/dports/sysutils/py-salt/salt-3004.1/salt/modules/ |
H A D | lxd.py | 542 verify_cert=True, argument 946 verify_cert=True, argument 1101 verify_cert=True, argument 1250 verify_cert=True, argument 1385 verify_cert=True, argument 1489 verify_cert=True, argument 1713 verify_cert=True, argument 1954 verify_cert=True, argument 2179 verify_cert=True, argument 2329 verify_cert=True, argument [all …]
|
/dports/sysutils/py-salt/salt-3004.1/salt/states/ |
H A D | lxd_image.py | 57 verify_cert=True, argument 166 "verify_cert": verify_cert, 173 name, remote_addr, cert, key, verify_cert, _raw=True 199 verify_cert=verify_cert, 214 verify_cert=verify_cert, 228 verify_cert=verify_cert, 241 verify_cert=verify_cert, 292 def absent(name, remote_addr=None, cert=None, key=None, verify_cert=True): argument 327 "verify_cert": verify_cert, 333 name, remote_addr, cert, key, verify_cert, _raw=True [all …]
|
H A D | lxd_container.py | 65 verify_cert=True, argument 204 "verify_cert": verify_cert, 247 verify_cert, 402 "verify_cert": verify_cert, 472 "verify_cert": verify_cert, 554 "verify_cert": verify_cert, 642 "verify_cert": verify_cert, 673 verify_cert, argument 747 "verify_cert": verify_cert, 770 src_verify_cert = verify_cert [all …]
|
H A D | lxd_profile.py | 55 verify_cert=True, argument 115 "verify_cert": verify_cert, 122 name, remote_addr, cert, key, verify_cert, _raw=True 143 name, config, devices, description, remote_addr, cert, key, verify_cert 186 def absent(name, remote_addr=None, cert=None, key=None, verify_cert=True): argument 227 "verify_cert": verify_cert, 232 __salt__["lxd.profile_get"](name, remote_addr, cert, key, verify_cert) 243 __salt__["lxd.profile_delete"](name, remote_addr, cert, key, verify_cert)
|
H A D | lxd.py | 203 def authenticate(name, remote_addr, password, cert, key, verify_cert=True): argument 248 "verify_cert": verify_cert, 252 client = __salt__["lxd.pylxd_client_get"](remote_addr, cert, key, verify_cert) 263 remote_addr, password, cert, key, verify_cert
|
/dports/security/vault/vault-1.8.2/vendor/github.com/apple/foundationdb/FDBLibTLS/ |
H A D | verify-test.cpp | 38 …input(input), valid(false), verify_cert(true), verify_time(true), subject_criteria({}), issuer_cri… in FDBLibTLSVerifyTest() 39 …FDBLibTLSVerifyTest(std::string input, bool verify_cert, bool verify_time, std::map<int, Criteria>… in FDBLibTLSVerifyTest() 40 …input(input), valid(true), verify_cert(verify_cert), verify_time(verify_time), subject_criteria(su… in FDBLibTLSVerifyTest() 48 bool verify_cert; member 101 if (verify->verify_cert != verify_cert) { in run() 102 std::cerr << "FAIL: Got verify cert " << verify->verify_cert << ", want " << verify_cert << "\n"; in run() 155 if (verify_rule->verify_cert != verify_rules[i]->verify_cert) { in policy_verify_test() 156 …err << "FAIL: Got verify cert " << verify_rule->verify_cert << ", want " << verify_rules[i]->verif… in policy_verify_test()
|
/dports/mail/mailman3/mailman-3.3.1/src/mailman/mta/ |
H A D | connection.py | 62 verify_cert=True, verify_hostname=True): argument 107 self.verify_cert = verify_cert 108 self.verify_hostname = verify_hostname and verify_cert 117 self._tls_context = self._get_tls_context(self.verify_cert, 199 def _get_tls_context(self, verify_cert, verify_hostname): argument 203 if verify_cert:
|
/dports/www/zola/zola-0.15.2/cargo-crates/webpki-0.22.0/src/ |
H A D | end_entity.rs | 16 cert, name, signed_data, verify_cert, DnsNameRef, Error, SignatureAlgorithm, Time, 99 verify_cert::build_chain( in verify_is_valid_tls_server_cert() 100 verify_cert::EKU_SERVER_AUTH, in verify_is_valid_tls_server_cert() 131 verify_cert::build_chain( in verify_is_valid_tls_client_cert() 132 verify_cert::EKU_CLIENT_AUTH, in verify_is_valid_tls_client_cert()
|
/dports/audio/ncspot/ncspot-0.9.3/cargo-crates/webpki-0.22.0/src/ |
