/dports/net/hostapd-devel/hostap-14ab4a816/tests/hwsim/ |
H A D | test_eap.py | 70 ca_cert="auth_serv/ca.pem", 80 ca_cert="auth_serv/ca.pem", 90 ca_cert="auth_serv/ca.pem", 120 ca_cert="auth_serv/ca.pem", 132 ca_cert="auth_serv/ca.pem", 143 ca_cert="auth_serv/ca.pem", 154 ca_cert="auth_serv/ca.pem", 167 ca_cert="auth_serv/ca.pem", 178 ca_cert="auth_serv/ca.pem", 450 ca_cert="auth_serv/ca.pem", [all …]
|
H A D | test_ap_eap.py | 2076 ca_cert="auth_serv/ca.pem", 2083 ca_cert="auth_serv/ca.pem", 4539 ca_cert=ca_cert, 4614 ca_cert=ca_cert, 4650 ca_cert=ca_cert, 4700 ca_cert=ca_cert, 4767 ca_cert=ca_cert, 5758 with open(ca_cert, 'w') as f: 5761 params['ca_cert'] = ca_cert 5773 with open(ca_cert, 'w') as f: [all …]
|
H A D | test_authsrv.py | 37 ca_cert="auth_serv/ca.pem", phase2="autheap=GTC", 50 ca_cert="auth_serv/ca.pem", phase2="autheap=GTC", 60 ca_cert="auth_serv/ca.pem", phase2="autheap=GTC", 71 ca_cert="auth_serv/ca.pem", phase2="autheap=GTC", 81 ca_cert="auth_serv/ca.pem", phase2="autheap=GTC", 94 ca_cert="auth_serv/ca.pem", phase2="autheap=GTC", 109 ca_cert="auth_serv/ca.pem", phase2="autheap=GTC", 121 ca_cert="auth_serv/ca.pem", phase2="autheap=GTC", 220 ca_cert="auth_serv/ca.pem", phase2="autheap=GTC", 238 ca_cert="auth_serv/ca.pem", phase2="autheap=GTC", [all …]
|
H A D | test_tnc.py | 22 ca_cert="auth_serv/ca.pem", 30 ca_cert="auth_serv/ca.pem", 38 ca_cert="auth_serv/ca.pem", 56 ca_cert="auth_serv/ca.pem", 67 ca_cert="auth_serv/ca.pem", 89 ca_cert="auth_serv/ca.pem", 108 ca_cert="auth_serv/ca.pem", 160 ca_cert="auth_serv/ca.pem", phase2=phase2, 192 ca_cert="auth_serv/ca.pem",
|
/dports/security/wpa_supplicant-devel/hostap-14ab4a816/tests/hwsim/ |
H A D | test_eap.py | 70 ca_cert="auth_serv/ca.pem", 80 ca_cert="auth_serv/ca.pem", 90 ca_cert="auth_serv/ca.pem", 120 ca_cert="auth_serv/ca.pem", 132 ca_cert="auth_serv/ca.pem", 143 ca_cert="auth_serv/ca.pem", 154 ca_cert="auth_serv/ca.pem", 167 ca_cert="auth_serv/ca.pem", 178 ca_cert="auth_serv/ca.pem", 450 ca_cert="auth_serv/ca.pem", [all …]
|
H A D | test_ap_eap.py | 2076 ca_cert="auth_serv/ca.pem", 2083 ca_cert="auth_serv/ca.pem", 4539 ca_cert=ca_cert, 4614 ca_cert=ca_cert, 4650 ca_cert=ca_cert, 4700 ca_cert=ca_cert, 4767 ca_cert=ca_cert, 5758 with open(ca_cert, 'w') as f: 5761 params['ca_cert'] = ca_cert 5773 with open(ca_cert, 'w') as f: [all …]
|
H A D | test_authsrv.py | 37 ca_cert="auth_serv/ca.pem", phase2="autheap=GTC", 50 ca_cert="auth_serv/ca.pem", phase2="autheap=GTC", 60 ca_cert="auth_serv/ca.pem", phase2="autheap=GTC", 71 ca_cert="auth_serv/ca.pem", phase2="autheap=GTC", 81 ca_cert="auth_serv/ca.pem", phase2="autheap=GTC", 94 ca_cert="auth_serv/ca.pem", phase2="autheap=GTC", 109 ca_cert="auth_serv/ca.pem", phase2="autheap=GTC", 121 ca_cert="auth_serv/ca.pem", phase2="autheap=GTC", 220 ca_cert="auth_serv/ca.pem", phase2="autheap=GTC", 238 ca_cert="auth_serv/ca.pem", phase2="autheap=GTC", [all …]
|
H A D | test_tnc.py | 22 ca_cert="auth_serv/ca.pem", 30 ca_cert="auth_serv/ca.pem", 38 ca_cert="auth_serv/ca.pem", 56 ca_cert="auth_serv/ca.pem", 67 ca_cert="auth_serv/ca.pem", 89 ca_cert="auth_serv/ca.pem", 108 ca_cert="auth_serv/ca.pem", 160 ca_cert="auth_serv/ca.pem", phase2=phase2, 192 ca_cert="auth_serv/ca.pem",
|
