Searched refs:root_certs (Results 1 – 6 of 6) sorted by relevance
133 def __init__(self, host, root_certs=_TRUSTED_ROOT_CERTS, **kwargs): argument134 self.root_certs = root_certs150 if self.root_certs is not None:151 kwargs.update(cert_reqs=ssl.CERT_REQUIRED, ca_certs=self.root_certs)165 def __init__(self, root_certs=_TRUSTED_ROOT_CERTS): argument167 self.root_certs = root_certs175 params = dict(root_certs=self.root_certs)
46 CertificateList root_certs = LoadCertificates(file); in AddFromFile() local47 if (root_certs.empty() || root_certs.size() > 1) in AddFromFile()50 return Add(root_certs.front().get()); in AddFromFile()
148 CertificateList root_certs(ListCertsInSlot(root_certs_slot.get())); in TEST_F() local149 ASSERT_FALSE(root_certs.empty()); in TEST_F()151 no_slots_profile_filter_.IsCertAllowed(root_certs[0]->os_cert_handle())); in TEST_F()152 EXPECT_TRUE(profile_filter_1_.IsCertAllowed(root_certs[0]->os_cert_handle())); in TEST_F()154 profile_filter_1_copy_.IsCertAllowed(root_certs[0]->os_cert_handle())); in TEST_F()155 EXPECT_TRUE(profile_filter_2_.IsCertAllowed(root_certs[0]->os_cert_handle())); in TEST_F()
150 TestRootCerts* root_certs = TestRootCerts::GetInstance(); in GetCertChainInfo() local151 if (root_certs->Contains(root)) in GetCertChainInfo()
1005 TestRootCerts* root_certs = TestRootCerts::GetInstance(); in TEST_F() local1006 root_certs->AddFromFile( in TEST_F()1025 root_certs->Clear(); in TEST_F()1026 EXPECT_TRUE(root_certs->IsEmpty()); in TEST_F()
342 TestRootCerts* root_certs = TestRootCerts::GetInstance(); in LoadTestRootCert() local343 if (!root_certs) in LoadTestRootCert()355 return root_certs->AddFromFile( in LoadTestRootCert()371 TestRootCerts* root_certs = TestRootCerts::GetInstance(); in CleanUpWhenStoppingServer() local372 root_certs->Clear(); in CleanUpWhenStoppingServer()