Home
last modified time | relevance | path

Searched refs:ca_cert (Results 1 – 25 of 1137) sorted by relevance

12345678910>>...46

/dports/net/hostapd-devel/hostap-14ab4a816/tests/hwsim/
H A Dtest_eap.py70 ca_cert="auth_serv/ca.pem",
80 ca_cert="auth_serv/ca.pem",
90 ca_cert="auth_serv/ca.pem",
120 ca_cert="auth_serv/ca.pem",
132 ca_cert="auth_serv/ca.pem",
143 ca_cert="auth_serv/ca.pem",
154 ca_cert="auth_serv/ca.pem",
167 ca_cert="auth_serv/ca.pem",
178 ca_cert="auth_serv/ca.pem",
450 ca_cert="auth_serv/ca.pem",
[all …]
H A Dtest_ap_eap.py2076 ca_cert="auth_serv/ca.pem",
2083 ca_cert="auth_serv/ca.pem",
4539 ca_cert=ca_cert,
4614 ca_cert=ca_cert,
4650 ca_cert=ca_cert,
4700 ca_cert=ca_cert,
4767 ca_cert=ca_cert,
5758 with open(ca_cert, 'w') as f:
5761 params['ca_cert'] = ca_cert
5773 with open(ca_cert, 'w') as f:
[all …]
H A Dtest_authsrv.py37 ca_cert="auth_serv/ca.pem", phase2="autheap=GTC",
50 ca_cert="auth_serv/ca.pem", phase2="autheap=GTC",
60 ca_cert="auth_serv/ca.pem", phase2="autheap=GTC",
71 ca_cert="auth_serv/ca.pem", phase2="autheap=GTC",
81 ca_cert="auth_serv/ca.pem", phase2="autheap=GTC",
94 ca_cert="auth_serv/ca.pem", phase2="autheap=GTC",
109 ca_cert="auth_serv/ca.pem", phase2="autheap=GTC",
121 ca_cert="auth_serv/ca.pem", phase2="autheap=GTC",
220 ca_cert="auth_serv/ca.pem", phase2="autheap=GTC",
238 ca_cert="auth_serv/ca.pem", phase2="autheap=GTC",
[all …]
H A Dtest_tnc.py22 ca_cert="auth_serv/ca.pem",
30 ca_cert="auth_serv/ca.pem",
38 ca_cert="auth_serv/ca.pem",
56 ca_cert="auth_serv/ca.pem",
67 ca_cert="auth_serv/ca.pem",
89 ca_cert="auth_serv/ca.pem",
108 ca_cert="auth_serv/ca.pem",
160 ca_cert="auth_serv/ca.pem", phase2=phase2,
192 ca_cert="auth_serv/ca.pem",
/dports/security/wpa_supplicant-devel/hostap-14ab4a816/tests/hwsim/
H A Dtest_eap.py70 ca_cert="auth_serv/ca.pem",
80 ca_cert="auth_serv/ca.pem",
90 ca_cert="auth_serv/ca.pem",
120 ca_cert="auth_serv/ca.pem",
132 ca_cert="auth_serv/ca.pem",
143 ca_cert="auth_serv/ca.pem",
154 ca_cert="auth_serv/ca.pem",
167 ca_cert="auth_serv/ca.pem",
178 ca_cert="auth_serv/ca.pem",
450 ca_cert="auth_serv/ca.pem",
[all …]
H A Dtest_ap_eap.py2076 ca_cert="auth_serv/ca.pem",
2083 ca_cert="auth_serv/ca.pem",
4539 ca_cert=ca_cert,
4614 ca_cert=ca_cert,
4650 ca_cert=ca_cert,
4700 ca_cert=ca_cert,
4767 ca_cert=ca_cert,
5758 with open(ca_cert, 'w') as f:
5761 params['ca_cert'] = ca_cert
5773 with open(ca_cert, 'w') as f:
[all …]
H A Dtest_authsrv.py37 ca_cert="auth_serv/ca.pem", phase2="autheap=GTC",
50 ca_cert="auth_serv/ca.pem", phase2="autheap=GTC",
60 ca_cert="auth_serv/ca.pem", phase2="autheap=GTC",
71 ca_cert="auth_serv/ca.pem", phase2="autheap=GTC",
81 ca_cert="auth_serv/ca.pem", phase2="autheap=GTC",
94 ca_cert="auth_serv/ca.pem", phase2="autheap=GTC",
109 ca_cert="auth_serv/ca.pem", phase2="autheap=GTC",
121 ca_cert="auth_serv/ca.pem", phase2="autheap=GTC",
220 ca_cert="auth_serv/ca.pem", phase2="autheap=GTC",
238 ca_cert="auth_serv/ca.pem", phase2="autheap=GTC",
[all …]
H A Dtest_tnc.py22 ca_cert="auth_serv/ca.pem",
30 ca_cert="auth_serv/ca.pem",
38 ca_cert="auth_serv/ca.pem",
56 ca_cert="auth_serv/ca.pem",
67 ca_cert="auth_serv/ca.pem",
89 ca_cert="auth_serv/ca.pem",
108 ca_cert="auth_serv/ca.pem",
160 ca_cert="auth_serv/ca.pem", phase2=phase2,
192 ca_cert="auth_serv/ca.pem",
/dports/sysutils/docker-compose/docker-compose-1.24.0/tests/unit/cli/