H A D | end_entity.rs | 16 cert, name, signed_data, verify_cert, DnsNameRef, Error, SignatureAlgorithm, Time, 99 verify_cert::build_chain( in verify_is_valid_tls_server_cert() 100 verify_cert::EKU_SERVER_AUTH, in verify_is_valid_tls_server_cert() 131 verify_cert::build_chain( in verify_is_valid_tls_client_cert() 132 verify_cert::EKU_CLIENT_AUTH, in verify_is_valid_tls_client_cert()
|
/dports/security/vaultwarden/vaultwarden-1.23.1/cargo-crates/webpki-0.21.4/src/ |
H A D | webpki.rs | 58 mod verify_cert; module 141 verify_cert::build_chain( in verify_is_valid_tls_server_cert() 142 verify_cert::EKU_SERVER_AUTH, in verify_is_valid_tls_server_cert() 171 verify_cert::build_chain( in verify_is_valid_tls_client_cert() 172 verify_cert::EKU_CLIENT_AUTH, in verify_is_valid_tls_client_cert()
|
/dports/net/routinator/routinator-0.10.2/cargo-crates/webpki-0.21.4/src/ |
H A D | webpki.rs | 58 mod verify_cert; module 141 verify_cert::build_chain( in verify_is_valid_tls_server_cert() 142 verify_cert::EKU_SERVER_AUTH, in verify_is_valid_tls_server_cert() 171 verify_cert::build_chain( in verify_is_valid_tls_client_cert() 172 verify_cert::EKU_CLIENT_AUTH, in verify_is_valid_tls_client_cert()
|
/dports/dns/doh-proxy/doh-proxy-0.9.2/cargo-crates/webpki-0.21.4/src/ |
H A D | webpki.rs | 58 mod verify_cert; module 141 verify_cert::build_chain( in verify_is_valid_tls_server_cert() 142 verify_cert::EKU_SERVER_AUTH, in verify_is_valid_tls_server_cert() 171 verify_cert::build_chain( in verify_is_valid_tls_client_cert() 172 verify_cert::EKU_CLIENT_AUTH, in verify_is_valid_tls_client_cert()
|
/dports/www/ffsend/ffsend-ccd489ce2e75b91c0f17fbf13dbd91fe84f5ad98/cargo-crates/webpki-0.21.4/src/ |
H A D | webpki.rs | 58 mod verify_cert; module 141 verify_cert::build_chain( in verify_is_valid_tls_server_cert() 142 verify_cert::EKU_SERVER_AUTH, in verify_is_valid_tls_server_cert() 171 verify_cert::build_chain( in verify_is_valid_tls_client_cert() 172 verify_cert::EKU_CLIENT_AUTH, in verify_is_valid_tls_client_cert()
|
/dports/games/abstreet/abstreet-0.2.9-49-g74aca40c0/cargo-crates/webpki-0.21.2/src/ |
H A D | webpki.rs | 60 mod verify_cert; module 143 verify_cert::build_chain( in verify_is_valid_tls_server_cert() 144 verify_cert::EKU_SERVER_AUTH, in verify_is_valid_tls_server_cert() 173 verify_cert::build_chain( in verify_is_valid_tls_client_cert() 174 verify_cert::EKU_CLIENT_AUTH, in verify_is_valid_tls_client_cert()
|
/dports/net/krill/krill-0.9.4/cargo-crates/webpki-0.21.4/src/ |
H A D | webpki.rs | 58 mod verify_cert; module 141 verify_cert::build_chain( in verify_is_valid_tls_server_cert() 142 verify_cert::EKU_SERVER_AUTH, in verify_is_valid_tls_server_cert() 171 verify_cert::build_chain( in verify_is_valid_tls_client_cert() 172 verify_cert::EKU_CLIENT_AUTH, in verify_is_valid_tls_client_cert()
|
/dports/security/rustscan/RustScan-2.0.1/cargo-crates/webpki-0.21.3/src/ |
H A D | webpki.rs | 60 mod verify_cert; module 143 verify_cert::build_chain( in verify_is_valid_tls_server_cert() 144 verify_cert::EKU_SERVER_AUTH, in verify_is_valid_tls_server_cert() 173 verify_cert::build_chain( in verify_is_valid_tls_client_cert() 174 verify_cert::EKU_CLIENT_AUTH, in verify_is_valid_tls_client_cert()
|
/dports/www/zola/zola-0.15.2/cargo-crates/webpki-0.21.4/src/ |
H A D | webpki.rs | 58 mod verify_cert; module 141 verify_cert::build_chain( in verify_is_valid_tls_server_cert() 142 verify_cert::EKU_SERVER_AUTH, in verify_is_valid_tls_server_cert() 171 verify_cert::build_chain( in verify_is_valid_tls_client_cert() 172 verify_cert::EKU_CLIENT_AUTH, in verify_is_valid_tls_client_cert()
|
/dports/www/xh/xh-0.14.1/cargo-crates/webpki-0.21.4/src/ |
H A D | webpki.rs | 58 mod verify_cert; module 141 verify_cert::build_chain( in verify_is_valid_tls_server_cert() 142 verify_cert::EKU_SERVER_AUTH, in verify_is_valid_tls_server_cert() 171 verify_cert::build_chain( in verify_is_valid_tls_client_cert() 172 verify_cert::EKU_CLIENT_AUTH, in verify_is_valid_tls_client_cert()
|
