Home
last modified time | relevance | path

Searched refs:ca_certs (Results 1 – 25 of 30) sorted by relevance

12

/external/python/httplib2/tests/
Dtest_https.py11 http = httplib2.Http(ca_certs=tests.CA_CERTS)
18 http = httplib2.Http(ca_certs=tests.CA_CERTS)
39 http = httplib2.Http(ca_certs=tests.CA_CERTS)
54 http = httplib2.Http(ca_certs="/nosuchfile")
63 http = httplib2.Http(ca_certs=tests.CA_UNUSED_CERTS)
120 http = httplib2.Http(ca_certs=tests.CA_CERTS, tls_minimum_version="TLSv1_2")
134 http = httplib2.Http(ca_certs=tests.CA_CERTS, tls_maximum_version="TLSv1")
153 http = httplib2.Http(ca_certs=tests.CA_CERTS)
176 http = httplib2.Http(ca_certs=tests.CA_CERTS)
199 http = httplib2.Http(ca_certs=tests.CA_CERTS)
Dtest_proxy.py205 http = httplib2.Http(ca_certs=tests.CA_CERTS)
/external/cronet/third_party/boringssl/src/crypto/pkcs8/
Dpkcs12_test.cc83 STACK_OF(X509) *ca_certs = nullptr; in TestCompat()
84 ASSERT_TRUE(PKCS12_parse(p12.get(), kPassword, &key, &cert, &ca_certs)); in TestCompat()
88 bssl::UniquePtr<STACK_OF(X509)> delete_ca_certs(ca_certs); in TestCompat()
92 ASSERT_EQ(0u, sk_X509_num(ca_certs)); in TestCompat()
528 STACK_OF(X509) *ca_certs = nullptr; in ExpectPKCS12Parse()
529 ASSERT_TRUE(PKCS12_parse(p12.get(), kPassword, &key, &cert, &ca_certs)); in ExpectPKCS12Parse()
533 bssl::UniquePtr<STACK_OF(X509)> delete_ca_certs(ca_certs); in ExpectPKCS12Parse()
549 ASSERT_EQ(expect_ca_certs.size(), sk_X509_num(ca_certs)); in ExpectPKCS12Parse()
551 EXPECT_EQ(0, X509_cmp(expect_ca_certs[i], sk_X509_value(ca_certs, i))); in ExpectPKCS12Parse()
628 STACK_OF(X509) *ca_certs = nullptr; in TEST()
[all …]
Dpkcs8_x509.c873 STACK_OF(X509) *ca_certs = NULL; in PKCS12_parse()
877 ca_certs = *out_ca_certs; in PKCS12_parse()
880 if (!ca_certs) { in PKCS12_parse()
881 ca_certs = sk_X509_new_null(); in PKCS12_parse()
882 if (ca_certs == NULL) { in PKCS12_parse()
889 if (!PKCS12_get_key_and_certs(out_pkey, ca_certs, &ber_bytes, password)) { in PKCS12_parse()
891 sk_X509_free(ca_certs); in PKCS12_parse()
899 size_t num_certs = sk_X509_num(ca_certs); in PKCS12_parse()
902 X509 *cert = sk_X509_value(ca_certs, i); in PKCS12_parse()
905 sk_X509_delete(ca_certs, i); in PKCS12_parse()
[all …]
/external/boringssl/src/crypto/pkcs8/
Dpkcs12_test.cc83 STACK_OF(X509) *ca_certs = nullptr; in TestCompat()
84 ASSERT_TRUE(PKCS12_parse(p12.get(), kPassword, &key, &cert, &ca_certs)); in TestCompat()
88 bssl::UniquePtr<STACK_OF(X509)> delete_ca_certs(ca_certs); in TestCompat()
92 ASSERT_EQ(0u, sk_X509_num(ca_certs)); in TestCompat()
528 STACK_OF(X509) *ca_certs = nullptr; in ExpectPKCS12Parse()
529 ASSERT_TRUE(PKCS12_parse(p12.get(), kPassword, &key, &cert, &ca_certs)); in ExpectPKCS12Parse()
533 bssl::UniquePtr<STACK_OF(X509)> delete_ca_certs(ca_certs); in ExpectPKCS12Parse()
549 ASSERT_EQ(expect_ca_certs.size(), sk_X509_num(ca_certs)); in ExpectPKCS12Parse()
551 EXPECT_EQ(0, X509_cmp(expect_ca_certs[i], sk_X509_value(ca_certs, i))); in ExpectPKCS12Parse()
628 STACK_OF(X509) *ca_certs = nullptr; in TEST()
[all …]
Dpkcs8_x509.c873 STACK_OF(X509) *ca_certs = NULL; in PKCS12_parse()
877 ca_certs = *out_ca_certs; in PKCS12_parse()
880 if (!ca_certs) { in PKCS12_parse()
881 ca_certs = sk_X509_new_null(); in PKCS12_parse()
882 if (ca_certs == NULL) { in PKCS12_parse()
889 if (!PKCS12_get_key_and_certs(out_pkey, ca_certs, &ber_bytes, password)) { in PKCS12_parse()
891 sk_X509_free(ca_certs); in PKCS12_parse()
899 size_t num_certs = sk_X509_num(ca_certs); in PKCS12_parse()
902 X509 *cert = sk_X509_value(ca_certs, i); in PKCS12_parse()
