/external/python/httplib2/tests/ |
D | test_https.py | 11 http = httplib2.Http(ca_certs=tests.CA_CERTS) 18 http = httplib2.Http(ca_certs=tests.CA_CERTS) 39 http = httplib2.Http(ca_certs=tests.CA_CERTS) 54 http = httplib2.Http(ca_certs="/nosuchfile") 63 http = httplib2.Http(ca_certs=tests.CA_UNUSED_CERTS) 120 http = httplib2.Http(ca_certs=tests.CA_CERTS, tls_minimum_version="TLSv1_2") 134 http = httplib2.Http(ca_certs=tests.CA_CERTS, tls_maximum_version="TLSv1") 153 http = httplib2.Http(ca_certs=tests.CA_CERTS) 176 http = httplib2.Http(ca_certs=tests.CA_CERTS) 199 http = httplib2.Http(ca_certs=tests.CA_CERTS)
|
D | test_proxy.py | 205 http = httplib2.Http(ca_certs=tests.CA_CERTS)
|
/external/boringssl/src/crypto/pkcs8/ |
D | pkcs12_test.cc | 1521 STACK_OF(X509) *ca_certs = nullptr; in TestCompat() 1522 ASSERT_TRUE(PKCS12_parse(p12.get(), kPassword, &key, &cert, &ca_certs)); in TestCompat() 1526 bssl::UniquePtr<STACK_OF(X509)> delete_ca_certs(ca_certs); in TestCompat() 1530 ASSERT_EQ(0u, sk_X509_num(ca_certs)); in TestCompat() 1904 STACK_OF(X509) *ca_certs = nullptr; in ExpectPKCS12Parse() 1905 ASSERT_TRUE(PKCS12_parse(p12.get(), kPassword, &key, &cert, &ca_certs)); in ExpectPKCS12Parse() 1909 bssl::UniquePtr<STACK_OF(X509)> delete_ca_certs(ca_certs); in ExpectPKCS12Parse() 1925 ASSERT_EQ(expect_ca_certs.size(), sk_X509_num(ca_certs)); in ExpectPKCS12Parse() 1927 EXPECT_EQ(0, X509_cmp(expect_ca_certs[i], sk_X509_value(ca_certs, i))); in ExpectPKCS12Parse()
|
D | pkcs8_x509.c | 920 STACK_OF(X509) *ca_certs = NULL; in PKCS12_parse() 924 ca_certs = *out_ca_certs; in PKCS12_parse() 927 if (!ca_certs) { in PKCS12_parse() 928 ca_certs = sk_X509_new_null(); in PKCS12_parse() 929 if (ca_certs == NULL) { in PKCS12_parse() 937 if (!PKCS12_get_key_and_certs(out_pkey, ca_certs, &ber_bytes, password)) { in PKCS12_parse() 939 sk_X509_free(ca_certs); in PKCS12_parse() 952 size_t num_certs = sk_X509_num(ca_certs); in PKCS12_parse() 955 X509 *cert = sk_X509_value(ca_certs, i); in PKCS12_parse() 958 sk_X509_delete(ca_certs, i); in PKCS12_parse() [all …]
|
/external/rust/crates/quiche/deps/boringssl/src/crypto/pkcs8/ |
D | pkcs12_test.cc | 1521 STACK_OF(X509) *ca_certs = nullptr; in TestCompat() 1522 ASSERT_TRUE(PKCS12_parse(p12.get(), kPassword, &key, &cert, &ca_certs)); in TestCompat() 1526 bssl::UniquePtr<STACK_OF(X509)> delete_ca_certs(ca_certs); in TestCompat() 1530 ASSERT_EQ(0u, sk_X509_num(ca_certs)); in TestCompat() 1904 STACK_OF(X509) *ca_certs = nullptr; in ExpectPKCS12Parse() 1905 ASSERT_TRUE(PKCS12_parse(p12.get(), kPassword, &key, &cert, &ca_certs)); in ExpectPKCS12Parse() 1909 bssl::UniquePtr<STACK_OF(X509)> delete_ca_certs(ca_certs); in ExpectPKCS12Parse() 1925 ASSERT_EQ(expect_ca_certs.size(), sk_X509_num(ca_certs)); in ExpectPKCS12Parse() 1927 EXPECT_EQ(0, X509_cmp(expect_ca_certs[i], sk_X509_value(ca_certs, i))); in ExpectPKCS12Parse()
