/third_party/node/deps/npm/node_modules/node-gyp/lib/ |
H A D | download.js | 17 const cafile = gyp.opts.cafile 18 if (cafile) { 19 requestOpts.ca = await readCAFile(cafile)
|
H A D | node-gyp.js | 33 cafile: String, // 'install'
|
/third_party/mbedtls/tests/scripts/ |
H A D | generate_tls13_compat_tests.py | 20 Certificate = namedtuple("Certificate", ['cafile', 'certfile', 'keyfile']) 204 '-CAfile {cafile}'.format(cafile=CERTIFICATES[self._cert_sig_algs[0]].cafile)] 322 '--x509cafile {cafile}'.format(cafile=CERTIFICATES[self._cert_sig_algs[0]].cafile)] 443 'ca_file={cafile}'.format(cafile=CERTIFICATES[self._cert_sig_algs[0]].cafile)] [all...] |
/third_party/curl/tests/libtest/ |
H A D | lib678.c | 66 static int test_cert_blob(const char *url, const char *cafile) in test_cert_blob() argument 80 if(loadfile(cafile, &certdata, &certsize)) { in test_cert_blob()
|
/third_party/openssl/test/ |
H A D | cms-examples.pl | 221 $cafile = "$cmsdir/CarlDSSSelf.pem" if $tlist =~ /dss/; 222 $cafile = "$cmsdir/CarlRSASelf.pem" if $tlist =~ /rsa/; 226 . " -CAfile $cafile"
|
/third_party/python/Lib/ |
H A D | ssl.py | 439 "cafile capath openssl_cafile_env openssl_cafile openssl_capath_env " 443 """Return paths to default cafile and capath. 448 cafile = os.environ.get(parts[0], parts[1]) 451 return DefaultVerifyPaths(cafile if os.path.isfile(cafile) else None, 745 def create_default_context(purpose=Purpose.SERVER_AUTH, *, cafile=None, 769 if cafile or capath or cadata: 770 context.load_verify_locations(cafile, capath, cadata) 772 # no explicit cafile, capath or cadata but the verify mode is 786 cafile [all...] |
/third_party/python/Lib/test/ |
H A D | test_urllib2_localnet.py | 567 context = ssl.create_default_context(cafile=CERT_localhost) 576 cafile=CERT_localhost) 581 cafile=CERT_fakehostname) 586 cafile=CERT_fakehostname) 608 context = ssl.create_default_context(cafile=CERT_localhost)
|
H A D | test_ssl.py | 942 self.assertEqual(paths.cafile, CERTFILE) 1459 ctx.load_verify_locations(cafile=CERTFILE, capath=None) 1461 ctx.load_verify_locations(cafile=BYTES_CERTFILE, capath=None) 1717 ctx = ssl.create_default_context(cafile=SIGNING_CA, capath=CAPATH, 3567 context = ssl.create_default_context(cafile=SIGNING_CA) 4936 self.ssl_ctx.load_verify_locations(cafile=ONLYCERT)
|
H A D | test_urllib.py | 606 "https://localhost", cafile="/nonexistent/path", context=context
|
H A D | test_logging.py | 2081 context = ssl.create_default_context(cafile=localhost_cert)
|
/third_party/python/Modules/clinic/ |
H A D | _ssl.c.h | 565 "load_verify_locations($self, /, cafile=None, capath=None, cadata=None)\n" 574 PyObject *cafile, 582 static const char * const _keywords[] = {"cafile", "capath", "cadata", NULL}; in _ssl__SSLContext_load_verify_locations() 586 PyObject *cafile = Py_None; in _ssl__SSLContext_load_verify_locations() local 598 cafile = args[0]; in _ssl__SSLContext_load_verify_locations() 611 return_value = _ssl__SSLContext_load_verify_locations_impl(self, cafile, capath, cadata); in _ssl__SSLContext_load_verify_locations()
|
/third_party/python/Modules/ |
H A D | _ssl.c | 4043 cafile: object = None 4051 PyObject *cafile, in _ssl__SSLContext_load_verify_locations_impl() 4061 if (cafile == Py_None) in _ssl__SSLContext_load_verify_locations_impl() 4062 cafile = NULL; in _ssl__SSLContext_load_verify_locations_impl() 4068 if (cafile == NULL && capath == NULL && cadata == NULL) { in _ssl__SSLContext_load_verify_locations_impl() 4070 "cafile, capath and cadata cannot be all omitted"); in _ssl__SSLContext_load_verify_locations_impl() 4073 if (cafile && !PyUnicode_FSConverter(cafile, &cafile_bytes)) { in _ssl__SSLContext_load_verify_locations_impl() 4076 "cafile should be a valid filesystem path"); in _ssl__SSLContext_load_verify_locations_impl() 4134 /* load cafile o in _ssl__SSLContext_load_verify_locations_impl() 4050 _ssl__SSLContext_load_verify_locations_impl(PySSLContext *self, PyObject *cafile, PyObject *capath, PyObject *cadata) _ssl__SSLContext_load_verify_locations_impl() argument [all...] |
/third_party/curl/lib/vtls/ |
H A D | sectransp.c | 2366 struct Curl_easy *data, const char *cafile, 2380 else if(cafile) { 2381 CURL_TRC_CF(data, cf, "verify_peer, CA from file '%s'", cafile); 2382 if(read_cert(cafile, &certbuf, &buflen) < 0) { 2365 verify_cert(struct Curl_cfilter *cf, struct Curl_easy *data, const char *cafile, const struct curl_blob *ca_info_blob, SSLContextRef ctx) global() argument
|
/third_party/python/Lib/urllib/ |
H A D | request.py | 140 *, cafile=None, capath=None, cadefault=False, context=None): 158 The optional *cafile* and *capath* parameters specify a set of trusted CA 159 certificates for HTTPS requests. cafile should point to a single file 191 if cafile or capath or cadefault: 193 warnings.warn("cafile, capath and cadefault are deprecated, use a " 197 "You can't pass both context and any of cafile, capath, and " 203 cafile=cafile,
|
/third_party/python/Lib/test/test_asyncio/ |
H A D | test_events.py | 608 cafile=None, capath=None, 1095 cafile=test_utils.SIGNING_CA) 1125 sslcontext_client.load_verify_locations(cafile=test_utils.SIGNING_CA) 1151 sslcontext_client.load_verify_locations(cafile=test_utils.SIGNING_CA)
|