Home
last modified time | relevance | path

Searched refs:cafile (Results 1 – 25 of 37) sorted by relevance

12

/third_party/node/deps/npm/test/tap/
Dconfig-certfile.js9 var cafile = path.join(__dirname, '..', 'fixtures', 'config', 'multi-ca')
11 npmconf.load({cafile: cafile}, function (er, conf) { property
14 t.same(conf.get('cafile'), cafile)
15 var ca = fs.readFileSync(cafile, 'utf8').trim()
/third_party/node/deps/npm/node_modules/node-gyp/test/
Dtest-download.js55 var cafile = path.join(__dirname, '/fixtures/ca.crt')
56 var ca = install.test.readCAFile(cafile)
75 opts: { cafile: cafile }, property
191 opts: { cafile: 'no.such.file' } property
/third_party/libcoap/man/
Dcoap-server.txt.in26 [[*-c* certfile] [*-j* keyfile] [*-n*] [*-C* cafile]
122 Note: if *-c cafile* is defined, you need to define *-k key* as well to
143 *Note:* If any one of *certfile*, *keyfile* or *cafile* is in PKCS11 URI
146 *certfile*, *keyfile* or *cafile* are in PEM format.
163 *-C* cafile::
169 *cafile* are added to the trusted store of root CAs. Using the *-C* or *-R*
179 only). *-C cafile* or *-R trust_casfile* are not required.
184 directory containing a set of CA PEM files. The *-C cafile* CA does not have
187 be done by using *-C cafile*. Using the *-C* or *-R* options will will
197 Note: *-c certfile* and *-C cafile* still needs to be defined for the
Dcoap-rd.txt.in23 [[*-c* certfile] [*-n*] [*-C* cafile] [*-R* trusted_casfile]]
68 *Note:* if *-c cafile* is defined, you need to define *-k key* as well to
85 *-C* cafile::
91 *cafile* are added to the trusted store of root CAs. Using the *-C* or *-R*
98 directory containing a set of CA PEM files. The *-C cafile* CA does not have
101 be done by using *-C cafile*. Using the *-C* or *-R* options will will
Dcoap-client.txt.in27 [[*-c* certfile] [*-j* keyfile] [-n] [*-C* cafile]
187 *Note:* If any one of *certfile*, *keyfile* or *cafile* is in PKCS11 URI
190 *certfile*, *keyfile* or *cafile* are in PEM format.
204 *-C* cafile::
207 that mutual authentication can take place. The contents of cafile are added
217 only). *-C cafile* or *-R trust_casfile* are not required.
222 directory containing a set of CA PEM files. The *-C cafile* CA does not have
225 be done by using *-C cafile*. Using the *-C* or *-R* options will will
/third_party/openssl/test/
Dcms-examples.pl221 $cafile = "$cmsdir/CarlDSSSelf.pem" if $tlist =~ /dss/;
222 $cafile = "$cmsdir/CarlRSASelf.pem" if $tlist =~ /rsa/;
226 . " -CAfile $cafile"
/third_party/curl/tests/libtest/
Dlib678.c64 static int test_cert_blob(const char *url, const char *cafile) in test_cert_blob() argument
78 if(loadfile(cafile, &certdata, &certsize)) { in test_cert_blob()
/third_party/node/deps/npm/node_modules/node-gyp/lib/
Dinstall.js408 var cafile = gyp.opts.cafile
409 if (cafile) {
410 requestOpts.ca = readCAFile(cafile)
Dnode-gyp.js62 cafile: String, // 'install' property
/third_party/python/Lib/
Dssl.py443 cafile = os.environ.get(parts[0], parts[1])
446 return DefaultVerifyPaths(cafile if os.path.isfile(cafile) else None,
740 def create_default_context(purpose=Purpose.SERVER_AUTH, *, cafile=None, argument
764 if cafile or capath or cadata:
765 context.load_verify_locations(cafile, capath, cadata)
781 cafile=None, capath=None, cadata=None): argument
818 if cafile or capath or cadata:
819 context.load_verify_locations(cafile, capath, cadata)
1521 cafile=ca_certs)
/third_party/node/deps/npm/lib/config/
Dcore.js176 var cafile = conf.get('cafile')
178 if (cafile) {
179 return conf.loadCAFile(cafile, finalize)
Ddefaults.js121 cafile: null, property
272 cafile: path, property
/third_party/python/Lib/test/
Dtest_urllib2_localnet.py564 context = ssl.create_default_context(cafile=CERT_localhost)
573 cafile=CERT_localhost)
578 cafile=CERT_fakehostname)
583 cafile=CERT_fakehostname)
605 context = ssl.create_default_context(cafile=CERT_localhost)
Dtest_ssl.py935 self.assertEqual(paths.cafile, CERTFILE)
1440 ctx.load_verify_locations(cafile=CERTFILE, capath=None)
1442 ctx.load_verify_locations(cafile=BYTES_CERTFILE, capath=None)
