Home
last modified time | relevance | path

Searched refs:it (Results 276 – 300 of 1855) sorted by last modified time

1...<<11121314151617181920>>...75

/trunk/main/vcl/unx/headless/
H A Dsvptext.cxx193 PspKernPairs::const_iterator it = rKernPairs.begin(); in Initialize() local
194 for(; it != rKernPairs.end(); ++it ) in Initialize()
196 ImplKernPairData aKernPair = { it->first, it->second, it->kern_x }; in Initialize()
290 ::std::list< psp::fontID >::iterator it; in GetDevFontList()
291 for( it = aList.begin(); it != aList.end(); ++it ) in GetDevFontList()
293 if( !rMgr.getFontFastInfo( *it, aInfo ) ) in GetDevFontList()
310 pExtraKernInfo = new PspKernInfo( *it ); in GetDevFontList()
/trunk/main/setup_native/source/packinfo/
H A Dpackage_names.txt50 %PACKAGEPREFIX%SOLARISBRANDPACKAGENAME%BRANDPACKAGEVERSION-dict-it It dictionary for %PRODUCTNAME %…
/trunk/test/testgui/source/bvt/gui/
H A DFileExport.java246 ListIterator<String> it = sampledirs.listIterator(); in testSaveAs() local
249 while (it.hasNext()) { in testSaveAs()
251 String str = (String) it.next(); in testSaveAs()
/trunk/main/xmlsecurity/tools/examples/
H A Dreadme.txt6 If you want to use it, you need to configure all marcos to your local setting.
/trunk/main/xmlsecurity/tools/demo/
H A Dreadme.txt18 Currently it doesn't work, seems to be because of JavaFramework doesn't work in stand alone program.
20 In case you want to try it:
/trunk/main/xmlsecurity/test_docs/tools/httpserv/nbproject/
H A Dgenfiles.properties27 # Do not edit this file. You may delete it but then the IDE will never regenerate such files for yo…
/trunk/main/xmlsecurity/test_docs/CAs/Sub_CA_1_Root_7/
H A Dopenssl.cfg158 # we can do this but it is not needed normally :-)
235 # Key usage: this is typical for a CA certificate. However since it will
236 # prevent it being used as an test self-signed certificate it is best
265 # This goes against PKIX guidelines but some CAs do it and some software
270 # Here are some examples of the usage of nsCertType. If it is omitted
312 # This really needs to be in place for it to be a proxy certificate.
/trunk/main/xmlsecurity/test_docs/CAs/Sub_CA_1_Root_8/
H A Dopenssl.cfg158 # we can do this but it is not needed normally :-)
235 # Key usage: this is typical for a CA certificate. However since it will
236 # prevent it being used as an test self-signed certificate it is best
265 # This goes against PKIX guidelines but some CAs do it and some software
270 # Here are some examples of the usage of nsCertType. If it is omitted
312 # This really needs to be in place for it to be a proxy certificate.
/trunk/main/xmlsecurity/test_docs/CAs/Sub_CA_1_Root_9/
H A Dopenssl.cfg158 # we can do this but it is not needed normally :-)
235 # Key usage: this is typical for a CA certificate. However since it will
236 # prevent it being used as an test self-signed certificate it is best
265 # This goes against PKIX guidelines but some CAs do it and some software
270 # Here are some examples of the usage of nsCertType. If it is omitted
312 # This really needs to be in place for it to be a proxy certificate.
/trunk/main/xmlsecurity/test_docs/CAs/Sub_CA_2_Root_4/
H A Dopenssl.cfg158 # we can do this but it is not needed normally :-)
235 # Key usage: this is typical for a CA certificate. However since it will
236 # prevent it being used as an test self-signed certificate it is best
265 # This goes against PKIX guidelines but some CAs do it and some software
270 # Here are some examples of the usage of nsCertType. If it is omitted
312 # This really needs to be in place for it to be a proxy certificate.
/trunk/main/xmlsecurity/test_docs/CAs/Sub_CA_2_Root_7/
H A Dopenssl.cfg158 # we can do this but it is not needed normally :-)
235 # Key usage: this is typical for a CA certificate. However since it will
236 # prevent it being used as an test self-signed certificate it is best
265 # This goes against PKIX guidelines but some CAs do it and some software
270 # Here are some examples of the usage of nsCertType. If it is omitted
312 # This really needs to be in place for it to be a proxy certificate.
/trunk/main/xmlsecurity/test_docs/CAs/Sub_CA_2_Root_8/
H A Dopenssl.cfg158 # we can do this but it is not needed normally :-)
235 # Key usage: this is typical for a CA certificate. However since it will
236 # prevent it being used as an test self-signed certificate it is best
265 # This goes against PKIX guidelines but some CAs do it and some software
270 # Here are some examples of the usage of nsCertType. If it is omitted
312 # This really needs to be in place for it to be a proxy certificate.
/trunk/main/xmlsecurity/test_docs/CAs/Sub_CA_1_Root_10/
H A Dopenssl.cfg158 # we can do this but it is not needed normally :-)
236 # Key usage: this is typical for a CA certificate. However since it will
237 # prevent it being used as an test self-signed certificate it is best
266 # This goes against PKIX guidelines but some CAs do it and some software
271 # Here are some examples of the usage of nsCertType. If it is omitted
313 # This really needs to be in place for it to be a proxy certificate.
/trunk/main/xmlsecurity/test_docs/CAs/Sub_CA_1_Root_2/
H A Dopenssl.cfg158 # we can do this but it is not needed normally :-)
235 # Key usage: this is typical for a CA certificate. However since it will
236 # prevent it being used as an test self-signed certificate it is best
265 # This goes against PKIX guidelines but some CAs do it and some software
270 # Here are some examples of the usage of nsCertType. If it is omitted
