Home
last modified time | relevance | path

Searched refs:ca_certs (Results 1 – 23 of 23) sorted by relevance

/external/python/httplib2/tests/
Dtest_https.py11 http = httplib2.Http(ca_certs=tests.CA_CERTS)
18 http = httplib2.Http(ca_certs=tests.CA_CERTS)
39 http = httplib2.Http(ca_certs=tests.CA_CERTS)
54 http = httplib2.Http(ca_certs="/nosuchfile")
63 http = httplib2.Http(ca_certs=tests.CA_UNUSED_CERTS)
120 http = httplib2.Http(ca_certs=tests.CA_CERTS, tls_minimum_version="TLSv1_2")
134 http = httplib2.Http(ca_certs=tests.CA_CERTS, tls_maximum_version="TLSv1")
153 http = httplib2.Http(ca_certs=tests.CA_CERTS)
176 http = httplib2.Http(ca_certs=tests.CA_CERTS)
199 http = httplib2.Http(ca_certs=tests.CA_CERTS)
Dtest_proxy.py205 http = httplib2.Http(ca_certs=tests.CA_CERTS)
/external/boringssl/src/crypto/pkcs8/
Dpkcs12_test.cc1521 STACK_OF(X509) *ca_certs = nullptr; in TestCompat()
1522 ASSERT_TRUE(PKCS12_parse(p12.get(), kPassword, &key, &cert, &ca_certs)); in TestCompat()
1526 bssl::UniquePtr<STACK_OF(X509)> delete_ca_certs(ca_certs); in TestCompat()
1530 ASSERT_EQ(0u, sk_X509_num(ca_certs)); in TestCompat()
1904 STACK_OF(X509) *ca_certs = nullptr; in ExpectPKCS12Parse()
1905 ASSERT_TRUE(PKCS12_parse(p12.get(), kPassword, &key, &cert, &ca_certs)); in ExpectPKCS12Parse()
1909 bssl::UniquePtr<STACK_OF(X509)> delete_ca_certs(ca_certs); in ExpectPKCS12Parse()
1925 ASSERT_EQ(expect_ca_certs.size(), sk_X509_num(ca_certs)); in ExpectPKCS12Parse()
1927 EXPECT_EQ(0, X509_cmp(expect_ca_certs[i], sk_X509_value(ca_certs, i))); in ExpectPKCS12Parse()
Dpkcs8_x509.c920 STACK_OF(X509) *ca_certs = NULL; in PKCS12_parse()
924 ca_certs = *out_ca_certs; in PKCS12_parse()
927 if (!ca_certs) { in PKCS12_parse()
928 ca_certs = sk_X509_new_null(); in PKCS12_parse()
929 if (ca_certs == NULL) { in PKCS12_parse()
937 if (!PKCS12_get_key_and_certs(out_pkey, ca_certs, &ber_bytes, password)) { in PKCS12_parse()
939 sk_X509_free(ca_certs); in PKCS12_parse()
952 size_t num_certs = sk_X509_num(ca_certs); in PKCS12_parse()
955 X509 *cert = sk_X509_value(ca_certs, i); in PKCS12_parse()
958 sk_X509_delete(ca_certs, i); in PKCS12_parse()
[all …]
/external/rust/crates/quiche/deps/boringssl/src/crypto/pkcs8/
Dpkcs12_test.cc1521 STACK_OF(X509) *ca_certs = nullptr; in TestCompat()
1522 ASSERT_TRUE(PKCS12_parse(p12.get(), kPassword, &key, &cert, &ca_certs)); in TestCompat()
1526 bssl::UniquePtr<STACK_OF(X509)> delete_ca_certs(ca_certs); in TestCompat()
1530 ASSERT_EQ(0u, sk_X509_num(ca_certs)); in TestCompat()
1904 STACK_OF(X509) *ca_certs = nullptr; in ExpectPKCS12Parse()
1905 ASSERT_TRUE(PKCS12_parse(p12.get(), kPassword, &key, &cert, &ca_certs)); in ExpectPKCS12Parse()
1909 bssl::UniquePtr<STACK_OF(X509)> delete_ca_certs(ca_certs); in ExpectPKCS12Parse()
1925 ASSERT_EQ(expect_ca_certs.size(), sk_X509_num(ca_certs)); in ExpectPKCS12Parse()