1698 ctx = ssl.create_default_context(cafile=SIGNING_CA, capath=CAPATH,
3541 context = ssl.create_default_context(cafile=SIGNING_CA)
/third_party/libsoup/tests/
Dtest-utils.c248 char *cafile; in soup_test_session_new() local
259 cafile = g_test_build_filename (G_TEST_DIST, "test-cert.pem", NULL); in soup_test_session_new()
260 abs_cafile = g_canonicalize_filename (cafile, NULL); in soup_test_session_new()
261 g_free (cafile); in soup_test_session_new()
/third_party/curl/lib/vtls/
Dnss.c1658 const char *cafile = SSL_CONN_CONFIG(CAfile); in nss_load_ca_certificates() local
1664 if(cafile && !cafile[0]) in nss_load_ca_certificates()
1665 cafile = NULL; in nss_load_ca_certificates()
1669 infof(data, " CAfile: %s", cafile ? cafile : "none"); in nss_load_ca_certificates()
1673 use_trust_module = !cafile && !capath; in nss_load_ca_certificates()
1693 if(cafile) in nss_load_ca_certificates()
1694 result = nss_load_cert(&conn->ssl[sockindex], cafile, PR_TRUE); in nss_load_ca_certificates()
Dsectransp.c2390 static CURLcode verify_cert(struct Curl_easy *data, const char *cafile, argument
2407 else if(cafile) {
2408 if(read_cert(cafile, &certbuf, &buflen) < 0) {
/third_party/mbedtls/tests/scripts/
Dgenerate_tls13_compat_tests.py255 cafile=CERTIFICATES[self._sig_algs[0]].cafile)]
/third_party/python/Modules/clinic/
D_ssl.c.h573 PyObject *cafile,
585 PyObject *cafile = Py_None; in _ssl__SSLContext_load_verify_locations() local
597 cafile = args[0]; in _ssl__SSLContext_load_verify_locations()
610 return_value = _ssl__SSLContext_load_verify_locations_impl(self, cafile, capath, cadata); in _ssl__SSLContext_load_verify_locations()
/third_party/node/deps/npm/node_modules/node-gyp/
DREADME.md199 | `--cafile=$cafile` | Override default CA chain (to download tarball)
/third_party/python/Modules/
D_ssl.c4013 PyObject *cafile, in _ssl__SSLContext_load_verify_locations_impl() argument
4023 if (cafile == Py_None) in _ssl__SSLContext_load_verify_locations_impl()
4024 cafile = NULL; in _ssl__SSLContext_load_verify_locations_impl()
4030 if (cafile == NULL && capath == NULL && cadata == NULL) { in _ssl__SSLContext_load_verify_locations_impl()
4035 if (cafile && !PyUnicode_FSConverter(cafile, &cafile_bytes)) { in _ssl__SSLContext_load_verify_locations_impl()
4097 if (cafile || capath) { in _ssl__SSLContext_load_verify_locations_impl()
4098 if (cafile) in _ssl__SSLContext_load_verify_locations_impl()
/third_party/python/Lib/urllib/
Drequest.py140 *, cafile=None, capath=None, cadefault=False, context=None): argument
191 if cafile or capath or cadefault:
203 cafile=cafile,
/third_party/python/Doc/library/
Dssl.rst128 .. function:: create_default_context(purpose=Purpose.SERVER_AUTH, cafile=None, capath=None, cadata=…
135 *cafile*, *capath*, *cadata* represent optional CA certificates to
146 and either loads CA certificates (when at least one of *cafile*, *capath* or
465 Returns a named tuple with paths to OpenSSL's default cafile and capath.
470 * :attr:`cafile` - resolved path to cafile or ``None`` if the file doesn't exist,
472 * :attr:`openssl_cafile_env` - OpenSSL's environment key that points to a cafile,
473 * :attr:`openssl_cafile` - hard coded path to a cafile,
1591 .. method:: SSLContext.load_verify_locations(cafile=None, capath=None, cadata=None)
1595 :data:`CERT_NONE`. At least one of *cafile* or *capath* must be specified.
1601 The *cafile* string, if present, is the path to a file of concatenated
Durllib.request.rst28 .. function:: urlopen(url, data=None[, timeout], *, cafile=None, capath=None, cadefault=False, cont…
49 The optional *cafile* and *capath* parameters specify a set of trusted
50 CA certificates for HTTPS requests. *cafile* should point to a single
97 *cafile* and *capath* were added.
119 *cafile*, *capath* and *cadefault* are deprecated in favor of *context*.
/third_party/python/Lib/test/test_asyncio/
Dtest_events.py607 cafile=None, capath=None, argument
1061 cafile=test_utils.SIGNING_CA)
1091 sslcontext_client.load_verify_locations(cafile=test_utils.SIGNING_CA)
1117 sslcontext_client.load_verify_locations(cafile=test_utils.SIGNING_CA)

12