/dports/www/miniserve/miniserve-0.18.0/cargo-crates/webpki-0.21.4/src/ |
H A D | webpki.rs | 58 mod verify_cert; module 141 verify_cert::build_chain( in verify_is_valid_tls_server_cert() 142 verify_cert::EKU_SERVER_AUTH, in verify_is_valid_tls_server_cert() 171 verify_cert::build_chain( in verify_is_valid_tls_client_cert() 172 verify_cert::EKU_CLIENT_AUTH, in verify_is_valid_tls_client_cert()
|
/dports/textproc/angle-grinder/angle-grinder-0.18.0/cargo-crates/webpki-0.21.4/src/ |
H A D | webpki.rs | 58 mod verify_cert; module 141 verify_cert::build_chain( in verify_is_valid_tls_server_cert() 142 verify_cert::EKU_SERVER_AUTH, in verify_is_valid_tls_server_cert() 171 verify_cert::build_chain( in verify_is_valid_tls_client_cert() 172 verify_cert::EKU_CLIENT_AUTH, in verify_is_valid_tls_client_cert()
|
/dports/devel/py-maturin/maturin-0.11.3/cargo-crates/webpki-0.21.4/src/ |
H A D | webpki.rs | 58 mod verify_cert; module 141 verify_cert::build_chain( in verify_is_valid_tls_server_cert() 142 verify_cert::EKU_SERVER_AUTH, in verify_is_valid_tls_server_cert() 171 verify_cert::build_chain( in verify_is_valid_tls_client_cert() 172 verify_cert::EKU_CLIENT_AUTH, in verify_is_valid_tls_client_cert()
|
/dports/www/qt5-webengine/qtwebengine-everywhere-src-5.15.2/src/3rdparty/chromium/third_party/boringssl/src/crypto/x509/ |
H A D | x509_test.cc | 2031 auto verify_cert = [&](X509 *leaf, unsigned flags, const char *host) { in TEST() local 2047 EXPECT_EQ(X509_V_OK, verify_cert(without_sans.get(), 0 /* no flags */, in TEST() 2052 verify_cert(with_ip.get(), 0 /* no flags */, "foo.host1.test")); in TEST() 2064 EXPECT_EQ(X509_V_OK, verify_cert(without_sans.get(), in TEST() 2092 verify_cert(with_ip.get(), X509_CHECK_FLAG_NEVER_CHECK_SUBJECT, in TEST() 2147 auto verify_cert = [&](X509 *leaf, unsigned flags, const char *host) { in TEST() local 2163 verify_cert(not_permitted.get(), 0 /* no flags */, in TEST() 2177 verify_cert(not_permitted_with_sans.get(), 0 /* no flags */, in TEST() 2205 auto verify_cert = [&root](X509 *leaf) { in TEST() local 2219 EXPECT_EQ(X509_V_ERR_INVALID_PURPOSE, verify_cert(leaf)); in TEST() [all …]
|
/dports/security/boringssl/boringssl-6a71840/crypto/x509/ |
H A D | x509_test.cc | 2031 auto verify_cert = [&](X509 *leaf, unsigned flags, const char *host) { in TEST() local 2047 EXPECT_EQ(X509_V_OK, verify_cert(without_sans.get(), 0 /* no flags */, in TEST() 2052 verify_cert(with_ip.get(), 0 /* no flags */, "foo.host1.test")); in TEST() 2064 EXPECT_EQ(X509_V_OK, verify_cert(without_sans.get(), in TEST() 2092 verify_cert(with_ip.get(), X509_CHECK_FLAG_NEVER_CHECK_SUBJECT, in TEST() 2147 auto verify_cert = [&](X509 *leaf, unsigned flags, const char *host) { in TEST() local 2163 verify_cert(not_permitted.get(), 0 /* no flags */, in TEST() 2177 verify_cert(not_permitted_with_sans.get(), 0 /* no flags */, in TEST() 2205 auto verify_cert = [&root](X509 *leaf) { in TEST() local 2219 EXPECT_EQ(X509_V_ERR_INVALID_PURPOSE, verify_cert(leaf)); in TEST() [all …]
|
/dports/misc/py-cinder/cinder-12.0.10/cinder/volume/drivers/coprhd/ |
H A D | scaleio.py | 316 verify_cert = self.configuration.scaleio_server_certificate_path 318 verify_cert = False 322 verify=verify_cert) 353 verify_cert = ( 356 verify_cert = False 360 verify=verify_cert) 369 verify=verify_cert)
|
/dports/devel/tcllib/tcllib-1.20/modules/pki/ |
H A D | pki.test | 126 test rsa-verify-certv1-1.0 {verify_cert} -setup { 132 ::pki::x509::verify_cert $pubcert [list $cacert] 137 test rsa-verify-certv3-1.0 {verify_cert} -setup { 143 ::pki::x509::verify_cert $pubcert [list $cacert] 148 test rsa-verify-badcertv1-1.0 {verify_cert} -setup { 154 ::pki::x509::verify_cert $pubcert [list $cacert] 159 test rsa-verify-badcertv3-1.0 {verify_cert} -setup { 165 ::pki::x509::verify_cert $pubcert [list $cacert] 170 test rsa-verify-badcertv3-2.0 {verify_cert} -setup { 181 ::pki::x509::verify_cert $pubcert [list $cacert]
|