905 sk_X509_delete(ca_certs, i); in PKCS12_parse()
[all …]
/external/cronet/net/cert/
Dnss_cert_database_unittest.cc827 ScopedCERTCertificateList ca_certs = CreateCERTCertificateListFromFile( in TEST_F() local
830 ASSERT_EQ(1U, ca_certs.size()); in TEST_F()
834 EXPECT_TRUE(cert_db_->ImportCACerts(ca_certs, NSSCertDatabase::TRUSTED_SSL, in TEST_F()
865 ScopedCERTCertificateList ca_certs = CreateCERTCertificateListFromFile( in TEST_F() local
868 ASSERT_EQ(1U, ca_certs.size()); in TEST_F()
872 EXPECT_TRUE(cert_db_->ImportCACerts(ca_certs, NSSCertDatabase::TRUSTED_SSL, in TEST_F()
908 ScopedCERTCertificateList ca_certs = CreateCERTCertificateListFromFile( in TEST_F() local
911 ASSERT_EQ(1U, ca_certs.size()); in TEST_F()
915 EXPECT_TRUE(cert_db_->ImportCACerts(ca_certs, NSSCertDatabase::DISTRUSTED_SSL, in TEST_F()
960 ca_certs[0].get(), CA_CERT, NSSCertDatabase::TRUSTED_SSL)); in TEST_F()
[all …]
/external/rust/crates/quiche/deps/boringssl/src/crypto/pkcs8/
Dpkcs12_test.cc83 STACK_OF(X509) *ca_certs = nullptr; in TestCompat()
84 ASSERT_TRUE(PKCS12_parse(p12.get(), kPassword, &key, &cert, &ca_certs)); in TestCompat()
88 bssl::UniquePtr<STACK_OF(X509)> delete_ca_certs(ca_certs); in TestCompat()
92 ASSERT_EQ(0u, sk_X509_num(ca_certs)); in TestCompat()
528 STACK_OF(X509) *ca_certs = nullptr; in ExpectPKCS12Parse()
529 ASSERT_TRUE(PKCS12_parse(p12.get(), kPassword, &key, &cert, &ca_certs)); in ExpectPKCS12Parse()
533 bssl::UniquePtr<STACK_OF(X509)> delete_ca_certs(ca_certs); in ExpectPKCS12Parse()
549 ASSERT_EQ(expect_ca_certs.size(), sk_X509_num(ca_certs)); in ExpectPKCS12Parse()
551 EXPECT_EQ(0, X509_cmp(expect_ca_certs[i], sk_X509_value(ca_certs, i))); in ExpectPKCS12Parse()
Dpkcs8_x509.c920 STACK_OF(X509) *ca_certs = NULL; in PKCS12_parse()
924 ca_certs = *out_ca_certs; in PKCS12_parse()
927 if (!ca_certs) { in PKCS12_parse()
928 ca_certs = sk_X509_new_null(); in PKCS12_parse()
929 if (ca_certs == NULL) { in PKCS12_parse()
937 if (!PKCS12_get_key_and_certs(out_pkey, ca_certs, &ber_bytes, password)) { in PKCS12_parse()
939 sk_X509_free(ca_certs); in PKCS12_parse()
947 size_t num_certs = sk_X509_num(ca_certs); in PKCS12_parse()
950 X509 *cert = sk_X509_value(ca_certs, i); in PKCS12_parse()
953 sk_X509_delete(ca_certs, i); in PKCS12_parse()
[all …]
/external/python/cpython2/Lib/
Dssl.py537 ssl_version=PROTOCOL_TLS, ca_certs=None, argument
557 if ca_certs:
558 self._context.load_verify_locations(ca_certs)
569 self.ca_certs = ca_certs
939 ssl_version=PROTOCOL_TLS, ca_certs=None, argument
946 ssl_version=ssl_version, ca_certs=ca_certs,
1008 def get_server_certificate(addr, ssl_version=PROTOCOL_TLS, ca_certs=None): argument
1015 if ca_certs is not None:
1021 cafile=ca_certs)
/external/python/httplib2/python2/httplib2/
D__init__.py79 sock, key_file, cert_file, disable_validation, ca_certs, ssl_version, hostname, key_password argument
97 if ca_certs:
98 context.load_verify_locations(ca_certs)
108 ca_certs=ca_certs,
114 sock, key_file, cert_file, disable_validation, ca_certs, ssl_version, hostname, key_password argument
1273 ca_certs=None, argument
1291 if ca_certs is None:
1292 ca_certs = CA_CERTS
1293 self.ca_certs = ca_certs
1396 self.ca_certs,
[all …]
/external/autotest/utils/frozen_chromite/third_party/python2/httplib2/
D__init__.py79 sock, key_file, cert_file, disable_validation, ca_certs, ssl_version, hostname argument
94 if ca_certs:
95 context.load_verify_locations(ca_certs)
103 ca_certs=ca_certs,
109 sock, key_file, cert_file, disable_validation, ca_certs, ssl_version, hostname argument