/dports/sysutils/docker-compose/docker-compose-1.24.0/tests/unit/cli/ |
H A D | docker_client_test.py | 72 ca_cert = os.path.join(cert_path, 'ca.pem') variable in TLSConfigTestCase 87 assert result.ca_cert == options['--tlscacert'] 92 '--tlscacert': self.ca_cert, '--tls': True, 97 assert result.ca_cert == options['--tlscacert'] 125 assert result.ca_cert == options['--tlscacert'] 137 assert result.ca_cert == options['--tlscacert'] 157 '--tlscacert': '"{0}"'.format(self.ca_cert), 165 assert result.ca_cert == self.ca_cert 182 assert result.ca_cert == self.ca_cert 200 assert result.ca_cert == self.ca_cert [all …]
|
/dports/devel/py-docker-py/docker-py-1.7.2/docker/ |
H A D | tls.py | 9 ca_cert = None variable in TLSConfig 13 def __init__(self, client_cert=None, ca_cert=None, verify=None, argument 49 self.ca_cert = ca_cert 50 if self.verify and self.ca_cert and not os.path.isfile(self.ca_cert): 58 if self.verify and self.ca_cert: 59 client.verify = self.ca_cert
|
/dports/net/google-cloud-sdk/google-cloud-sdk/lib/third_party/docker/ |
H A D | tls.py | 24 ca_cert = None variable in TLSConfig 28 def __init__(self, client_cert=None, ca_cert=None, verify=None, argument 88 self.ca_cert = ca_cert 89 if self.verify and self.ca_cert and not os.path.isfile(self.ca_cert): 100 if self.verify and self.ca_cert: 101 client.verify = self.ca_cert
|
/dports/sysutils/py-docker/docker-5.0.3/docker/ |
H A D | tls.py | 24 ca_cert = None variable in TLSConfig 28 def __init__(self, client_cert=None, ca_cert=None, verify=None, argument 88 self.ca_cert = ca_cert 89 if self.verify and self.ca_cert and not os.path.isfile(self.ca_cert): 100 if self.verify and self.ca_cert: 101 client.verify = self.ca_cert
|
/dports/www/gitlab-workhorse/gitlab-foss-0a901d60f8ae4a60c04ae82e6e9c3a03e9321417/app/models/clusters/applications/ |
H A D | helm.rb | 52 ca_key.present? && ca_cert.present? 59 'ca.pem': ca_cert, 66 ca_cert = Gitlab::Kubernetes::Helm::V2::Certificate.generate_root 67 self.ca_key = ca_cert.key_string 68 self.ca_cert = ca_cert.cert_string 79 .from_strings(ca_key, ca_cert)
|
/dports/www/butterfly/butterfly-2.0.1/ |
H A D | butterfly.server.py | 164 ca_cert = crypto.X509() variable 166 fill_fields(ca_cert.get_subject()) 167 ca_cert.set_serial_number(uuid.uuid4().int) 168 ca_cert.gmtime_adj_notBefore(0) # From now 169 ca_cert.gmtime_adj_notAfter(315360000) # to 10y 170 ca_cert.set_issuer(ca_cert.get_subject()) # Self signed 171 ca_cert.set_pubkey(ca_pk) 172 ca_cert.sign(ca_pk, 'sha512') 190 server_cert.set_issuer(ca_cert.get_subject()) # Signed by ca 240 client_cert.set_issuer(ca_cert.get_subject()) # Signed by ca [all …]
|
/dports/security/py-trustme/trustme-0.9.0/tests/ |
H A D | test_trustme.py | 33 def _path_length(ca_cert): argument 39 def assert_is_ca(ca_cert): argument 88 ca_cert = x509.load_pem_x509_certificate( 90 assert ca_cert.not_valid_before <= today <= ca_cert.not_valid_after 98 assert ca_cert.issuer == ca_cert.subject 99 assert_is_ca(ca_cert) 142 for rdn in ca_cert.subject.rdns 196 assert_is_ca(ca_cert) 197 assert ca_cert.issuer == ca_cert.subject 198 assert _path_length(ca_cert) == 9 [all …]
|
/dports/sysutils/docker-compose/docker-compose-1.24.0/compose/cli/ |