H A Ddocker_client_test.py72 ca_cert = os.path.join(cert_path, 'ca.pem') variable in TLSConfigTestCase
87 assert result.ca_cert == options['--tlscacert']
92 '--tlscacert': self.ca_cert, '--tls': True,
97 assert result.ca_cert == options['--tlscacert']
125 assert result.ca_cert == options['--tlscacert']
137 assert result.ca_cert == options['--tlscacert']
157 '--tlscacert': '"{0}"'.format(self.ca_cert),
165 assert result.ca_cert == self.ca_cert
182 assert result.ca_cert == self.ca_cert
200 assert result.ca_cert == self.ca_cert
[all …]
/dports/devel/py-docker-py/docker-py-1.7.2/docker/
H A Dtls.py9 ca_cert = None variable in TLSConfig
13 def __init__(self, client_cert=None, ca_cert=None, verify=None, argument
49 self.ca_cert = ca_cert
50 if self.verify and self.ca_cert and not os.path.isfile(self.ca_cert):
58 if self.verify and self.ca_cert:
59 client.verify = self.ca_cert
/dports/net/google-cloud-sdk/google-cloud-sdk/lib/third_party/docker/
H A Dtls.py24 ca_cert = None variable in TLSConfig
28 def __init__(self, client_cert=None, ca_cert=None, verify=None, argument
88 self.ca_cert = ca_cert
89 if self.verify and self.ca_cert and not os.path.isfile(self.ca_cert):
100 if self.verify and self.ca_cert:
101 client.verify = self.ca_cert
/dports/sysutils/py-docker/docker-5.0.3/docker/
H A Dtls.py24 ca_cert = None variable in TLSConfig
28 def __init__(self, client_cert=None, ca_cert=None, verify=None, argument
88 self.ca_cert = ca_cert
89 if self.verify and self.ca_cert and not os.path.isfile(self.ca_cert):
100 if self.verify and self.ca_cert:
101 client.verify = self.ca_cert
/dports/www/gitlab-workhorse/gitlab-foss-0a901d60f8ae4a60c04ae82e6e9c3a03e9321417/app/models/clusters/applications/
H A Dhelm.rb52 ca_key.present? && ca_cert.present?
59 'ca.pem': ca_cert,
66 ca_cert = Gitlab::Kubernetes::Helm::V2::Certificate.generate_root
67 self.ca_key = ca_cert.key_string
68 self.ca_cert = ca_cert.cert_string
79 .from_strings(ca_key, ca_cert)
/dports/www/butterfly/butterfly-2.0.1/
H A Dbutterfly.server.py164 ca_cert = crypto.X509() variable
166 fill_fields(ca_cert.get_subject())
167 ca_cert.set_serial_number(uuid.uuid4().int)
168 ca_cert.gmtime_adj_notBefore(0) # From now
169 ca_cert.gmtime_adj_notAfter(315360000) # to 10y
170 ca_cert.set_issuer(ca_cert.get_subject()) # Self signed
171 ca_cert.set_pubkey(ca_pk)
172 ca_cert.sign(ca_pk, 'sha512')
190 server_cert.set_issuer(ca_cert.get_subject()) # Signed by ca
240 client_cert.set_issuer(ca_cert.get_subject()) # Signed by ca
[all …]
/dports/security/py-trustme/trustme-0.9.0/tests/
H A Dtest_trustme.py33 def _path_length(ca_cert): argument
39 def assert_is_ca(ca_cert): argument
88 ca_cert = x509.load_pem_x509_certificate(
90 assert ca_cert.not_valid_before <= today <= ca_cert.not_valid_after
98 assert ca_cert.issuer == ca_cert.subject
99 assert_is_ca(ca_cert)
142 for rdn in ca_cert.subject.rdns
196 assert_is_ca(ca_cert)
197 assert ca_cert.issuer == ca_cert.subject
198 assert _path_length(ca_cert) == 9
[all …]
/dports/sysutils/docker-compose/docker-compose-1.24.0/compose/cli/
H A Ddocker_client.py49 ca_cert = unquote_path(options.get('--tlscacert'))
58 if cert_path is not None and not any((ca_cert, cert, key)):
62 ca_cert = os.path.join(cert_path, 'ca.pem')
64 if verify and not any((ca_cert, cert, key)):
66 ca_cert = os.path.join(default_cert_path(), 'ca.pem')
72 advanced_opts = any([ca_cert, cert, key, verify, tls_version])
