/dports/net-mgmt/py-pdagent/pdagent-1.7.2/pdagent/ |
H A D | http.py | 96 ca_certs = kwargs.pop("ca_certs", DEFAULT_CA_CERTS_FILE) 97 context = kwargs.pop("context", _get_cached_context(ca_certs=ca_certs)) 105 def _get_cached_context(ca_certs): argument 106 if ca_certs not in ssl_context_cache: 107 ssl_context_cache[ca_certs] = _create_ssl_context(ca_certs) 108 return ssl_context_cache[ca_certs] 111 def _create_ssl_context(ca_certs): argument 117 context.load_verify_locations(cafile=ca_certs)
|
/dports/devel/fbthrift/fbthrift-2021.12.27.00/thrift/lib/py/transport/ |
H A D | TSSLSocket.py | 92 ca_certs=ca_certs, 122 ca_certs=None, keyfile=None, certfile=None, argument 132 if ca_certs is not None: 134 cafile=ca_certs, 156 ca_certs=None, argument 199 self.ca_certs = ca_certs 221 ca_certs=self.ca_certs, 310 self.setCertReqs(cert_reqs, ca_certs) 329 def setCertReqs(self, cert_reqs, ca_certs): argument 335 self.ca_certs = ca_certs [all …]
|
/dports/lang/spidermonkey78/firefox-78.9.0/third_party/python/urllib3/test/with_dummyserver/ |
H A D | test_https.py | 157 ca_certs=DEFAULT_CA, 174 ca_certs=DEFAULT_CA, 184 ca_certs=DEFAULT_CA, 424 ca_certs=DEFAULT_CA, 547 https_pool.ca_certs = DEFAULT_CA 624 ca_certs=DEFAULT_CA, 636 https_pool.ca_certs = DEFAULT_CA 735 ca_certs=no_san_server.ca_certs, 754 ca_certs=ip_san_server.ca_certs, 767 ca_certs=ipv6_addr_server.ca_certs, [all …]
|
/dports/net/py-urllib3/urllib3-1.26.7/test/with_dummyserver/ |
H A D | test_https.py | 157 ca_certs=DEFAULT_CA, 174 ca_certs=DEFAULT_CA, 184 ca_certs=DEFAULT_CA, 433 ca_certs=DEFAULT_CA, 558 https_pool.ca_certs = DEFAULT_CA 635 ca_certs=DEFAULT_CA, 768 ca_certs=DEFAULT_CA, 855 ca_certs=no_san_server.ca_certs, 869 ca_certs=ipv4_san_server.ca_certs, 883 ca_certs=ipv6_addr_server.ca_certs, [all …]
|
/dports/www/chromium-legacy/chromium-88.0.4324.182/third_party/catapult/third_party/gsutil/gslib/vendored/boto/boto/ |
H A D | https_connection.py | 92 ca_certs=None, strict=None, **kwargs): argument 114 self.ca_certs = ca_certs 123 if self.ca_certs: 124 msg += "CA certificate file=%s" % self.ca_certs 133 if self.ca_certs: 134 context.load_verify_locations(self.ca_certs) 143 self.sock.ca_certs = self.ca_certs 149 ca_certs=self.ca_certs)
|
/dports/net/google-cloud-sdk/google-cloud-sdk/platform/gsutil/gslib/vendored/boto/boto/ |
H A D | https_connection.py | 92 ca_certs=None, strict=None, **kwargs): argument 114 self.ca_certs = ca_certs 123 if self.ca_certs: 124 msg += "CA certificate file=%s" % self.ca_certs 133 if self.ca_certs: 134 context.load_verify_locations(self.ca_certs) 143 self.sock.ca_certs = self.ca_certs 149 ca_certs=self.ca_certs)
|
/dports/devel/py-RPyC/rpyc-5.0.1/rpyc/utils/ |
H A D | authenticators.py | 60 def __init__(self, keyfile, certfile, ca_certs=None, cert_reqs=None, argument 64 self.ca_certs = str(ca_certs) if ca_certs else None 67 if ca_certs: 77 server_side=True, ca_certs=self.ca_certs, cert_reqs=self.cert_reqs,
|
/dports/lang/ruby26/ruby-2.6.9/test/openssl/ |
H A D | test_pkcs12.rb | 57 assert_nil pkcs12.ca_certs 69 assert_nil pkcs12.ca_certs 85 assert_equal chain, pkcs12.ca_certs 102 assert_equal chain.size, decoded.ca_certs.size 103 assert_include_cert @cacert, decoded.ca_certs 104 assert_include_cert @inter_cacert, decoded.ca_certs 220 assert_equal [], Array(p12.ca_certs) 249 assert_equal 1, p12.ca_certs.size 250 assert_equal @mycert.subject.to_der, p12.ca_certs[0].subject.to_der 279 assert_equal [], Array(p12.ca_certs)