H A D | docker_client.py | 49 ca_cert = unquote_path(options.get('--tlscacert')) 58 if cert_path is not None and not any((ca_cert, cert, key)): 62 ca_cert = os.path.join(cert_path, 'ca.pem') 64 if verify and not any((ca_cert, cert, key)): 66 ca_cert = os.path.join(default_cert_path(), 'ca.pem') 72 advanced_opts = any([ca_cert, cert, key, verify, tls_version]) 82 client_cert=client_cert, verify=verify, ca_cert=ca_cert,
|
/dports/net/grpcui/grpcui-1.1.0/vendor/google.golang.org/grpc/security/advancedtls/testdata/ |
H A D | README.md | 8 Supposing we are going to create a `subject_cert.pem` that is trusted by `ca_cert.pem`, here are the 11 1. Generate the private key, `ca_key.pem`, and the cert `ca_cert.pem`, for the CA: 14 …$ openssl req -x509 -newkey rsa:4096 -keyout ca_key.pem -out ca_cert.pem -nodes -days $DURATION_DA… 29 4. Use `ca_key.pem` and `ca_cert.pem` to sign `csr.pem`, and get a certificate, `subject_cert.pem`,… 34 …icy -extensions signing_req -out subject_cert.pem -in csr.pem -keyfile ca_key.pem -cert ca_cert.pem 36 5. Verify the `subject_cert.pem` is trusted by `ca_cert.pem`: 40 $ openssl verify -verbose -CAfile ca_cert.pem subject_cert.pem
|
/dports/security/vault/vault-1.8.2/vendor/google.golang.org/grpc/security/advancedtls/testdata/ |
H A D | README.md | 8 Supposing we are going to create a `subject_cert.pem` that is trusted by `ca_cert.pem`, here are the 11 1. Generate the private key, `ca_key.pem`, and the cert `ca_cert.pem`, for the CA: 14 …$ openssl req -x509 -newkey rsa:4096 -keyout ca_key.pem -out ca_cert.pem -nodes -days $DURATION_DA… 29 4. Use `ca_key.pem` and `ca_cert.pem` to sign `csr.pem`, and get a certificate, `subject_cert.pem`,… 34 …icy -extensions signing_req -out subject_cert.pem -in csr.pem -keyfile ca_key.pem -cert ca_cert.pem 36 5. Verify the `subject_cert.pem` is trusted by `ca_cert.pem`: 40 $ openssl verify -verbose -CAfile ca_cert.pem subject_cert.pem
|
/dports/net/evans/evans-0.9.1/vendor/google.golang.org/grpc/security/advancedtls/testdata/ |
H A D | README.md | 8 Supposing we are going to create a `subject_cert.pem` that is trusted by `ca_cert.pem`, here are the 11 1. Generate the private key, `ca_key.pem`, and the cert `ca_cert.pem`, for the CA: 14 …$ openssl req -x509 -newkey rsa:4096 -keyout ca_key.pem -out ca_cert.pem -nodes -days $DURATION_DA… 29 4. Use `ca_key.pem` and `ca_cert.pem` to sign `csr.pem`, and get a certificate, `subject_cert.pem`,… 34 …icy -extensions signing_req -out subject_cert.pem -in csr.pem -keyfile ca_key.pem -cert ca_cert.pem 36 5. Verify the `subject_cert.pem` is trusted by `ca_cert.pem`: 40 $ openssl verify -verbose -CAfile ca_cert.pem subject_cert.pem
|
/dports/sysutils/helmfile/helmfile-0.138.7/vendor/google.golang.org/grpc/security/advancedtls/testdata/ |
H A D | README.md | 8 Supposing we are going to create a `subject_cert.pem` that is trusted by `ca_cert.pem`, here are the 11 1. Generate the private key, `ca_key.pem`, and the cert `ca_cert.pem`, for the CA: 14 …$ openssl req -x509 -newkey rsa:4096 -keyout ca_key.pem -out ca_cert.pem -nodes -days $DURATION_DA… 29 4. Use `ca_key.pem` and `ca_cert.pem` to sign `csr.pem`, and get a certificate, `subject_cert.pem`,… 34 …icy -extensions signing_req -out subject_cert.pem -in csr.pem -keyfile ca_key.pem -cert ca_cert.pem 36 5. Verify the `subject_cert.pem` is trusted by `ca_cert.pem`: 40 $ openssl verify -verbose -CAfile ca_cert.pem subject_cert.pem