82 client_cert=client_cert, verify=verify, ca_cert=ca_cert,
/dports/net/grpcui/grpcui-1.1.0/vendor/google.golang.org/grpc/security/advancedtls/testdata/
H A DREADME.md8 Supposing we are going to create a `subject_cert.pem` that is trusted by `ca_cert.pem`, here are the
11 1. Generate the private key, `ca_key.pem`, and the cert `ca_cert.pem`, for the CA:
14 …$ openssl req -x509 -newkey rsa:4096 -keyout ca_key.pem -out ca_cert.pem -nodes -days $DURATION_DA…
29 4. Use `ca_key.pem` and `ca_cert.pem` to sign `csr.pem`, and get a certificate, `subject_cert.pem`,…
34 …icy -extensions signing_req -out subject_cert.pem -in csr.pem -keyfile ca_key.pem -cert ca_cert.pem
36 5. Verify the `subject_cert.pem` is trusted by `ca_cert.pem`:
40 $ openssl verify -verbose -CAfile ca_cert.pem subject_cert.pem
/dports/security/vault/vault-1.8.2/vendor/google.golang.org/grpc/security/advancedtls/testdata/
H A DREADME.md8 Supposing we are going to create a `subject_cert.pem` that is trusted by `ca_cert.pem`, here are the
11 1. Generate the private key, `ca_key.pem`, and the cert `ca_cert.pem`, for the CA:
14 …$ openssl req -x509 -newkey rsa:4096 -keyout ca_key.pem -out ca_cert.pem -nodes -days $DURATION_DA…
29 4. Use `ca_key.pem` and `ca_cert.pem` to sign `csr.pem`, and get a certificate, `subject_cert.pem`,…
34 …icy -extensions signing_req -out subject_cert.pem -in csr.pem -keyfile ca_key.pem -cert ca_cert.pem
36 5. Verify the `subject_cert.pem` is trusted by `ca_cert.pem`:
40 $ openssl verify -verbose -CAfile ca_cert.pem subject_cert.pem
/dports/net/evans/evans-0.9.1/vendor/google.golang.org/grpc/security/advancedtls/testdata/
H A DREADME.md8 Supposing we are going to create a `subject_cert.pem` that is trusted by `ca_cert.pem`, here are the
11 1. Generate the private key, `ca_key.pem`, and the cert `ca_cert.pem`, for the CA:
14 …$ openssl req -x509 -newkey rsa:4096 -keyout ca_key.pem -out ca_cert.pem -nodes -days $DURATION_DA…
29 4. Use `ca_key.pem` and `ca_cert.pem` to sign `csr.pem`, and get a certificate, `subject_cert.pem`,…
34 …icy -extensions signing_req -out subject_cert.pem -in csr.pem -keyfile ca_key.pem -cert ca_cert.pem
36 5. Verify the `subject_cert.pem` is trusted by `ca_cert.pem`:
40 $ openssl verify -verbose -CAfile ca_cert.pem subject_cert.pem
/dports/sysutils/helmfile/helmfile-0.138.7/vendor/google.golang.org/grpc/security/advancedtls/testdata/
H A DREADME.md8 Supposing we are going to create a `subject_cert.pem` that is trusted by `ca_cert.pem`, here are the
11 1. Generate the private key, `ca_key.pem`, and the cert `ca_cert.pem`, for the CA:
14 …$ openssl req -x509 -newkey rsa:4096 -keyout ca_key.pem -out ca_cert.pem -nodes -days $DURATION_DA…
29 4. Use `ca_key.pem` and `ca_cert.pem` to sign `csr.pem`, and get a certificate, `subject_cert.pem`,…
34 …icy -extensions signing_req -out subject_cert.pem -in csr.pem -keyfile ca_key.pem -cert ca_cert.pem
36 5. Verify the `subject_cert.pem` is trusted by `ca_cert.pem`:
40 $ openssl verify -verbose -CAfile ca_cert.pem subject_cert.pem
/dports/www/pomerium/pomerium-0.8.3/vendor/google.golang.org/grpc/security/advancedtls/testdata/
H A DREADME.md8 Supposing we are going to create a `subject_cert.pem` that is trusted by `ca_cert.pem`, here are the
11 1. Generate the private key, `ca_key.pem`, and the cert `ca_cert.pem`, for the CA:
14 …$ openssl req -x509 -newkey rsa:4096 -keyout ca_key.pem -out ca_cert.pem -nodes -days $DURATION_DA…
