIME EE RSA #1" $OPENSSL req -config ca.cnf -noenc \
25 -extfile ca.cnf -extensions usr_cert -CAcreateserial >>smrsa1.pem
27 CN="Test S/MIME EE RSA #2" $OPENSSL req -config ca.cnf -noenc \
30 -extfile ca.cnf -extensions usr_cert -CAcreateserial >>smrsa2.pem
32 CN="Test S/MIME EE RSA #3" $OPENSSL req -config ca.cnf -noenc \
35 -extfile ca.cnf -extensions usr_cert -CAcreateserial >>smrsa3.pem
41 CN="Test S/MIME EE DSA #1" $OPENSSL req -config ca.cnf -noenc \
44 -extfile ca.cnf -extensions usr_cert -CAcreateserial >>smdsa1.pem
[all …]
/third_party/openssl/demos/bio/
Dclient-conf.c25 CONF_VALUE *cnf; in main() local
52 cnf = sk_CONF_VALUE_value(sect, i); in main()
53 rv = SSL_CONF_cmd(cctx, cnf->name, cnf->value); in main()
58 cnf->name, cnf->value); in main()
62 if (strcmp(cnf->name, "Connect") == 0) { in main()
63 connect_str = cnf->value; in main()
65 fprintf(stderr, "Unknown configuration option %s\n", cnf->name); in main()
Dserver-conf.c33 CONF_VALUE *cnf; in main() local
64 cnf = sk_CONF_VALUE_value(sect, i); in main()
65 rv = SSL_CONF_cmd(cctx, cnf->name, cnf->value); in main()
70 cnf->name, cnf->value); in main()
74 if (strcmp(cnf->name, "Port") == 0) { in main()
75 port = cnf->value; in main()
77 fprintf(stderr, "Unknown configuration option %s\n", cnf->name); in main()
/third_party/node/test/fixtures/keys/
DMakefile87 ca1-cert.pem: ca1.cnf
88 openssl req -new -x509 -days 99999 -config ca1.cnf -keyout ca1-key.pem -out ca1-cert.pem
94 ca2-cert.pem: ca2.cnf
95 openssl req -new -x509 -days 99999 -config ca2.cnf -keyout ca2-key.pem -out ca2-cert.pem
106 ca3-csr.pem: ca3.cnf ca3-key.pem
109 -config ca3.cnf \
113 ca3-cert.pem: ca3-csr.pem ca3-key.pem ca3.cnf ca1-cert.pem ca1-key.pem
115 -extfile ca3.cnf \
132 ca4-csr.pem: ca4.cnf ca4-key.pem
135 -config ca4.cnf \
[all …]
/third_party/openssl/demos/certs/apps/
Dmkacerts.sh8 CN="OpenSSL Test Root CA" $OPENSSL req -config apps.cnf -x509 -nodes \
11 CN="OpenSSL Test Intermediate CA" $OPENSSL req -config apps.cnf -nodes \
15 -extfile apps.cnf -extensions v3_ca -CAcreateserial -out intca.pem
17 CN="Test Client Cert" $OPENSSL req -config apps.cnf -nodes \
21 -extfile apps.cnf -extensions usr_cert -CAcreateserial | \
24 CN="Test Server Cert" $OPENSSL req -config apps.cnf -nodes \
28 -extfile apps.cnf -extensions usr_cert -CAcreateserial | \
31 CN="Test Server Cert #2" $OPENSSL req -config apps.cnf -nodes \
35 -extfile apps.cnf -extensions usr_cert -CAcreateserial | \
Dmkxcerts.sh7 -config apps.cnf -extensions usr_cert -x509 -nodes \
10 -config apps.cnf -extensions usr_cert -x509 -nodes \
13 -config apps.cnf -extensions usr_cert -x509 -nodes \
22 -config apps.cnf -extensions ec_cert -x509 -nodes \
27 -config apps.cnf -extensions ec_cert -x509 -nodes \
/third_party/openssl/crypto/conf/
Dconf_mod.c74 static int module_run(const CONF *cnf, const char *name, const char *value,
81 const CONF *cnf);
82 static CONF_MODULE *module_load_dso(const CONF *cnf, const char *name,
110 static int conf_diagnostics(const CONF *cnf) in conf_diagnostics() argument
112 return _CONF_get_number(cnf, NULL, "config_diagnostics") != 0; in conf_diagnostics()
117 int CONF_modules_load(const CONF *cnf, const char *appname, in CONF_modules_load() argument
125 if (!cnf) in CONF_modules_load()
