Home
last modified time | relevance | path

Searched refs:cafile (Results 1 - 15 of 15) sorted by relevance

/third_party/node/deps/npm/node_modules/node-gyp/lib/
H A Ddownload.js17 const cafile = gyp.opts.cafile
18 if (cafile) {
19 requestOpts.ca = await readCAFile(cafile)
H A Dnode-gyp.js33 cafile: String, // 'install'
/third_party/mbedtls/tests/scripts/
H A Dgenerate_tls13_compat_tests.py20 Certificate = namedtuple("Certificate", ['cafile', 'certfile', 'keyfile'])
204 '-CAfile {cafile}'.format(cafile=CERTIFICATES[self._cert_sig_algs[0]].cafile)]
322 '--x509cafile {cafile}'.format(cafile=CERTIFICATES[self._cert_sig_algs[0]].cafile)]
443 'ca_file={cafile}'.format(cafile=CERTIFICATES[self._cert_sig_algs[0]].cafile)]
[all...]
/third_party/curl/tests/libtest/
H A Dlib678.c66 static int test_cert_blob(const char *url, const char *cafile) in test_cert_blob() argument
80 if(loadfile(cafile, &certdata, &certsize)) { in test_cert_blob()
/third_party/openssl/test/
H A Dcms-examples.pl221 $cafile = "$cmsdir/CarlDSSSelf.pem" if $tlist =~ /dss/;
222 $cafile = "$cmsdir/CarlRSASelf.pem" if $tlist =~ /rsa/;
226 . " -CAfile $cafile"
/third_party/python/Lib/
H A Dssl.py439 "cafile capath openssl_cafile_env openssl_cafile openssl_capath_env "
443 """Return paths to default cafile and capath.
448 cafile = os.environ.get(parts[0], parts[1])
451 return DefaultVerifyPaths(cafile if os.path.isfile(cafile) else None,
745 def create_default_context(purpose=Purpose.SERVER_AUTH, *, cafile=None,
769 if cafile or capath or cadata:
770 context.load_verify_locations(cafile, capath, cadata)
772 # no explicit cafile, capath or cadata but the verify mode is
786 cafile
[all...]
/third_party/python/Lib/test/
H A Dtest_urllib2_localnet.py567 context = ssl.create_default_context(cafile=CERT_localhost)
576 cafile=CERT_localhost)
581 cafile=CERT_fakehostname)
586 cafile=CERT_fakehostname)
608 context = ssl.create_default_context(cafile=CERT_localhost)
H A Dtest_ssl.py942 self.assertEqual(paths.cafile, CERTFILE)
1459 ctx.load_verify_locations(cafile=CERTFILE, capath=None)
1461 ctx.load_verify_locations(cafile=BYTES_CERTFILE, capath=None)
1717 ctx = ssl.create_default_context(cafile=SIGNING_CA, capath=CAPATH,
3567 context = ssl.create_default_context(cafile=SIGNING_CA)
4936 self.ssl_ctx.load_verify_locations(cafile=ONLYCERT)
H A Dtest_urllib.py606 "https://localhost", cafile="/nonexistent/path", context=context
H A Dtest_logging.py2081 context = ssl.create_default_context(cafile=localhost_cert)
/third_party/python/Modules/clinic/
H A D_ssl.c.h565 "load_verify_locations($self, /, cafile=None, capath=None, cadata=None)\n"
574 PyObject *cafile,
582 static const char * const _keywords[] = {"cafile", "capath", "cadata", NULL}; in _ssl__SSLContext_load_verify_locations()
586 PyObject *cafile = Py_None; in _ssl__SSLContext_load_verify_locations() local
598 cafile = args[0]; in _ssl__SSLContext_load_verify_locations()
611 return_value = _ssl__SSLContext_load_verify_locations_impl(self, cafile, capath, cadata); in _ssl__SSLContext_load_verify_locations()
/third_party/python/Modules/
H A D_ssl.c4043 cafile: object = None
4051 PyObject *cafile, in _ssl__SSLContext_load_verify_locations_impl()
4061 if (cafile == Py_None) in _ssl__SSLContext_load_verify_locations_impl()
4062 cafile = NULL; in _ssl__SSLContext_load_verify_locations_impl()
4068 if (cafile == NULL && capath == NULL && cadata == NULL) { in _ssl__SSLContext_load_verify_locations_impl()
4070 "cafile, capath and cadata cannot be all omitted"); in _ssl__SSLContext_load_verify_locations_impl()
4073 if (cafile && !PyUnicode_FSConverter(cafile, &cafile_bytes)) { in _ssl__SSLContext_load_verify_locations_impl()
4076 "cafile should be a valid filesystem path"); in _ssl__SSLContext_load_verify_locations_impl()
4134 /* load cafile o in _ssl__SSLContext_load_verify_locations_impl()
4050 _ssl__SSLContext_load_verify_locations_impl(PySSLContext *self, PyObject *cafile, PyObject *capath, PyObject *cadata) _ssl__SSLContext_load_verify_locations_impl() argument
[all...]
/third_party/curl/lib/vtls/
H A Dsectransp.c2366 struct Curl_easy *data, const char *cafile,
2380 else if(cafile) {
2381 CURL_TRC_CF(data, cf, "verify_peer, CA from file '%s'", cafile);
2382 if(read_cert(cafile, &certbuf, &buflen) < 0) {
2365 verify_cert(struct Curl_cfilter *cf, struct Curl_easy *data, const char *cafile, const struct curl_blob *ca_info_blob, SSLContextRef ctx) global() argument
/third_party/python/Lib/urllib/
H A Drequest.py140 *, cafile=None, capath=None, cadefault=False, context=None):
158 The optional *cafile* and *capath* parameters specify a set of trusted CA
159 certificates for HTTPS requests. cafile should point to a single file
191 if cafile or capath or cadefault:
193 warnings.warn("cafile, capath and cadefault are deprecated, use a "
197 "You can't pass both context and any of cafile, capath, and "
203 cafile=cafile,
/third_party/python/Lib/test/test_asyncio/
H A Dtest_events.py608 cafile=None, capath=None,
1095 cafile=test_utils.SIGNING_CA)
1125 sslcontext_client.load_verify_locations(cafile=test_utils.SIGNING_CA)
1151 sslcontext_client.load_verify_locations(cafile=test_utils.SIGNING_CA)

Completed in 39 milliseconds