29 4. Use `ca_key.pem` and `ca_cert.pem` to sign `csr.pem`, and get a certificate, `subject_cert.pem`,…
34 …icy -extensions signing_req -out subject_cert.pem -in csr.pem -keyfile ca_key.pem -cert ca_cert.pem
36 5. Verify the `subject_cert.pem` is trusted by `ca_cert.pem`:
40 $ openssl verify -verbose -CAfile ca_cert.pem subject_cert.pem
/dports/net-im/dendrite/dendrite-0.5.1/vendor/google.golang.org/grpc/security/advancedtls/testdata/
H A DREADME.md8 Supposing we are going to create a `subject_cert.pem` that is trusted by `ca_cert.pem`, here are the
11 1. Generate the private key, `ca_key.pem`, and the cert `ca_cert.pem`, for the CA:
14 …$ openssl req -x509 -newkey rsa:4096 -keyout ca_key.pem -out ca_cert.pem -nodes -days $DURATION_DA…
29 4. Use `ca_key.pem` and `ca_cert.pem` to sign `csr.pem`, and get a certificate, `subject_cert.pem`,…
34 …icy -extensions signing_req -out subject_cert.pem -in csr.pem -keyfile ca_key.pem -cert ca_cert.pem
36 5. Verify the `subject_cert.pem` is trusted by `ca_cert.pem`:
40 $ openssl verify -verbose -CAfile ca_cert.pem subject_cert.pem
/dports/sysutils/gomplate/gomplate-3.9.0/vendor/google.golang.org/grpc/security/advancedtls/testdata/
H A DREADME.md8 Supposing we are going to create a `subject_cert.pem` that is trusted by `ca_cert.pem`, here are the
11 1. Generate the private key, `ca_key.pem`, and the cert `ca_cert.pem`, for the CA:
14 …$ openssl req -x509 -newkey rsa:4096 -keyout ca_key.pem -out ca_cert.pem -nodes -days $DURATION_DA…
29 4. Use `ca_key.pem` and `ca_cert.pem` to sign `csr.pem`, and get a certificate, `subject_cert.pem`,…
34 …icy -extensions signing_req -out subject_cert.pem -in csr.pem -keyfile ca_key.pem -cert ca_cert.pem
36 5. Verify the `subject_cert.pem` is trusted by `ca_cert.pem`:
40 $ openssl verify -verbose -CAfile ca_cert.pem subject_cert.pem
/dports/devel/gitlab-runner/gitlab-runner-8925d9a06fd8e452e2161a768462652a2a13111f/vendor/google.golang.org/grpc/grpc-go-1.34.0/security/advancedtls/testdata/
H A DREADME.md8 Supposing we are going to create a `subject_cert.pem` that is trusted by `ca_cert.pem`, here are the
11 1. Generate the private key, `ca_key.pem`, and the cert `ca_cert.pem`, for the CA:
14 …$ openssl req -x509 -newkey rsa:4096 -keyout ca_key.pem -out ca_cert.pem -nodes -days $DURATION_DA…
29 4. Use `ca_key.pem` and `ca_cert.pem` to sign `csr.pem`, and get a certificate, `subject_cert.pem`,…
34 …icy -extensions signing_req -out subject_cert.pem -in csr.pem -keyfile ca_key.pem -cert ca_cert.pem
36 5. Verify the `subject_cert.pem` is trusted by `ca_cert.pem`:
40 $ openssl verify -verbose -CAfile ca_cert.pem subject_cert.pem
/dports/sysutils/istio/istio-1.6.7/vendor/google.golang.org/grpc/security/advancedtls/testdata/
H A DREADME.md8 Supposing we are going to create a `subject_cert.pem` that is trusted by `ca_cert.pem`, here are the
11 1. Generate the private key, `ca_key.pem`, and the cert `ca_cert.pem`, for the CA:
14 …$ openssl req -x509 -newkey rsa:4096 -keyout ca_key.pem -out ca_cert.pem -nodes -days $DURATION_DA…
29 4. Use `ca_key.pem` and `ca_cert.pem` to sign `csr.pem`, and get a certificate, `subject_cert.pem`,…
34 …icy -extensions signing_req -out subject_cert.pem -in csr.pem -keyfile ca_key.pem -cert ca_cert.pem
36 5. Verify the `subject_cert.pem` is trusted by `ca_cert.pem`:
40 $ openssl verify -verbose -CAfile ca_cert.pem subject_cert.pem

12345678910>>...46