/external/python/cpython2/Lib/ |
D | ssl.py | 308 cafile = os.environ.get(parts[0], parts[1]) 311 return DefaultVerifyPaths(cafile if os.path.isfile(cafile) else None, 416 def create_default_context(purpose=Purpose.SERVER_AUTH, cafile=None, argument 455 if cafile or capath or cadata: 456 context.load_verify_locations(cafile, capath, cadata) 467 cafile=None, capath=None, cadata=None): argument 495 if cafile or capath or cadata: 496 context.load_verify_locations(cafile, capath, cadata) 1021 cafile=ca_certs)
|
D | urllib2.py | 132 cafile=None, capath=None, cadefault=False, context=None): argument 134 if cafile or capath or cadefault: 143 cafile=cafile,
|
/external/python/cpython3/Lib/ |
D | ssl.py | 438 cafile = os.environ.get(parts[0], parts[1]) 441 return DefaultVerifyPaths(cafile if os.path.isfile(cafile) else None, 723 def create_default_context(purpose=Purpose.SERVER_AUTH, *, cafile=None, argument 744 if cafile or capath or cadata: 745 context.load_verify_locations(cafile, capath, cadata) 761 cafile=None, capath=None, cadata=None): argument 790 if cafile or capath or cadata: 791 context.load_verify_locations(cafile, capath, cadata) 1482 cafile=ca_certs)
|
/external/python/pyopenssl/src/OpenSSL/ |
D | SSL.py | 665 def load_verify_locations(self, cafile, capath=None): argument 681 if cafile is None: 682 cafile = _ffi.NULL 684 cafile = _path_string(cafile) 692 self._context, cafile, capath 804 for cafile in file_path: 805 if os.path.isfile(cafile): 806 self.load_verify_locations(cafile) 938 def load_client_ca(self, cafile): argument 948 _text_to_bytes_and_warn("cafile", cafile)
|
D | crypto.py | 1684 def load_locations(self, cafile, capath=None): argument 1715 if cafile is None: 1716 cafile = _ffi.NULL 1718 cafile = _path_string(cafile) 1726 self._store, cafile, capath
|
/external/python/cpython3/Lib/test/ |
D | test_urllib2_localnet.py | 563 context = ssl.create_default_context(cafile=CERT_localhost) 572 cafile=CERT_localhost) 577 cafile=CERT_fakehostname) 582 cafile=CERT_fakehostname) 604 context = ssl.create_default_context(cafile=CERT_localhost)
|
/external/python/cpython2/Lib/test/ |
D | test_urllib2_localnet.py | 545 context = ssl.create_default_context(cafile=CERT_localhost) 553 cafile=CERT_localhost) 558 cafile=CERT_fakehostname) 563 cafile=CERT_fakehostname) 583 context = ssl.create_default_context(cafile=CERT_localhost)
|
D | test_urllibnet.py | 211 context = ssl.create_default_context(cafile=CERT_selfsigned_pythontestdotnet)
|
D | test_ssl.py | 574 self.assertEqual(paths.cafile, CERTFILE) 914 ctx.load_verify_locations(cafile=CERTFILE, capath=None) 916 ctx.load_verify_locations(cafile=BYTES_CERTFILE, capath=None) 917 ctx.load_verify_locations(cafile=BYTES_CERTFILE.decode('utf-8')) 1171 ctx = ssl.create_default_context(cafile=SIGNING_CA, capath=CAPATH, 2494 context = ssl.create_default_context(cafile=CERTFILE)
|
/external/python/httplib2/tests/ |
D | test_https.py | 145 context.load_verify_locations(cafile=tests.CA_CERTS) 168 context.load_verify_locations(cafile=tests.CA_CERTS)
|
/external/curl/lib/vtls/ |
D | nss.c | 1618 const char *cafile = SSL_CONN_CONFIG(CAfile); in nss_load_ca_certificates() local 1624 if(cafile && !cafile[0]) in nss_load_ca_certificates() 1625 cafile = NULL; in nss_load_ca_certificates() 1629 infof(data, " CAfile: %s\n", cafile ? cafile : "none"); in nss_load_ca_certificates() 1633 use_trust_module = !cafile && !capath; in nss_load_ca_certificates() 1653 if(cafile) in nss_load_ca_certificates() 1654 result = nss_load_cert(&conn->ssl[sockindex], cafile, PR_TRUE); in nss_load_ca_certificates()
|
D | sectransp.c | 2151 static CURLcode verify_cert(const char *cafile, struct Curl_easy *data, argument 2159 if(read_cert(cafile, &certbuf, &buflen) < 0) {
|
/external/python/pyopenssl/tests/ |
D | test_crypto.py | 2289 self, cafile, capath, call_cafile, call_capath, monkeypatch argument 2292 def load_locations(self, store, cafile, capath): argument 2293 self.cafile = cafile 2303 store.load_locations(cafile=cafile, capath=capath) 2305 assert call_cafile == lib_mock.cafile 2319 store.load_locations(cafile=str(invalid_ca_file)) 4167 cafile = base_path.join(hash_directory, ca_hash) 4168 cafile.write_binary( 4171 return cafile 4192 cafile=str(root_ca_file), capath=str(intermediate_ca_file.dirname)
|
D | test_ssl.py | 1082 def _load_verify_cafile(self, cafile): argument 1089 with open(cafile, "w") as fObj: 1092 self._load_verify_locations_test(cafile) 1099 cafile = tmpfile + NON_ASCII.encode(getfilesystemencoding()) 1100 self._load_verify_cafile(cafile) 1132 cafile = join_bytes_or_unicode(capath, name) 1133 with open(cafile, "w") as fObj:
|
/external/scapy/scapy/layers/tls/ |
D | cert.py | 908 def verifyChainFromCAFile(self, cafile, untrusted_file=None): argument 915 f = open(cafile) 945 for cafile in os.listdir(capath): 946 anchors.append(Cert(open(cafile).read()))