1253 ca_certs=None, argument
1262 if ca_certs is None:
1263 ca_certs = CA_CERTS
1264 self.ca_certs = ca_certs
1366 self.ca_certs,
[all …]
/external/autotest/utils/frozen_chromite/third_party/infra_libs/ts_mon/common/
Dmonitors.py115 def __init__(self, endpoint, credential_factory, http=None, ca_certs=None): argument
120 httplib2_utils.InstrumentedHttp('acq-mon-api', ca_certs=ca_certs))
/external/python/httplib2/python2/
Dssl_protocol_test.py13 http = httplib2.Http(ca_certs="/nosuchfile")
29 http = httplib2.Http(ca_certs=other_ca_certs)
/external/python/httplib2/python2/httplib2/test/
Dtest_ssl_context.py49 client = httplib2.Http(ca_certs=self.ca_certs_path)
75 http = httplib2.Http(ca_certs=self.ca_certs_path, proxy_info=None)
/external/autotest/utils/frozen_chromite/third_party/python3/httplib2/
D__init__.py177 disable_ssl_certificate_validation, ca_certs, cert_file=None, key_file=None, argument
207 context.load_verify_locations(ca_certs)
1244 ca_certs=None, argument
1251 self.ca_certs = ca_certs if ca_certs else CA_CERTS
1258 self.disable_ssl_certificate_validation, self.ca_certs, cert_file, key_file,
1405 ca_certs=None, argument
1437 self.ca_certs = ca_certs
1781 ca_certs=self.ca_certs,
1791 ca_certs=self.ca_certs,
/external/python/httplib2/python3/httplib2/
D__init__.py184 disable_ssl_certificate_validation, ca_certs, cert_file=None, key_file=None, argument
214 context.load_verify_locations(ca_certs)
1256 ca_certs=None, argument
1264 self.ca_certs = ca_certs if ca_certs else CA_CERTS
1271 self.disable_ssl_certificate_validation, self.ca_certs, cert_file, key_file,
1420 ca_certs=None, argument
1452 self.ca_certs = ca_certs
1813 ca_certs=self.ca_certs,
1824 ca_certs=self.ca_certs,
/external/python/cpython3/Lib/
Dssl.py1419 ssl_version=PROTOCOL_TLS, ca_certs=None, argument
1435 if ca_certs:
1436 context.load_verify_locations(ca_certs)
1506 ca_certs=None, timeout=_GLOBAL_DEFAULT_TIMEOUT): argument
1515 if ca_certs is not None:
1521 cafile=ca_certs)
/external/autotest/utils/frozen_chromite/third_party/infra_libs/ts_mon/
Dconfig.py237 ca_certs=args.ts_mon_ca_certs)
/external/python/asn1crypto/docs/
Dpem.md58 with open('/path/to/ca_certs', 'rb') as f:
/external/python/google-auth-library-python/google/auth/transport/
Durllib3.py150 return urllib3.PoolManager(cert_reqs="CERT_REQUIRED", ca_certs=certifi.where())
/external/python/cpython2/Lib/test/
Dtest_ssl.py1360 ca_certs=REMOTE_ROOT_CERT)
1372 ca_certs=REMOTE_ROOT_CERT)
1385 ca_certs=REMOTE_ROOT_CERT,
1414 ca_certs=REMOTE_ROOT_CERT,
1429 ca_certs=REMOTE_ROOT_CERT)
1575 ca_certs=CERTFILE)
1583 ca_certs=cert)
2552 ca_certs=CERTFILE,
2857 ca_certs=CERTFILE,
2882 ca_certs=CERTFILE,
/external/python/cpython3/Lib/test/
Dtest_ssl.py283 cert_reqs=ssl.CERT_NONE, ca_certs=None, argument
295 if ca_certs is not None:
296 context.load_verify_locations(ca_certs)
2015 ca_certs=SIGNING_CA) as s:
2034 ca_certs=SIGNING_CA)
2044 ca_certs=SIGNING_CA,
2198 pem = ssl.get_server_certificate((host, port), ca_certs=SIGNING_CA)
2217 ssl.get_server_certificate(self.server_addr, ca_certs=SIGNING_CA,
2381 pem = ssl.get_server_certificate((host, port), ca_certs=cert)
2389 pem = ssl.get_server_certificate((host, port), ca_certs=CERTFILE)
[all …]
/external/scapy/scapy/layers/tls/
Dcert.py916 ca_certs = f.read()
921 anchors = [Cert(c) for c in split_pem(ca_certs)]
/external/python/httplib2/doc/
Dlibhttplib2.rst196 .. class:: Http([cache=None], [timeout=None], [proxy_info==ProxyInfo.from_environment], [ca_certs=N…
201 is the socket level timeout. The *ca_certs* parameter is the filename of the

12