|
D | pkcs8_x509.c | 889 STACK_OF(X509) *ca_certs = NULL; in PKCS12_parse() 893 ca_certs = *out_ca_certs; in PKCS12_parse() 896 if (!ca_certs) { in PKCS12_parse() 897 ca_certs = sk_X509_new_null(); in PKCS12_parse() 898 if (ca_certs == NULL) { in PKCS12_parse() 906 if (!PKCS12_get_key_and_certs(out_pkey, ca_certs, &ber_bytes, password)) { in PKCS12_parse() 908 sk_X509_free(ca_certs); in PKCS12_parse() 921 size_t num_certs = sk_X509_num(ca_certs); in PKCS12_parse() 924 X509 *cert = sk_X509_value(ca_certs, i); in PKCS12_parse() 927 sk_X509_delete(ca_certs, i); in PKCS12_parse() [all …]
|
/external/python/cpython2/Lib/ |
D | ssl.py | 537 ssl_version=PROTOCOL_TLS, ca_certs=None, argument 557 if ca_certs: 558 self._context.load_verify_locations(ca_certs) 569 self.ca_certs = ca_certs 939 ssl_version=PROTOCOL_TLS, ca_certs=None, argument 946 ssl_version=ssl_version, ca_certs=ca_certs, 1008 def get_server_certificate(addr, ssl_version=PROTOCOL_TLS, ca_certs=None): argument 1015 if ca_certs is not None: 1021 cafile=ca_certs)
|
/external/python/httplib2/python2/httplib2/ |
D | __init__.py | 79 sock, key_file, cert_file, disable_validation, ca_certs, ssl_version, hostname, key_password argument 97 if ca_certs: 98 context.load_verify_locations(ca_certs) 108 ca_certs=ca_certs, 114 sock, key_file, cert_file, disable_validation, ca_certs, ssl_version, hostname, key_password argument 1273 ca_certs=None, argument 1291 if ca_certs is None: 1292 ca_certs = CA_CERTS 1293 self.ca_certs = ca_certs 1396 self.ca_certs, [all …]
|
/external/python/httplib2/python2/ |
D | ssl_protocol_test.py | 13 http = httplib2.Http(ca_certs="/nosuchfile") 29 http = httplib2.Http(ca_certs=other_ca_certs)
|
/external/python/httplib2/python2/httplib2/test/ |
D | test_ssl_context.py | 49 client = httplib2.Http(ca_certs=self.ca_certs_path) 75 http = httplib2.Http(ca_certs=self.ca_certs_path, proxy_info=None)
|
/external/python/httplib2/python3/httplib2/ |
D | __init__.py | 184 disable_ssl_certificate_validation, ca_certs, cert_file=None, key_file=None, argument 214 context.load_verify_locations(ca_certs) 1256 ca_certs=None, argument 1264 self.ca_certs = ca_certs if ca_certs else CA_CERTS 1271 self.disable_ssl_certificate_validation, self.ca_certs, cert_file, key_file, 1420 ca_certs=None, argument 1452 self.ca_certs = ca_certs 1813 ca_certs=self.ca_certs, 1824 ca_certs=self.ca_certs,
|
/external/python/cpython3/Lib/ |
D | ssl.py | 1387 ssl_version=PROTOCOL_TLS, ca_certs=None, argument 1399 if ca_certs: 1400 context.load_verify_locations(ca_certs) 1469 def get_server_certificate(addr, ssl_version=PROTOCOL_TLS, ca_certs=None): argument 1476 if ca_certs is not None: 1482 cafile=ca_certs)
|
/external/python/asn1crypto/docs/ |
D | pem.md | 58 with open('/path/to/ca_certs', 'rb') as f:
|
/external/python/setuptools/setuptools/ |
