/third_party/node/deps/npm/test/tap/ |
D | config-certfile.js | 9 var cafile = path.join(__dirname, '..', 'fixtures', 'config', 'multi-ca') 11 npmconf.load({cafile: cafile}, function (er, conf) { property 14 t.same(conf.get('cafile'), cafile) 15 var ca = fs.readFileSync(cafile, 'utf8').trim()
|
/third_party/libcoap/man/ |
D | coap-server.txt.in | 26 [[*-c* certfile] [*-j* keyfile] [*-n*] [*-C* cafile] 122 Note: if *-c cafile* is defined, you need to define *-k key* as well to 143 *Note:* If any one of *certfile*, *keyfile* or *cafile* is in PKCS11 URI 146 *certfile*, *keyfile* or *cafile* are in PEM format. 163 *-C* cafile:: 169 *cafile* are added to the trusted store of root CAs. Using the *-C* or *-R* 179 only). *-C cafile* or *-R trust_casfile* are not required. 184 directory containing a set of CA PEM files. The *-C cafile* CA does not have 187 be done by using *-C cafile*. Using the *-C* or *-R* options will will 197 Note: *-c certfile* and *-C cafile* still needs to be defined for the
|
D | coap-rd.txt.in | 23 [[*-c* certfile] [*-n*] [*-C* cafile] [*-R* trusted_casfile]] 68 *Note:* if *-c cafile* is defined, you need to define *-k key* as well to 85 *-C* cafile:: 91 *cafile* are added to the trusted store of root CAs. Using the *-C* or *-R* 98 directory containing a set of CA PEM files. The *-C cafile* CA does not have 101 be done by using *-C cafile*. Using the *-C* or *-R* options will will
|
D | coap-client.txt.in | 27 [[*-c* certfile] [*-j* keyfile] [-n] [*-C* cafile] 187 *Note:* If any one of *certfile*, *keyfile* or *cafile* is in PKCS11 URI 190 *certfile*, *keyfile* or *cafile* are in PEM format. 204 *-C* cafile:: 207 that mutual authentication can take place. The contents of cafile are added 217 only). *-C cafile* or *-R trust_casfile* are not required. 222 directory containing a set of CA PEM files. The *-C cafile* CA does not have 225 be done by using *-C cafile*. Using the *-C* or *-R* options will will
|
/third_party/node/deps/npm/node_modules/node-gyp/test/ |
D | test-download.js | 55 var cafile = path.join(__dirname, '/fixtures/ca.crt') 56 var ca = install.test.readCAFile(cafile) 75 opts: { cafile: cafile }, property 191 opts: { cafile: 'no.such.file' } property
|
/third_party/openssl/test/ |
D | cms-examples.pl | 221 $cafile = "$cmsdir/CarlDSSSelf.pem" if $tlist =~ /dss/; 222 $cafile = "$cmsdir/CarlRSASelf.pem" if $tlist =~ /rsa/; 226 . " -CAfile $cafile"
|
/third_party/python/Lib/ |
D | ssl.py | 443 cafile = os.environ.get(parts[0], parts[1]) 446 return DefaultVerifyPaths(cafile if os.path.isfile(cafile) else None, 740 def create_default_context(purpose=Purpose.SERVER_AUTH, *, cafile=None, argument 764 if cafile or capath or cadata: 765 context.load_verify_locations(cafile, capath, cadata) 781 cafile=None, capath=None, cadata=None): argument 818 if cafile or capath or cadata: 819 context.load_verify_locations(cafile, capath, cadata) 1521 cafile=ca_certs)
|
/third_party/node/deps/npm/node_modules/node-gyp/lib/ |
D | install.js | 408 var cafile = gyp.opts.cafile 409 if (cafile) { 410 requestOpts.ca = readCAFile(cafile)
|
D | node-gyp.js | 62 cafile: String, // 'install' property
|
/third_party/openssl/test/recipes/ |
D | 80-test_tsa.t | 80 my $cafile = shift; 83 "-untrusted", $untrustedfile, "-CAfile", $cafile])));
|
/third_party/python/Lib/test/ |
D | test_urllib2_localnet.py | 564 context = ssl.create_default_context(cafile=CERT_localhost) 573 cafile=CERT_localhost) 578 cafile=CERT_fakehostname) 583 cafile=CERT_fakehostname) 605 context = ssl.create_default_context(cafile=CERT_localhost)
|
D | test_ssl.py | 935 self.assertEqual(paths.cafile, CERTFILE) 1440 ctx.load_verify_locations(cafile=CERTFILE, capath=None) 1442 ctx.load_verify_locations(cafile=BYTES_CERTFILE, capath=None) 1698 ctx = ssl.create_default_context(cafile=SIGNING_CA, capath=CAPATH, 3541 context = ssl.create_default_context(cafile=SIGNING_CA)
|
D | test_urllib.py | 606 "https://localhost", cafile="/nonexistent/path", context=context
|
/third_party/node/deps/npm/lib/config/ |
D | core.js | 176 var cafile = conf.get('cafile') 178 if (cafile) { 179 return conf.loadCAFile(cafile, finalize)
|
D | defaults.js | 121 cafile: null, property 272 cafile: path, property
|
/third_party/mbedtls/tests/scripts/ |
D | generate_tls13_compat_tests.py | 255 cafile=CERTIFICATES[self._sig_algs[0]].cafile)]
|
/third_party/openssl/doc/man1/ |
D | openssl-s_time.pod.in | 29 [B<-cafile> I<file>] 126 =item B<-cafile> I<file> 179 The B<-cafile> option was deprecated in OpenSSL 3.0.