|
/dports/net/storj/storj-1.45.3/vendor/github.com/apache/thrift/lib/py/test/ |
H A D | test_sslsocket.py | 166 TSSLSocket('localhost', 0, validate=True, ca_certs=SERVER_CERT) 187 c1 = TSSLSocket('localhost', 0, validate=True, ca_certs=SERVER_CERT) 248 certfile=SERVER_CERT, ca_certs=CLIENT_CERT) 253 certfile=SERVER_CERT, ca_certs=CLIENT_CA) 258 certfile=SERVER_CERT, ca_certs=CLIENT_CA) 263 certfile=SERVER_CERT, ca_certs=CLIENT_CA) 268 self._assert_connection_success(server, ca_certs=SERVER_CERT, ciphers=TEST_CIPHERS) 275 self._assert_connection_failure(server, ca_certs=SERVER_CERT, ciphers='NULL') 278 self._assert_connection_failure(server, ca_certs=SERVER_CERT, ciphers='NULL') 288 self._assert_connection_failure(server, ca_certs=SERVER_CERT) [all …]
|
/dports/www/fabio/fabio-1.5.14/vendor/github.com/apache/thrift/thrift-da1169d75b15/lib/py/test/ |
H A D | test_sslsocket.py | 166 TSSLSocket('localhost', 0, validate=True, ca_certs=SERVER_CERT) 187 c1 = TSSLSocket('localhost', 0, validate=True, ca_certs=SERVER_CERT) 248 certfile=SERVER_CERT, ca_certs=CLIENT_CERT) 253 certfile=SERVER_CERT, ca_certs=CLIENT_CA) 258 certfile=SERVER_CERT, ca_certs=CLIENT_CA) 263 certfile=SERVER_CERT, ca_certs=CLIENT_CA) 268 self._assert_connection_success(server, ca_certs=SERVER_CERT, ciphers=TEST_CIPHERS) 275 self._assert_connection_failure(server, ca_certs=SERVER_CERT, ciphers='NULL') 278 self._assert_connection_failure(server, ca_certs=SERVER_CERT, ciphers='NULL') 288 self._assert_connection_failure(server, ca_certs=SERVER_CERT) [all …]
|
/dports/www/gitlab-workhorse/gitlab-foss-0a901d60f8ae4a60c04ae82e6e9c3a03e9321417/lib/gitlab/x509/ |
H A D | certificate.rb | 19 ca_certs.map(&:to_pem).join('\n') unless ca_certs.blank? 29 ca_certs = load_ca_certs_bundle(ca_certs_string) 31 new(key, cert, ca_certs) 77 def initialize(key, cert, ca_certs = nil) argument 80 @ca_certs = ca_certs
|
/dports/security/p5-openxpki-i18n/openxpki-3.16.1/core/server/OpenXPKI/Server/API2/Plugin/Token/ |
H A D | get_trust_anchors.pm | 94 my $ca_certs = $self->api->list_active_aliases( type => 'certsign', pki_realm => $realm ); 96 push @trust_anchors, map { $_->{identifier} } @{$ca_certs}; 103 my $ca_certs = $self->api->list_active_aliases( group => $alias, pki_realm => $pki_realm ); 105 if (!scalar @{$ca_certs}) { 107 $ca_certs = $self->api->list_active_aliases( group => $alias, pki_realm => '_global' ); 110 push @trust_anchors, map { $_->{identifier} } @{$ca_certs};
|
/dports/security/p5-openxpki/openxpki-3.16.1/core/server/OpenXPKI/Server/API2/Plugin/Token/ |
H A D | get_trust_anchors.pm | 94 my $ca_certs = $self->api->list_active_aliases( type => 'certsign', pki_realm => $realm ); 96 push @trust_anchors, map { $_->{identifier} } @{$ca_certs}; 103 my $ca_certs = $self->api->list_active_aliases( group => $alias, pki_realm => $pki_realm ); 105 if (!scalar @{$ca_certs}) { 107 $ca_certs = $self->api->list_active_aliases( group => $alias, pki_realm => '_global' ); 110 push @trust_anchors, map { $_->{identifier} } @{$ca_certs};
|
/dports/www/grafana8/grafana-8.3.6/vendor/github.com/apache/thrift/lib/py/test/ |