|
/external/python/cpython3/Modules/clinic/ |
D | _ssl.c.h | 609 PyObject *cafile, 621 PyObject *cafile = Py_None; in _ssl__SSLContext_load_verify_locations() local 633 cafile = args[0]; in _ssl__SSLContext_load_verify_locations() 646 return_value = _ssl__SSLContext_load_verify_locations_impl(self, cafile, capath, cadata); in _ssl__SSLContext_load_verify_locations()
|
/external/python/cpython2/Modules/ |
D | _ssl.c | 2917 PyObject *cadata = NULL, *cafile = NULL, *capath = NULL; in load_verify_locations() local 2925 &cafile, &capath, &cadata)) in load_verify_locations() 2928 if (cafile == Py_None) in load_verify_locations() 2929 cafile = NULL; in load_verify_locations() 2935 if (cafile == NULL && capath == NULL && cadata == NULL) { in load_verify_locations() 2941 if (cafile) { in load_verify_locations() 2942 if (PyString_Check(cafile)) { in load_verify_locations() 2943 Py_INCREF(cafile); in load_verify_locations() 2944 cafile_bytes = cafile; in load_verify_locations() 2946 PyObject *u = PyUnicode_FromObject(cafile); in load_verify_locations() [all …]
|
/external/python/setuptools/setuptools/ |
D | ssl_support.py | 190 ctx = ssl.create_default_context(cafile=self.ca_bundle)
|
/external/python/cpython2/Doc/library/ |
D | ssl.rst | 243 .. function:: create_default_context(purpose=Purpose.SERVER_AUTH, cafile=None, capath=None, cadata=… 250 *cafile*, *capath*, *cadata* represent optional CA certificates to 260 and either loads CA certificates (when at least one of *cafile*, *capath* or 460 Returns a named tuple with paths to OpenSSL's default cafile and capath. 465 * :attr:`cafile` - resolved path to cafile or ``None`` if the file doesn't exist, 467 * :attr:`openssl_cafile_env` - OpenSSL's environment key that points to a cafile, 468 * :attr:`openssl_cafile` - hard coded path to a cafile, 1122 .. method:: SSLContext.load_verify_locations(cafile=None, capath=None, cadata=None) 1126 :data:`CERT_NONE`. At least one of *cafile* or *capath* must be specified. 1132 The *cafile* string, if present, is the path to a file of concatenated
|
D | urllib2.rst | 30 .. function:: urlopen(url[, data[, timeout[, cafile[, capath[, cadefault[, context]]]]]) 52 The optional *cafile* and *capath* parameters specify a set of trusted CA 53 certificates for HTTPS requests. *cafile* should point to a single file 86 *cafile*, *capath*, *cadefault*, and *context* were added.
|
/external/python/cpython3/Modules/ |
D | _ssl.c | 4164 PyObject *cafile, in _ssl__SSLContext_load_verify_locations_impl() argument 4174 if (cafile == Py_None) in _ssl__SSLContext_load_verify_locations_impl() 4175 cafile = NULL; in _ssl__SSLContext_load_verify_locations_impl() 4181 if (cafile == NULL && capath == NULL && cadata == NULL) { in _ssl__SSLContext_load_verify_locations_impl() 4186 if (cafile && !PyUnicode_FSConverter(cafile, &cafile_bytes)) { in _ssl__SSLContext_load_verify_locations_impl() 4248 if (cafile || capath) { in _ssl__SSLContext_load_verify_locations_impl() 4249 if (cafile) in _ssl__SSLContext_load_verify_locations_impl()
|
/external/python/cpython3/Lib/urllib/ |
D | request.py | 140 *, cafile=None, capath=None, cadefault=False, context=None): argument 191 if cafile or capath or cadefault: 203 cafile=cafile,
|
/external/python/cpython3/Doc/library/ |
D | ssl.rst | 121 .. function:: create_default_context(purpose=Purpose.SERVER_AUTH, cafile=None, capath=None, cadata=… 128 *cafile*, *capath*, *cadata* represent optional CA certificates to 138 and either loads CA certificates (when at least one of *cafile*, *capath* or 459 Returns a named tuple with paths to OpenSSL's default cafile and capath. 464 * :attr:`cafile` - resolved path to cafile or ``None`` if the file doesn't exist, 466 * :attr:`openssl_cafile_env` - OpenSSL's environment key that points to a cafile, 467 * :attr:`openssl_cafile` - hard coded path to a cafile, 1529 .. method:: SSLContext.load_verify_locations(cafile=None, capath=None, cadata=None) 1533 :data:`CERT_NONE`. At least one of *cafile* or *capath* must be specified. 1539 The *cafile* string, if present, is the path to a file of concatenated
|
D | urllib.request.rst | 28 .. function:: urlopen(url, data=None[, timeout], *, cafile=None, capath=None, cadefault=False, cont… 49 The optional *cafile* and *capath* parameters specify a set of trusted 50 CA certificates for HTTPS requests. *cafile* should point to a single 97 *cafile* and *capath* were added. 114 *cafile*, *capath* and *cadefault* are deprecated in favor of *context*.
|
/external/python/cpython3/Lib/test/test_asyncio/ |
D | test_events.py | 582 cafile=None, capath=None, argument 1036 cafile=test_utils.SIGNING_CA) 1066 sslcontext_client.load_verify_locations(cafile=test_utils.SIGNING_CA) 1092 sslcontext_client.load_verify_locations(cafile=test_utils.SIGNING_CA)
|