/external/python/httplib2/tests/ |
D | test_https.py | 11 http = httplib2.Http(ca_certs=tests.CA_CERTS) 18 http = httplib2.Http(ca_certs=tests.CA_CERTS) 39 http = httplib2.Http(ca_certs=tests.CA_CERTS) 54 http = httplib2.Http(ca_certs="/nosuchfile") 63 http = httplib2.Http(ca_certs=tests.CA_UNUSED_CERTS) 120 http = httplib2.Http(ca_certs=tests.CA_CERTS, tls_minimum_version="TLSv1_2") 134 http = httplib2.Http(ca_certs=tests.CA_CERTS, tls_maximum_version="TLSv1") 153 http = httplib2.Http(ca_certs=tests.CA_CERTS) 176 http = httplib2.Http(ca_certs=tests.CA_CERTS) 199 http = httplib2.Http(ca_certs=tests.CA_CERTS)
|
D | test_proxy.py | 205 http = httplib2.Http(ca_certs=tests.CA_CERTS)
|
/external/cronet/third_party/boringssl/src/crypto/pkcs8/ |
D | pkcs12_test.cc | 83 STACK_OF(X509) *ca_certs = nullptr; in TestCompat() 84 ASSERT_TRUE(PKCS12_parse(p12.get(), kPassword, &key, &cert, &ca_certs)); in TestCompat() 88 bssl::UniquePtr<STACK_OF(X509)> delete_ca_certs(ca_certs); in TestCompat() 92 ASSERT_EQ(0u, sk_X509_num(ca_certs)); in TestCompat() 528 STACK_OF(X509) *ca_certs = nullptr; in ExpectPKCS12Parse() 529 ASSERT_TRUE(PKCS12_parse(p12.get(), kPassword, &key, &cert, &ca_certs)); in ExpectPKCS12Parse() 533 bssl::UniquePtr<STACK_OF(X509)> delete_ca_certs(ca_certs); in ExpectPKCS12Parse() 549 ASSERT_EQ(expect_ca_certs.size(), sk_X509_num(ca_certs)); in ExpectPKCS12Parse() 551 EXPECT_EQ(0, X509_cmp(expect_ca_certs[i], sk_X509_value(ca_certs, i))); in ExpectPKCS12Parse() 628 STACK_OF(X509) *ca_certs = nullptr; in TEST() [all …]
|
D | pkcs8_x509.c | 873 STACK_OF(X509) *ca_certs = NULL; in PKCS12_parse() 877 ca_certs = *out_ca_certs; in PKCS12_parse() 880 if (!ca_certs) { in PKCS12_parse() 881 ca_certs = sk_X509_new_null(); in PKCS12_parse() 882 if (ca_certs == NULL) { in PKCS12_parse() 889 if (!PKCS12_get_key_and_certs(out_pkey, ca_certs, &ber_bytes, password)) { in PKCS12_parse() 891 sk_X509_free(ca_certs); in PKCS12_parse() 899 size_t num_certs = sk_X509_num(ca_certs); in PKCS12_parse() 902 X509 *cert = sk_X509_value(ca_certs, i); in PKCS12_parse() 905 sk_X509_delete(ca_certs, i); in PKCS12_parse() [all …]
|
/external/boringssl/src/crypto/pkcs8/ |
D | pkcs12_test.cc | 83 STACK_OF(X509) *ca_certs = nullptr; in TestCompat() 84 ASSERT_TRUE(PKCS12_parse(p12.get(), kPassword, &key, &cert, &ca_certs)); in TestCompat() 88 bssl::UniquePtr<STACK_OF(X509)> delete_ca_certs(ca_certs); in TestCompat() 92 ASSERT_EQ(0u, sk_X509_num(ca_certs)); in TestCompat() 528 STACK_OF(X509) *ca_certs = nullptr; in ExpectPKCS12Parse() 529 ASSERT_TRUE(PKCS12_parse(p12.get(), kPassword, &key, &cert, &ca_certs)); in ExpectPKCS12Parse() 533 bssl::UniquePtr<STACK_OF(X509)> delete_ca_certs(ca_certs); in ExpectPKCS12Parse() 549 ASSERT_EQ(expect_ca_certs.size(), sk_X509_num(ca_certs)); in ExpectPKCS12Parse() 551 EXPECT_EQ(0, X509_cmp(expect_ca_certs[i], sk_X509_value(ca_certs, i))); in ExpectPKCS12Parse() 628 STACK_OF(X509) *ca_certs = nullptr; in TEST() [all …]
|
D | pkcs8_x509.c | 873 STACK_OF(X509) *ca_certs = NULL; in PKCS12_parse() 877 ca_certs = *out_ca_certs; in PKCS12_parse() 880 if (!ca_certs) { in PKCS12_parse() 881 ca_certs = sk_X509_new_null(); in PKCS12_parse() 882 if (ca_certs == NULL) { in PKCS12_parse() 889 if (!PKCS12_get_key_and_certs(out_pkey, ca_certs, &ber_bytes, password)) { in PKCS12_parse() 891 sk_X509_free(ca_certs); in PKCS12_parse() 899 size_t num_certs = sk_X509_num(ca_certs); in PKCS12_parse() 902 X509 *cert = sk_X509_value(ca_certs, i); in PKCS12_parse() 905 sk_X509_delete(ca_certs, i); in PKCS12_parse() [all …]
|
/external/cronet/net/cert/ |