D | ssl_support.py | 195 sock, cert_reqs=ssl.CERT_REQUIRED, ca_certs=self.ca_bundle
|
/external/python/cpython2/Lib/test/ |
D | test_ssl.py | 1360 ca_certs=REMOTE_ROOT_CERT) 1372 ca_certs=REMOTE_ROOT_CERT) 1385 ca_certs=REMOTE_ROOT_CERT, 1414 ca_certs=REMOTE_ROOT_CERT, 1429 ca_certs=REMOTE_ROOT_CERT) 1575 ca_certs=CERTFILE) 1583 ca_certs=cert) 2552 ca_certs=CERTFILE, 2857 ca_certs=CERTFILE, 2882 ca_certs=CERTFILE,
|
/external/scapy/scapy/layers/tls/ |
D | cert.py | 916 ca_certs = f.read() 921 anchors = [Cert(c) for c in split_pem(ca_certs)]
|
/external/python/cpython3/Lib/test/ |
D | test_ssl.py | 288 cert_reqs=ssl.CERT_NONE, ca_certs=None, argument 296 if ca_certs is not None: 297 context.load_verify_locations(ca_certs) 1943 ca_certs=SIGNING_CA) as s: 1962 ca_certs=SIGNING_CA) 1972 ca_certs=SIGNING_CA, 2272 pem = ssl.get_server_certificate((host, port), ca_certs=cert) 2280 pem = ssl.get_server_certificate((host, port), ca_certs=CERTFILE) 3468 ca_certs=CERTFILE, 3621 ca_certs=CERTFILE,
|
/external/python/httplib2/doc/html/_sources/ |
D | libhttplib2.txt | 196 .. class:: Http([cache=None], [timeout=None], [proxy_info==ProxyInfo.from_environment], [ca_certs=N… 201 is the socket level timeout. The *ca_certs* parameter is the filename of the
|
/external/python/httplib2/doc/ |
D | libhttplib2.rst | 196 .. class:: Http([cache=None], [timeout=None], [proxy_info==ProxyInfo.from_environment], [ca_certs=N… 201 is the socket level timeout. The *ca_certs* parameter is the filename of the
|
/external/python/cpython2/Doc/library/ |
D | ssl.rst | 144 …e=None, server_side=False, cert_reqs=CERT_NONE, ssl_version={see docs}, ca_certs=None, do_handshak… 172 value of this parameter is not :const:`CERT_NONE`, then the ``ca_certs`` 175 The ``ca_certs`` file contains a set of concatenated "certification 431 .. function:: get_server_certificate(addr, ssl_version=PROTOCOL_SSLv23, ca_certs=None) 436 the SSL protocol to attempt to connect to the server. If ``ca_certs`` is 539 value of the ``ca_certs`` parameter to :func:`wrap_socket`. 550 value of the ``ca_certs`` parameter to :func:`wrap_socket`.
|
/external/python/httplib2/ |
D | CHANGELOG | 93 ca_certs from environment HTTPLIB2_CA_CERTS or certifi
|
/external/python/httplib2/python3/ |
D | httplib2test.py | 615 http = httplib2.Http(ca_certs="/nosuchfile") 627 http = httplib2.Http(ca_certs=other_ca_certs)
|
/external/python/cpython3/Doc/library/ |
D | ssl.rst | 428 .. function:: get_server_certificate(addr, ssl_version=PROTOCOL_TLS, ca_certs=None) 433 the SSL protocol to attempt to connect to the server. If ``ca_certs`` is 516 ca_certs=None, do_handshake_on_connect=True, \ 526 parameters *keyfile*, *certfile*, *ca_certs* or *ciphers* are set, then 577 value of the ``ca_certs`` parameter to :func:`wrap_socket`. 597 value of the ``ca_certs`` parameter to :func:`wrap_socket`.
|