312 # This really needs to be in place for it to be a proxy certificate.
/trunk/main/xmlsecurity/test_docs/CAs/Sub_CA_1_Root_3/
H A Dopenssl.cfg158 # we can do this but it is not needed normally :-)
235 # Key usage: this is typical for a CA certificate. However since it will
236 # prevent it being used as an test self-signed certificate it is best
265 # This goes against PKIX guidelines but some CAs do it and some software
270 # Here are some examples of the usage of nsCertType. If it is omitted
312 # This really needs to be in place for it to be a proxy certificate.
/trunk/main/xmlsecurity/test_docs/CAs/Sub_CA_1_Root_4/
H A Dopenssl.cfg158 # we can do this but it is not needed normally :-)
235 # Key usage: this is typical for a CA certificate. However since it will
236 # prevent it being used as an test self-signed certificate it is best
265 # This goes against PKIX guidelines but some CAs do it and some software
270 # Here are some examples of the usage of nsCertType. If it is omitted
312 # This really needs to be in place for it to be a proxy certificate.
/trunk/main/xmlsecurity/test_docs/CAs/Sub_CA_1_Root_5/
H A Dopenssl.cfg158 # we can do this but it is not needed normally :-)
235 # Key usage: this is typical for a CA certificate. However since it will
236 # prevent it being used as an test self-signed certificate it is best
265 # This goes against PKIX guidelines but some CAs do it and some software
270 # Here are some examples of the usage of nsCertType. If it is omitted
312 # This really needs to be in place for it to be a proxy certificate.
/trunk/main/xmlsecurity/test_docs/CAs/Sub_CA_1_Root_6/
H A Dopenssl.cfg158 # we can do this but it is not needed normally :-)
235 # Key usage: this is typical for a CA certificate. However since it will
236 # prevent it being used as an test self-signed certificate it is best
265 # This goes against PKIX guidelines but some CAs do it and some software
270 # Here are some examples of the usage of nsCertType. If it is omitted
312 # This really needs to be in place for it to be a proxy certificate.
/trunk/main/xmlsecurity/test_docs/CAs/Root_4/
H A Dopenssl.cfg158 # we can do this but it is not needed normally :-)
235 # Key usage: this is typical for a CA certificate. However since it will
236 # prevent it being used as an test self-signed certificate it is best
265 # This goes against PKIX guidelines but some CAs do it and some software
270 # Here are some examples of the usage of nsCertType. If it is omitted
312 # This really needs to be in place for it to be a proxy certificate.
/trunk/main/xmlsecurity/test_docs/CAs/Root_5/
H A Dopenssl.cfg158 # we can do this but it is not needed normally :-)
235 # Key usage: this is typical for a CA certificate. However since it will
236 # prevent it being used as an test self-signed certificate it is best
265 # This goes against PKIX guidelines but some CAs do it and some software
270 # Here are some examples of the usage of nsCertType. If it is omitted
312 # This really needs to be in place for it to be a proxy certificate.
/trunk/main/xmlsecurity/test_docs/CAs/Root_6/
H A Dopenssl.cfg158 # we can do this but it is not needed normally :-)
235 # Key usage: this is typical for a CA certificate. However since it will
236 # prevent it being used as an test self-signed certificate it is best
265 # This goes against PKIX guidelines but some CAs do it and some software
270 # Here are some examples of the usage of nsCertType. If it is omitted
312 # This really needs to be in place for it to be a proxy certificate.
/trunk/main/xmlsecurity/test_docs/CAs/Root_7/
H A Dopenssl.cfg158 # we can do this but it is not needed normally :-)
235 # Key usage: this is typical for a CA certificate. However since it will
236 # prevent it being used as an test self-signed certificate it is best
265 # This goes against PKIX guidelines but some CAs do it and some software
270 # Here are some examples of the usage of nsCertType. If it is omitted
312 # This really needs to be in place for it to be a proxy certificate.
/trunk/main/xmlsecurity/test_docs/CAs/Root_8/
H A Dopenssl.cfg158 # we can do this but it is not needed normally :-)
235 # Key usage: this is typical for a CA certificate. However since it will
236 # prevent it being used as an test self-signed certificate it is best
265 # This goes against PKIX guidelines but some CAs do it and some software
270 # Here are some examples of the usage of nsCertType. If it is omitted
312 # This really needs to be in place for it to be a proxy certificate.
/trunk/main/xmlsecurity/test_docs/CAs/Root_9/
H A Dopenssl.cfg158 # we can do this but it is not needed normally :-)
235 # Key usage: this is typical for a CA certificate. However since it will
236 # prevent it being used as an test self-signed certificate it is best
265 # This goes against PKIX guidelines but some CAs do it and some software
270 # Here are some examples of the usage of nsCertType. If it is omitted
312 # This really needs to be in place for it to be a proxy certificate.
/trunk/main/xmlsecurity/test_docs/CAs/Sub_CA_1_Root_1/
H A Dopenssl.cfg158 # we can do this but it is not needed normally :-)
235 # Key usage: this is typical for a CA certificate. However since it will
236 # prevent it being used as an test self-signed certificate it is best
265 # This goes against PKIX guidelines but some CAs do it and some software
270 # Here are some examples of the usage of nsCertType. If it is omitted
312 # This really needs to be in place for it to be a proxy certificate.

Completed in 66 milliseconds

1...<<11121314151617181920>>...75