D | nss_cert_database_unittest.cc | 827 ScopedCERTCertificateList ca_certs = CreateCERTCertificateListFromFile( in TEST_F() local 830 ASSERT_EQ(1U, ca_certs.size()); in TEST_F() 834 EXPECT_TRUE(cert_db_->ImportCACerts(ca_certs, NSSCertDatabase::TRUSTED_SSL, in TEST_F() 865 ScopedCERTCertificateList ca_certs = CreateCERTCertificateListFromFile( in TEST_F() local 868 ASSERT_EQ(1U, ca_certs.size()); in TEST_F() 872 EXPECT_TRUE(cert_db_->ImportCACerts(ca_certs, NSSCertDatabase::TRUSTED_SSL, in TEST_F() 908 ScopedCERTCertificateList ca_certs = CreateCERTCertificateListFromFile( in TEST_F() local 911 ASSERT_EQ(1U, ca_certs.size()); in TEST_F() 915 EXPECT_TRUE(cert_db_->ImportCACerts(ca_certs, NSSCertDatabase::DISTRUSTED_SSL, in TEST_F() 960 ca_certs[0].get(), CA_CERT, NSSCertDatabase::TRUSTED_SSL)); in TEST_F() [all …]
|
/external/rust/crates/quiche/deps/boringssl/src/crypto/pkcs8/ |
D | pkcs12_test.cc | 83 STACK_OF(X509) *ca_certs = nullptr; in TestCompat() 84 ASSERT_TRUE(PKCS12_parse(p12.get(), kPassword, &key, &cert, &ca_certs)); in TestCompat() 88 bssl::UniquePtr<STACK_OF(X509)> delete_ca_certs(ca_certs); in TestCompat() 92 ASSERT_EQ(0u, sk_X509_num(ca_certs)); in TestCompat() 528 STACK_OF(X509) *ca_certs = nullptr; in ExpectPKCS12Parse() 529 ASSERT_TRUE(PKCS12_parse(p12.get(), kPassword, &key, &cert, &ca_certs)); in ExpectPKCS12Parse() 533 bssl::UniquePtr<STACK_OF(X509)> delete_ca_certs(ca_certs); in ExpectPKCS12Parse() 549 ASSERT_EQ(expect_ca_certs.size(), sk_X509_num(ca_certs)); in ExpectPKCS12Parse() 551 EXPECT_EQ(0, X509_cmp(expect_ca_certs[i], sk_X509_value(ca_certs, i))); in ExpectPKCS12Parse()
|
D | pkcs8_x509.c | 920 STACK_OF(X509) *ca_certs = NULL; in PKCS12_parse() 924 ca_certs = *out_ca_certs; in PKCS12_parse() 927 if (!ca_certs) { in PKCS12_parse() 928 ca_certs = sk_X509_new_null(); in PKCS12_parse() 929 if (ca_certs == NULL) { in PKCS12_parse() 937 if (!PKCS12_get_key_and_certs(out_pkey, ca_certs, &ber_bytes, password)) { in PKCS12_parse() 939 sk_X509_free(ca_certs); in PKCS12_parse() 947 size_t num_certs = sk_X509_num(ca_certs); in PKCS12_parse() 950 X509 *cert = sk_X509_value(ca_certs, i); in PKCS12_parse() 953 sk_X509_delete(ca_certs, i); in PKCS12_parse() [all …]
|
/external/python/cpython2/Lib/ |
D | ssl.py | 537 ssl_version=PROTOCOL_TLS, ca_certs=None, argument 557 if ca_certs: 558 self._context.load_verify_locations(ca_certs) 569 self.ca_certs = ca_certs 939 ssl_version=PROTOCOL_TLS, ca_certs=None, argument 946 ssl_version=ssl_version, ca_certs=ca_certs, 1008 def get_server_certificate(addr, ssl_version=PROTOCOL_TLS, ca_certs=None): argument 1015 if ca_certs is not None: 1021 cafile=ca_certs)
|
/external/python/httplib2/python2/httplib2/ |
D | __init__.py | 79 sock, key_file, cert_file, disable_validation, ca_certs, ssl_version, hostname, key_password argument 97 if ca_certs: 98 context.load_verify_locations(ca_certs) 108 ca_certs=ca_certs, 114 sock, key_file, cert_file, disable_validation, ca_certs, ssl_version, hostname, key_password argument 1273 ca_certs=None, argument 1291 if ca_certs is None: 1292 ca_certs = CA_CERTS 1293 self.ca_certs = ca_certs 1396 self.ca_certs, [all …]
|
/external/autotest/utils/frozen_chromite/third_party/python2/httplib2/ |
D | __init__.py | 79 sock, key_file, cert_file, disable_validation, ca_certs, ssl_version, hostname argument 94 if ca_certs: 95 context.load_verify_locations(ca_certs) 103 ca_certs=ca_certs, 109 sock, key_file, cert_file, disable_validation, ca_certs, ssl_version, hostname argument 1253 ca_certs=None, argument 1262 if ca_certs is None: 1263 ca_certs = CA_CERTS 1264 self.ca_certs = ca_certs 1366 self.ca_certs, [all …]
