Home
last modified time | relevance | path

Searched refs:cafile (Results 1 – 25 of 36) sorted by relevance

12

/third_party/node/deps/npm/test/tap/
Dconfig-certfile.js9 var cafile = path.join(__dirname, '..', 'fixtures', 'config', 'multi-ca')
11 npmconf.load({cafile: cafile}, function (er, conf) { property
14 t.same(conf.get('cafile'), cafile)
15 var ca = fs.readFileSync(cafile, 'utf8').trim()
/third_party/node/deps/npm/node_modules/node-gyp/test/
Dtest-download.js55 var cafile = path.join(__dirname, '/fixtures/ca.crt')
56 var ca = install.test.readCAFile(cafile)
75 opts: { cafile: cafile }, property
191 opts: { cafile: 'no.such.file' } property
/third_party/libcoap/man/
Dcoap-server.txt.in26 [[*-c* certfile] [*-j* keyfile] [*-n*] [*-C* cafile]
122 Note: if *-c cafile* is defined, you need to define *-k key* as well to
143 *Note:* If any one of *certfile*, *keyfile* or *cafile* is in PKCS11 URI
146 *certfile*, *keyfile* or *cafile* are in PEM format.
163 *-C* cafile::
169 *cafile* are added to the trusted store of root CAs. Using the *-C* or *-R*
179 only). *-C cafile* or *-R trust_casfile* are not required.
184 directory containing a set of CA PEM files. The *-C cafile* CA does not have
187 be done by using *-C cafile*. Using the *-C* or *-R* options will will
197 Note: *-c certfile* and *-C cafile* still needs to be defined for the
Dcoap-rd.txt.in23 [[*-c* certfile] [*-n*] [*-C* cafile] [*-R* trusted_casfile]]
68 *Note:* if *-c cafile* is defined, you need to define *-k key* as well to
85 *-C* cafile::
91 *cafile* are added to the trusted store of root CAs. Using the *-C* or *-R*
98 directory containing a set of CA PEM files. The *-C cafile* CA does not have
101 be done by using *-C cafile*. Using the *-C* or *-R* options will will
Dcoap-client.txt.in27 [[*-c* certfile] [*-j* keyfile] [-n] [*-C* cafile]
187 *Note:* If any one of *certfile*, *keyfile* or *cafile* is in PKCS11 URI
190 *certfile*, *keyfile* or *cafile* are in PEM format.
204 *-C* cafile::
207 that mutual authentication can take place. The contents of cafile are added
217 only). *-C cafile* or *-R trust_casfile* are not required.
222 directory containing a set of CA PEM files. The *-C cafile* CA does not have
225 be done by using *-C cafile*. Using the *-C* or *-R* options will will
/third_party/openssl/test/
Dcms-examples.pl221 $cafile = "$cmsdir/CarlDSSSelf.pem" if $tlist =~ /dss/;
222 $cafile = "$cmsdir/CarlRSASelf.pem" if $tlist =~ /rsa/;
226 . " -CAfile $cafile"
/third_party/curl/tests/libtest/
Dlib678.c64 static int test_cert_blob(const char *url, const char *cafile) in test_cert_blob() argument
78 if(loadfile(cafile, &certdata, &certsize)) { in test_cert_blob()
/third_party/python/Lib/
Dssl.py438 cafile = os.environ.get(parts[0], parts[1])
441 return DefaultVerifyPaths(cafile if os.path.isfile(cafile) else None,
723 def create_default_context(purpose=Purpose.SERVER_AUTH, *, cafile=None, argument
744 if cafile or capath or cadata:
745 context.load_verify_locations(cafile, capath, cadata)
761 cafile=None, capath=None, cadata=None): argument
790 if cafile or capath or cadata:
791 context.load_verify_locations(cafile, capath, cadata)
1482 cafile=ca_certs)
/third_party/node/deps/npm/node_modules/node-gyp/lib/
Dinstall.js408 var cafile = gyp.opts.cafile
409 if (cafile) {
410 requestOpts.ca = readCAFile(cafile)
Dnode-gyp.js62 cafile: String, // 'install' property
/third_party/node/deps/npm/lib/config/
Dcore.js176 var cafile = conf.get('cafile')
178 if (cafile) {
179 return conf.loadCAFile(cafile, finalize)
Ddefaults.js121 cafile: null, property
272 cafile: path, property
/third_party/python/Lib/test/
Dtest_urllib2_localnet.py563 context = ssl.create_default_context(cafile=CERT_localhost)
572 cafile=CERT_localhost)
577 cafile=CERT_fakehostname)
582 cafile=CERT_fakehostname)
604 context = ssl.create_default_context(cafile=CERT_localhost)
Dtest_ssl.py899 self.assertEqual(paths.cafile, CERTFILE)
1378 ctx.load_verify_locations(cafile=CERTFILE, capath=None)
1380 ctx.load_verify_locations(cafile=BYTES_CERTFILE, capath=None)