128 if (conf_diagnostics(cnf)) in CONF_modules_load()
136 vsection = NCONF_get_string(cnf, NULL, appname); in CONF_modules_load()
139 vsection = NCONF_get_string(cnf, NULL, "openssl_conf"); in CONF_modules_load()
[all …]
/third_party/openssl/test/recipes/
D80-test_ca.t23 my $cnf = srctop_file("test","ca-and-certs.cnf");
33 $ENV{OPENSSL_CONFIG} = qq(-config "$cnf");
40 $ENV{OPENSSL_CONFIG} = qq(-config "$cnf");
57 $ENV{OPENSSL_CONFIG} = qq(-config "$cnf");
67 $cnf,
136 '-config', $cnf,
150 '-config', $cnf,
160 '-config', $cnf,
179 '-config', $cnf,
D25-test_verify_store.t23 my $cnf = srctop_file("test", "ca-and-certs.cnf");
36 -config => $cnf,
48 -extfile => $cnf );
77 -config => $cnf,
90 -extfile => $cnf )
/third_party/openssl/crypto/
Dprovider_conf.c76 const CONF *cnf) in provider_conf_params() argument
81 sect = NCONF_get_section(cnf, value); in provider_conf_params()
103 cnf)) in provider_conf_params()
140 const char *value, const CONF *cnf) in provider_conf_load() argument
153 ecmds = NCONF_get_section(cnf, value); in provider_conf_load()
219 ok = provider_conf_params(prov, NULL, NULL, value, cnf); in provider_conf_load()
269 ok = provider_conf_params(NULL, &entry, NULL, value, cnf); in provider_conf_load()
285 static int provider_conf_init(CONF_IMODULE *md, const CONF *cnf) in provider_conf_init() argument
295 elist = NCONF_get_section(cnf, CONF_imodule_get_value(md)); in provider_conf_init()
304 if (!provider_conf_load(NCONF_get0_libctx((CONF *)cnf), in provider_conf_init()
[all …]
/third_party/openssl/crypto/engine/
Deng_cnf.c43 static int int_engine_configure(const char *name, const char *value, const CONF *cnf) in int_engine_configure() argument
57 ecmds = NCONF_get_section(cnf, value); in int_engine_configure()
112 if (!NCONF_get_number_e(cnf, value, "init", &do_init)) in int_engine_configure()
147 static int int_engine_module_init(CONF_IMODULE *md, const CONF *cnf) in int_engine_module_init() argument
155 elist = NCONF_get_section(cnf, CONF_imodule_get_value(md)); in int_engine_module_init()
164 if (!int_engine_configure(cval->name, cval->value, cnf)) in int_engine_module_init()
/third_party/openssl/crypto/evp/
Devp_cnf.c21 static int alg_module_init(CONF_IMODULE *md, const CONF *cnf) in alg_module_init() argument
32 if ((sktmp = NCONF_get_section(cnf, oid_section)) == NULL) { in alg_module_init()
50 NCONF_get0_libctx((CONF *)cnf), m > 0, 0)) { in alg_module_init()
55 if (!evp_set_default_properties_int(NCONF_get0_libctx((CONF *)cnf), in alg_module_init()
/third_party/openssl/test/
DREADME.ssltest.md6 Each `ssl_*.cnf.in` file contains a number of test configurations. These files
14 `test/ssl-tests/*.cnf` files.
16 For more details, see `ssl-tests/01-simple.cnf.in` for an example.
216 existing `*.cnf.in` files (for example, `01-simple.cnf.in`).
218 2. Generate the generated `*.cnf` test input file. You can do so by running
224 ssl-tests/my.cnf.in default > ssl-tests/my.cnf
226 where `my.cnf.in` is your test input file and `default` is the provider to use.
229 For example, to generate the test cases in `ssl-tests/01-simple.cnf.in`, do
232 ssl-tests/01-simple.cnf.in default > ssl-tests/01-simple.cnf
263 $ CTLOG_FILE=test/ct/log_list.cnf TEST_CERTS_DIR=test/certs test/ssl_test \
[all …]

12345