H A D | test_sslsocket.py | 172 TSSLSocket('localhost', 0, validate=True, ca_certs=SERVER_CERT) 193 c1 = TSSLSocket('localhost', 0, validate=True, ca_certs=SERVER_CERT) 255 certfile=SERVER_CERT, ca_certs=CLIENT_CERT) 260 certfile=SERVER_CERT, ca_certs=CLIENT_CA) 265 certfile=SERVER_CERT, ca_certs=CLIENT_CA) 270 certfile=SERVER_CERT, ca_certs=CLIENT_CA) 275 self._assert_connection_success(server, ca_certs=SERVER_CERT, ciphers=TEST_CIPHERS) 282 self._assert_connection_failure(server, ca_certs=SERVER_CERT, ciphers='NULL') 285 self._assert_connection_failure(server, ca_certs=SERVER_CERT, ciphers='NULL') 295 self._assert_connection_failure(server, ca_certs=SERVER_CERT) [all …]
|
/dports/devel/thrift-c_glib/thrift-0.14.0/lib/py/test/ |
H A D | test_sslsocket.py | 172 TSSLSocket('localhost', 0, validate=True, ca_certs=SERVER_CERT) 193 c1 = TSSLSocket('localhost', 0, validate=True, ca_certs=SERVER_CERT) 255 certfile=SERVER_CERT, ca_certs=CLIENT_CERT) 260 certfile=SERVER_CERT, ca_certs=CLIENT_CA) 265 certfile=SERVER_CERT, ca_certs=CLIENT_CA) 270 certfile=SERVER_CERT, ca_certs=CLIENT_CA) 275 self._assert_connection_success(server, ca_certs=SERVER_CERT, ciphers=TEST_CIPHERS) 282 self._assert_connection_failure(server, ca_certs=SERVER_CERT, ciphers='NULL') 285 self._assert_connection_failure(server, ca_certs=SERVER_CERT, ciphers='NULL') 295 self._assert_connection_failure(server, ca_certs=SERVER_CERT) [all …]
|
/dports/devel/thrift-cpp/thrift-0.14.0/lib/py/test/ |
H A D | test_sslsocket.py | 172 TSSLSocket('localhost', 0, validate=True, ca_certs=SERVER_CERT) 193 c1 = TSSLSocket('localhost', 0, validate=True, ca_certs=SERVER_CERT) 255 certfile=SERVER_CERT, ca_certs=CLIENT_CERT) 260 certfile=SERVER_CERT, ca_certs=CLIENT_CA) 265 certfile=SERVER_CERT, ca_certs=CLIENT_CA) 270 certfile=SERVER_CERT, ca_certs=CLIENT_CA) 275 self._assert_connection_success(server, ca_certs=SERVER_CERT, ciphers=TEST_CIPHERS) 282 self._assert_connection_failure(server, ca_certs=SERVER_CERT, ciphers='NULL') 285 self._assert_connection_failure(server, ca_certs=SERVER_CERT, ciphers='NULL') 295 self._assert_connection_failure(server, ca_certs=SERVER_CERT) [all …]
|
/dports/devel/thrift/thrift-0.14.0/lib/py/test/ |
H A D | test_sslsocket.py | 172 TSSLSocket('localhost', 0, validate=True, ca_certs=SERVER_CERT) 193 c1 = TSSLSocket('localhost', 0, validate=True, ca_certs=SERVER_CERT) 255 certfile=SERVER_CERT, ca_certs=CLIENT_CERT) 260 certfile=SERVER_CERT, ca_certs=CLIENT_CA) 265 certfile=SERVER_CERT, ca_certs=CLIENT_CA) 270 certfile=SERVER_CERT, ca_certs=CLIENT_CA) 275 self._assert_connection_success(server, ca_certs=SERVER_CERT, ciphers=TEST_CIPHERS) 282 self._assert_connection_failure(server, ca_certs=SERVER_CERT, ciphers='NULL') 285 self._assert_connection_failure(server, ca_certs=SERVER_CERT, ciphers='NULL') 295 self._assert_connection_failure(server, ca_certs=SERVER_CERT) [all …]
|
/dports/misc/concourse/concourse-6.7.2/vendor/github.com/apache/thrift/lib/py/test/ |
H A D | test_sslsocket.py | 172 TSSLSocket('localhost', 0, validate=True, ca_certs=SERVER_CERT) 193 c1 = TSSLSocket('localhost', 0, validate=True, ca_certs=SERVER_CERT) 255 certfile=SERVER_CERT, ca_certs=CLIENT_CERT) 260 certfile=SERVER_CERT, ca_certs=CLIENT_CA) 265 certfile=SERVER_CERT, ca_certs=CLIENT_CA) 270 certfile=SERVER_CERT, ca_certs=CLIENT_CA) 275 self._assert_connection_success(server, ca_certs=SERVER_CERT, ciphers=TEST_CIPHERS) 282 self._assert_connection_failure(server, ca_certs=SERVER_CERT, ciphers='NULL') 285 self._assert_connection_failure(server, ca_certs=SERVER_CERT, ciphers='NULL') 295 self._assert_connection_failure(server, ca_certs=SERVER_CERT) [all …]