1634 ctx = ssl.create_default_context(cafile=SIGNING_CA, capath=CAPATH,
3410 context = ssl.create_default_context(cafile=SIGNING_CA)
Dtest_urllib.py604 "https://localhost", cafile="/nonexistent/path", context=context
/third_party/libsoup/tests/
Dtest-utils.c248 char *cafile; in soup_test_session_new() local
259 cafile = g_test_build_filename (G_TEST_DIST, "test-cert.pem", NULL); in soup_test_session_new()
260 abs_cafile = g_canonicalize_filename (cafile, NULL); in soup_test_session_new()
261 g_free (cafile); in soup_test_session_new()
/third_party/curl/lib/vtls/
Dnss.c1658 const char *cafile = SSL_CONN_CONFIG(CAfile); in nss_load_ca_certificates() local
1664 if(cafile && !cafile[0]) in nss_load_ca_certificates()
1665 cafile = NULL; in nss_load_ca_certificates()
1669 infof(data, " CAfile: %s", cafile ? cafile : "none"); in nss_load_ca_certificates()
1673 use_trust_module = !cafile && !capath; in nss_load_ca_certificates()
1693 if(cafile) in nss_load_ca_certificates()
1694 result = nss_load_cert(&conn->ssl[sockindex], cafile, PR_TRUE); in nss_load_ca_certificates()
Dsectransp.c2390 static CURLcode verify_cert(struct Curl_easy *data, const char *cafile, argument
2407 else if(cafile) {
2408 if(read_cert(cafile, &certbuf, &buflen) < 0) {
/third_party/python/Modules/clinic/
D_ssl.c.h609 PyObject *cafile,
621 PyObject *cafile = Py_None; in _ssl__SSLContext_load_verify_locations() local
633 cafile = args[0]; in _ssl__SSLContext_load_verify_locations()
646 return_value = _ssl__SSLContext_load_verify_locations_impl(self, cafile, capath, cadata); in _ssl__SSLContext_load_verify_locations()
/third_party/node/deps/npm/node_modules/node-gyp/
DREADME.md199 | `--cafile=$cafile` | Override default CA chain (to download tarball)
/third_party/python/Modules/
D_ssl.c4164 PyObject *cafile, in _ssl__SSLContext_load_verify_locations_impl() argument
4174 if (cafile == Py_None) in _ssl__SSLContext_load_verify_locations_impl()
4175 cafile = NULL; in _ssl__SSLContext_load_verify_locations_impl()
4181 if (cafile == NULL && capath == NULL && cadata == NULL) { in _ssl__SSLContext_load_verify_locations_impl()
4186 if (cafile && !PyUnicode_FSConverter(cafile, &cafile_bytes)) { in _ssl__SSLContext_load_verify_locations_impl()
4248 if (cafile || capath) { in _ssl__SSLContext_load_verify_locations_impl()
4249 if (cafile) in _ssl__SSLContext_load_verify_locations_impl()
/third_party/python/Lib/urllib/
Drequest.py140 *, cafile=None, capath=None, cadefault=False, context=None): argument
191 if cafile or capath or cadefault:
203 cafile=cafile,
/third_party/python/Doc/library/
Dssl.rst121 .. function:: create_default_context(purpose=Purpose.SERVER_AUTH, cafile=None, capath=None, cadata=…
128 *cafile*, *capath*, *cadata* represent optional CA certificates to
138 and either loads CA certificates (when at least one of *cafile*, *capath* or
459 Returns a named tuple with paths to OpenSSL's default cafile and capath.
464 * :attr:`cafile` - resolved path to cafile or ``None`` if the file doesn't exist,
466 * :attr:`openssl_cafile_env` - OpenSSL's environment key that points to a cafile,
467 * :attr:`openssl_cafile` - hard coded path to a cafile,
1529 .. method:: SSLContext.load_verify_locations(cafile=None, capath=None, cadata=None)
1533 :data:`CERT_NONE`. At least one of *cafile* or *capath* must be specified.
1539 The *cafile* string, if present, is the path to a file of concatenated
Durllib.request.rst28 .. function:: urlopen(url, data=None[, timeout], *, cafile=None, capath=None, cadefault=False, cont…
49 The optional *cafile* and *capath* parameters specify a set of trusted
50 CA certificates for HTTPS requests. *cafile* should point to a single
97 *cafile* and *capath* were added.
114 *cafile*, *capath* and *cadefault* are deprecated in favor of *context*.
/third_party/python/Lib/test/test_asyncio/
Dtest_events.py582 cafile=None, capath=None, argument
1036 cafile=test_utils.SIGNING_CA)
1066 sslcontext_client.load_verify_locations(cafile=test_utils.SIGNING_CA)
1092 sslcontext_client.load_verify_locations(cafile=test_utils.SIGNING_CA)

12