|
/external/autotest/utils/frozen_chromite/third_party/infra_libs/ts_mon/common/ |
D | monitors.py | 115 def __init__(self, endpoint, credential_factory, http=None, ca_certs=None): argument 120 httplib2_utils.InstrumentedHttp('acq-mon-api', ca_certs=ca_certs))
|
/external/python/httplib2/python2/ |
D | ssl_protocol_test.py | 13 http = httplib2.Http(ca_certs="/nosuchfile") 29 http = httplib2.Http(ca_certs=other_ca_certs)
|
/external/python/httplib2/python2/httplib2/test/ |
D | test_ssl_context.py | 49 client = httplib2.Http(ca_certs=self.ca_certs_path) 75 http = httplib2.Http(ca_certs=self.ca_certs_path, proxy_info=None)
|
/external/autotest/utils/frozen_chromite/third_party/python3/httplib2/ |
D | __init__.py | 177 disable_ssl_certificate_validation, ca_certs, cert_file=None, key_file=None, argument 207 context.load_verify_locations(ca_certs) 1244 ca_certs=None, argument 1251 self.ca_certs = ca_certs if ca_certs else CA_CERTS 1258 self.disable_ssl_certificate_validation, self.ca_certs, cert_file, key_file, 1405 ca_certs=None, argument 1437 self.ca_certs = ca_certs 1781 ca_certs=self.ca_certs, 1791 ca_certs=self.ca_certs,
|
/external/python/httplib2/python3/httplib2/ |
D | __init__.py | 184 disable_ssl_certificate_validation, ca_certs, cert_file=None, key_file=None, argument 214 context.load_verify_locations(ca_certs) 1256 ca_certs=None, argument 1264 self.ca_certs = ca_certs if ca_certs else CA_CERTS 1271 self.disable_ssl_certificate_validation, self.ca_certs, cert_file, key_file, 1420 ca_certs=None, argument 1452 self.ca_certs = ca_certs 1813 ca_certs=self.ca_certs, 1824 ca_certs=self.ca_certs,
|
/external/python/cpython3/Lib/ |
D | ssl.py | 1419 ssl_version=PROTOCOL_TLS, ca_certs=None, argument 1435 if ca_certs: 1436 context.load_verify_locations(ca_certs) 1506 ca_certs=None, timeout=_GLOBAL_DEFAULT_TIMEOUT): argument 1515 if ca_certs is not None: 1521 cafile=ca_certs)
|
/external/autotest/utils/frozen_chromite/third_party/infra_libs/ts_mon/ |
D | config.py | 237 ca_certs=args.ts_mon_ca_certs)
|
/external/python/asn1crypto/docs/ |
D | pem.md | 58 with open('/path/to/ca_certs', 'rb') as f:
|
/external/python/google-auth-library-python/google/auth/transport/ |
D | urllib3.py | 150 return urllib3.PoolManager(cert_reqs="CERT_REQUIRED", ca_certs=certifi.where())
|
/external/python/cpython2/Lib/test/ |
D | test_ssl.py | 1360 ca_certs=REMOTE_ROOT_CERT) 1372 ca_certs=REMOTE_ROOT_CERT) 1385 ca_certs=REMOTE_ROOT_CERT, 1414 ca_certs=REMOTE_ROOT_CERT, 1429 ca_certs=REMOTE_ROOT_CERT) 1575 ca_certs=CERTFILE) 1583 ca_certs=cert) 2552 ca_certs=CERTFILE, 2857 ca_certs=CERTFILE, 2882 ca_certs=CERTFILE,
|
/external/python/cpython3/Lib/test/ |
D | test_ssl.py | 283 cert_reqs=ssl.CERT_NONE, ca_certs=None, argument 295 if ca_certs is not None: 296 context.load_verify_locations(ca_certs) 2015 ca_certs=SIGNING_CA) as s: 2034 ca_certs=SIGNING_CA) 2044 ca_certs=SIGNING_CA, 2198 pem = ssl.get_server_certificate((host, port), ca_certs=SIGNING_CA) 2217 ssl.get_server_certificate(self.server_addr, ca_certs=SIGNING_CA, 2381 pem = ssl.get_server_certificate((host, port), ca_certs=cert) 2389 pem = ssl.get_server_certificate((host, port), ca_certs=CERTFILE) [all …]
|
/external/scapy/scapy/layers/tls/ |
D | cert.py | 916 ca_certs = f.read() 921 anchors = [Cert(c) for c in split_pem(ca_certs)]
|
/external/python/httplib2/doc/ |
D | libhttplib2.rst | 196 .. class:: Http([cache=None], [timeout=None], [proxy_info==ProxyInfo.from_environment], [ca_certs=N… 201 is the socket level timeout. The *ca_certs* parameter is the filename of the
|