|
/third_party/python/Modules/clinic/ |
D | _ssl.c.h | 573 PyObject *cafile, 585 PyObject *cafile = Py_None; in _ssl__SSLContext_load_verify_locations() local 597 cafile = args[0]; in _ssl__SSLContext_load_verify_locations() 610 return_value = _ssl__SSLContext_load_verify_locations_impl(self, cafile, capath, cadata); in _ssl__SSLContext_load_verify_locations()
|
/third_party/node/deps/npm/node_modules/node-gyp/ |
D | README.md | 199 | `--cafile=$cafile` | Override default CA chain (to download tarball)
|
/third_party/python/Modules/ |
D | _ssl.c | 4013 PyObject *cafile, in _ssl__SSLContext_load_verify_locations_impl() argument 4023 if (cafile == Py_None) in _ssl__SSLContext_load_verify_locations_impl() 4024 cafile = NULL; in _ssl__SSLContext_load_verify_locations_impl() 4030 if (cafile == NULL && capath == NULL && cadata == NULL) { in _ssl__SSLContext_load_verify_locations_impl() 4035 if (cafile && !PyUnicode_FSConverter(cafile, &cafile_bytes)) { in _ssl__SSLContext_load_verify_locations_impl() 4097 if (cafile || capath) { in _ssl__SSLContext_load_verify_locations_impl() 4098 if (cafile) in _ssl__SSLContext_load_verify_locations_impl()
|
/third_party/python/Lib/urllib/ |
D | request.py | 140 *, cafile=None, capath=None, cadefault=False, context=None): argument 191 if cafile or capath or cadefault: 203 cafile=cafile,
|
/third_party/python/Doc/library/ |
D | ssl.rst | 128 .. function:: create_default_context(purpose=Purpose.SERVER_AUTH, cafile=None, capath=None, cadata=… 135 *cafile*, *capath*, *cadata* represent optional CA certificates to 146 and either loads CA certificates (when at least one of *cafile*, *capath* or 465 Returns a named tuple with paths to OpenSSL's default cafile and capath. 470 * :attr:`cafile` - resolved path to cafile or ``None`` if the file doesn't exist, 472 * :attr:`openssl_cafile_env` - OpenSSL's environment key that points to a cafile, 473 * :attr:`openssl_cafile` - hard coded path to a cafile, 1591 .. method:: SSLContext.load_verify_locations(cafile=None, capath=None, cadata=None) 1595 :data:`CERT_NONE`. At least one of *cafile* or *capath* must be specified. 1601 The *cafile* string, if present, is the path to a file of concatenated
|
D | urllib.request.rst | 28 .. function:: urlopen(url, data=None[, timeout], *, cafile=None, capath=None, cadefault=False, cont… 49 The optional *cafile* and *capath* parameters specify a set of trusted 50 CA certificates for HTTPS requests. *cafile* should point to a single 97 *cafile* and *capath* were added. 119 *cafile*, *capath* and *cadefault* are deprecated in favor of *context*.
|
/third_party/python/Lib/test/test_asyncio/ |
D | test_events.py | 607 cafile=None, capath=None, argument 1061 cafile=test_utils.SIGNING_CA) 1091 sslcontext_client.load_verify_locations(cafile=test_utils.SIGNING_CA) 1117 sslcontext_client.load_verify_locations(cafile=test_utils.SIGNING_CA)
|
/third_party/node/deps/npm/docs/content/using-npm/ |
D | config.md | 259 #### cafile subsubsection
|