1927 EXPECT_EQ(0, X509_cmp(expect_ca_certs[i], sk_X509_value(ca_certs, i))); in ExpectPKCS12Parse()
Dpkcs8_x509.c889 STACK_OF(X509) *ca_certs = NULL; in PKCS12_parse()
893 ca_certs = *out_ca_certs; in PKCS12_parse()
896 if (!ca_certs) { in PKCS12_parse()
897 ca_certs = sk_X509_new_null(); in PKCS12_parse()
898 if (ca_certs == NULL) { in PKCS12_parse()
906 if (!PKCS12_get_key_and_certs(out_pkey, ca_certs, &ber_bytes, password)) { in PKCS12_parse()
908 sk_X509_free(ca_certs); in PKCS12_parse()
921 size_t num_certs = sk_X509_num(ca_certs); in PKCS12_parse()
924 X509 *cert = sk_X509_value(ca_certs, i); in PKCS12_parse()
927 sk_X509_delete(ca_certs, i); in PKCS12_parse()
[all …]
/external/python/cpython2/Lib/
Dssl.py537 ssl_version=PROTOCOL_TLS, ca_certs=None, argument
557 if ca_certs:
558 self._context.load_verify_locations(ca_certs)
569 self.ca_certs = ca_certs
939 ssl_version=PROTOCOL_TLS, ca_certs=None, argument
946 ssl_version=ssl_version, ca_certs=ca_certs,
1008 def get_server_certificate(addr, ssl_version=PROTOCOL_TLS, ca_certs=None): argument
1015 if ca_certs is not None:
1021 cafile=ca_certs)
/external/python/httplib2/python2/httplib2/
D__init__.py79 sock, key_file, cert_file, disable_validation, ca_certs, ssl_version, hostname, key_password argument
97 if ca_certs:
98 context.load_verify_locations(ca_certs)
108 ca_certs=ca_certs,
114 sock, key_file, cert_file, disable_validation, ca_certs, ssl_version, hostname, key_password argument
1273 ca_certs=None, argument
1291 if ca_certs is None:
1292 ca_certs = CA_CERTS
1293 self.ca_certs = ca_certs
1396 self.ca_certs,
[all …]
/external/python/httplib2/python2/
Dssl_protocol_test.py13 http = httplib2.Http(ca_certs="/nosuchfile")
29 http = httplib2.Http(ca_certs=other_ca_certs)
/external/python/httplib2/python2/httplib2/test/
Dtest_ssl_context.py49 client = httplib2.Http(ca_certs=self.ca_certs_path)
75 http = httplib2.Http(ca_certs=self.ca_certs_path, proxy_info=None)
/external/python/httplib2/python3/httplib2/
D__init__.py184 disable_ssl_certificate_validation, ca_certs, cert_file=None, key_file=None, argument
214 context.load_verify_locations(ca_certs)
1256 ca_certs=None, argument
1264 self.ca_certs = ca_certs if ca_certs else CA_CERTS
1271 self.disable_ssl_certificate_validation, self.ca_certs, cert_file, key_file,
1420 ca_certs=None, argument
1452 self.ca_certs = ca_certs
1813 ca_certs=self.ca_certs,
1824 ca_certs=self.ca_certs,
/external/python/cpython3/Lib/
Dssl.py1387 ssl_version=PROTOCOL_TLS, ca_certs=None, argument
1399 if ca_certs:
1400 context.load_verify_locations(ca_certs)
1469 def get_server_certificate(addr, ssl_version=PROTOCOL_TLS, ca_certs=None): argument
1476 if ca_certs is not None:
1482 cafile=ca_certs)
/external/python/asn1crypto/docs/
Dpem.md58 with open('/path/to/ca_certs', 'rb') as f:
/external/python/setuptools/setuptools/
Dssl_support.py195 sock, cert_reqs=ssl.CERT_REQUIRED, ca_certs=self.ca_bundle
/external/python/cpython2/Lib/test/
Dtest_ssl.py1360 ca_certs=REMOTE_ROOT_CERT)
1372 ca_certs=REMOTE_ROOT_CERT)
1385 ca_certs=REMOTE_ROOT_CERT,
1414 ca_certs=REMOTE_ROOT_CERT,
1429 ca_certs=REMOTE_ROOT_CERT)
1575 ca_certs=CERTFILE)
1583 ca_certs=cert)
2552 ca_certs=CERTFILE,
2857 ca_certs=CERTFILE,
2882 ca_certs=CERTFILE,
/external/scapy/scapy/layers/tls/
Dcert.py916 ca_certs = f.read()
921 anchors = [Cert(c) for c in split_pem(ca_certs)]
/external/python/cpython3/Lib/test/
Dtest_ssl.py288 cert_reqs=ssl.CERT_NONE, ca_certs=None, argument
296 if ca_certs is not None:
297 context.load_verify_locations(ca_certs)
1943 ca_certs=SIGNING_CA) as s:
1962 ca_certs=SIGNING_CA)
1972 ca_certs=SIGNING_CA,
2272 pem = ssl.get_server_certificate((host, port), ca_certs=cert)
2280 pem = ssl.get_server_certificate((host, port), ca_certs=CERTFILE)
3468 ca_certs=CERTFILE,
3621 ca_certs=CERTFILE,
/external/python/httplib2/doc/html/_sources/
Dlibhttplib2.txt196 .. class:: Http([cache=None], [timeout=None], [proxy_info==ProxyInfo.from_environment], [ca_certs=N…
201 is the socket level timeout. The *ca_certs* parameter is the filename of the
/external/python/httplib2/doc/
Dlibhttplib2.rst196 .. class:: Http([cache=None], [timeout=None], [proxy_info==ProxyInfo.from_environment], [ca_certs=N…
201 is the socket level timeout. The *ca_certs* parameter is the filename of the
/external/python/cpython2/Doc/library/
Dssl.rst144 …e=None, server_side=False, cert_reqs=CERT_NONE, ssl_version={see docs}, ca_certs=None, do_handshak…
172 value of this parameter is not :const:`CERT_NONE`, then the ``ca_certs``
175 The ``ca_certs`` file contains a set of concatenated "certification
431 .. function:: get_server_certificate(addr, ssl_version=PROTOCOL_SSLv23, ca_certs=None)
436 the SSL protocol to attempt to connect to the server. If ``ca_certs`` is
539 value of the ``ca_certs`` parameter to :func:`wrap_socket`.
550 value of the ``ca_certs`` parameter to :func:`wrap_socket`.
/external/python/httplib2/
DCHANGELOG93 ca_certs from environment HTTPLIB2_CA_CERTS or certifi
/external/python/httplib2/python3/
Dhttplib2test.py615 http = httplib2.Http(ca_certs="/nosuchfile")
627 http = httplib2.Http(ca_certs=other_ca_certs)
/external/python/cpython3/Doc/library/
Dssl.rst428 .. function:: get_server_certificate(addr, ssl_version=PROTOCOL_TLS, ca_certs=None)
433 the SSL protocol to attempt to connect to the server. If ``ca_certs`` is
516 ca_certs=None, do_handshake_on_connect=True, \
526 parameters *keyfile*, *certfile*, *ca_certs* or *ciphers* are set, then
577 value of the ``ca_certs`` parameter to :func:`wrap_socket`.
597 value of the ``ca_certs`` parameter to :func:`wrap_socket`.