|
/dports/devel/node-thrift/thrift-0.14.0/lib/py/test/ |
H A D | test_sslsocket.py | 172 TSSLSocket('localhost', 0, validate=True, ca_certs=SERVER_CERT) 193 c1 = TSSLSocket('localhost', 0, validate=True, ca_certs=SERVER_CERT) 255 certfile=SERVER_CERT, ca_certs=CLIENT_CERT) 260 certfile=SERVER_CERT, ca_certs=CLIENT_CA) 265 certfile=SERVER_CERT, ca_certs=CLIENT_CA) 270 certfile=SERVER_CERT, ca_certs=CLIENT_CA) 275 self._assert_connection_success(server, ca_certs=SERVER_CERT, ciphers=TEST_CIPHERS) 282 self._assert_connection_failure(server, ca_certs=SERVER_CERT, ciphers='NULL') 285 self._assert_connection_failure(server, ca_certs=SERVER_CERT, ciphers='NULL') 295 self._assert_connection_failure(server, ca_certs=SERVER_CERT) [all …]
|
/dports/devel/py-thrift/thrift-0.14.0/lib/py/test/ |
H A D | test_sslsocket.py | 172 TSSLSocket('localhost', 0, validate=True, ca_certs=SERVER_CERT) 193 c1 = TSSLSocket('localhost', 0, validate=True, ca_certs=SERVER_CERT) 255 certfile=SERVER_CERT, ca_certs=CLIENT_CERT) 260 certfile=SERVER_CERT, ca_certs=CLIENT_CA) 265 certfile=SERVER_CERT, ca_certs=CLIENT_CA) 270 certfile=SERVER_CERT, ca_certs=CLIENT_CA) 275 self._assert_connection_success(server, ca_certs=SERVER_CERT, ciphers=TEST_CIPHERS) 282 self._assert_connection_failure(server, ca_certs=SERVER_CERT, ciphers='NULL') 285 self._assert_connection_failure(server, ca_certs=SERVER_CERT, ciphers='NULL') 295 self._assert_connection_failure(server, ca_certs=SERVER_CERT) [all …]
|
/dports/net/google-cloud-sdk/google-cloud-sdk/lib/googlecloudsdk/core/ |
H A D | http.py | 36 def Http(timeout='unset', response_encoding=None, ca_certs=None): argument 56 http_client = _CreateRawHttpClient(timeout, ca_certs) 65 ca_certs=httplib2.CA_CERTS, argument 87 ca_certs=ca_certs, 100 def _CreateRawHttpClient(timeout='unset', ca_certs=None): argument 114 ca_certs = ca_certs_property 116 ca_certs = None 119 ca_certs=ca_certs,
|
H A D | transports.py | 28 ca_certs=None): argument 45 session = requests.GetSession(timeout=timeout, ca_certs=ca_certs) 51 timeout=timeout, response_encoding=response_encoding, ca_certs=ca_certs)
|
/dports/www/chromium-legacy/chromium-88.0.4324.182/third_party/depot_tools/external_bin/gsutil/gsutil_4.28/gsutil/third_party/boto/boto/ |
H A D | https_connection.py | 92 ca_certs=None, strict=None, **kwargs): argument 114 self.ca_certs = ca_certs 123 if self.ca_certs: 124 msg += "CA certificate file=%s" % self.ca_certs 131 ca_certs=self.ca_certs)
|
/dports/devel/py-boto/boto-2.49.0/boto/ |
H A D | https_connection.py | 92 ca_certs=None, strict=None, **kwargs): argument 114 self.ca_certs = ca_certs 123 if self.ca_certs: 124 msg += "CA certificate file=%s" % self.ca_certs 131 ca_certs=self.ca_certs)
|
/dports/sysutils/uefi-edk2-bhyve-csm/uefi-edk2-aa8d718/AppPkg/Applications/Python/Python-2.7.2/Lib/ |
H A D | ssl.py | 102 ssl_version=PROTOCOL_SSLv23, ca_certs=None, argument 131 cert_reqs, ssl_version, ca_certs, 139 self.ca_certs = ca_certs 305 self.ca_certs, self.ciphers) 342 ca_certs=self.ca_certs, 363 ssl_version=PROTOCOL_SSLv23, ca_certs=None, argument 369 ssl_version=ssl_version, ca_certs=ca_certs, 419 def get_server_certificate(addr, ssl_version=PROTOCOL_SSLv3, ca_certs=None): argument 427 if (ca_certs is not None): 432 cert_reqs=cert_reqs, ca_certs=ca_certs)
|