|
/dports/www/pomerium/pomerium-0.8.3/vendor/google.golang.org/grpc/security/advancedtls/testdata/ |
H A D | README.md | 8 Supposing we are going to create a `subject_cert.pem` that is trusted by `ca_cert.pem`, here are the 11 1. Generate the private key, `ca_key.pem`, and the cert `ca_cert.pem`, for the CA: 14 …$ openssl req -x509 -newkey rsa:4096 -keyout ca_key.pem -out ca_cert.pem -nodes -days $DURATION_DA… 29 4. Use `ca_key.pem` and `ca_cert.pem` to sign `csr.pem`, and get a certificate, `subject_cert.pem`,… 34 …icy -extensions signing_req -out subject_cert.pem -in csr.pem -keyfile ca_key.pem -cert ca_cert.pem 36 5. Verify the `subject_cert.pem` is trusted by `ca_cert.pem`: 40 $ openssl verify -verbose -CAfile ca_cert.pem subject_cert.pem
|
/dports/net-im/dendrite/dendrite-0.5.1/vendor/google.golang.org/grpc/security/advancedtls/testdata/ |
H A D | README.md | 8 Supposing we are going to create a `subject_cert.pem` that is trusted by `ca_cert.pem`, here are the 11 1. Generate the private key, `ca_key.pem`, and the cert `ca_cert.pem`, for the CA: 14 …$ openssl req -x509 -newkey rsa:4096 -keyout ca_key.pem -out ca_cert.pem -nodes -days $DURATION_DA… 29 4. Use `ca_key.pem` and `ca_cert.pem` to sign `csr.pem`, and get a certificate, `subject_cert.pem`,… 34 …icy -extensions signing_req -out subject_cert.pem -in csr.pem -keyfile ca_key.pem -cert ca_cert.pem 36 5. Verify the `subject_cert.pem` is trusted by `ca_cert.pem`: 40 $ openssl verify -verbose -CAfile ca_cert.pem subject_cert.pem
|
/dports/sysutils/gomplate/gomplate-3.9.0/vendor/google.golang.org/grpc/security/advancedtls/testdata/ |
H A D | README.md | 8 Supposing we are going to create a `subject_cert.pem` that is trusted by `ca_cert.pem`, here are the 11 1. Generate the private key, `ca_key.pem`, and the cert `ca_cert.pem`, for the CA: 14 …$ openssl req -x509 -newkey rsa:4096 -keyout ca_key.pem -out ca_cert.pem -nodes -days $DURATION_DA… 29 4. Use `ca_key.pem` and `ca_cert.pem` to sign `csr.pem`, and get a certificate, `subject_cert.pem`,… 34 …icy -extensions signing_req -out subject_cert.pem -in csr.pem -keyfile ca_key.pem -cert ca_cert.pem 36 5. Verify the `subject_cert.pem` is trusted by `ca_cert.pem`: 40 $ openssl verify -verbose -CAfile ca_cert.pem subject_cert.pem
|
/dports/devel/gitlab-runner/gitlab-runner-8925d9a06fd8e452e2161a768462652a2a13111f/vendor/google.golang.org/grpc/grpc-go-1.34.0/security/advancedtls/testdata/ |
H A D | README.md | 8 Supposing we are going to create a `subject_cert.pem` that is trusted by `ca_cert.pem`, here are the 11 1. Generate the private key, `ca_key.pem`, and the cert `ca_cert.pem`, for the CA: 14 …$ openssl req -x509 -newkey rsa:4096 -keyout ca_key.pem -out ca_cert.pem -nodes -days $DURATION_DA… 29 4. Use `ca_key.pem` and `ca_cert.pem` to sign `csr.pem`, and get a certificate, `subject_cert.pem`,… 34 …icy -extensions signing_req -out subject_cert.pem -in csr.pem -keyfile ca_key.pem -cert ca_cert.pem 36 5. Verify the `subject_cert.pem` is trusted by `ca_cert.pem`: 40 $ openssl verify -verbose -CAfile ca_cert.pem subject_cert.pem
|
/dports/sysutils/istio/istio-1.6.7/vendor/google.golang.org/grpc/security/advancedtls/testdata/ |
H A D | README.md | 8 Supposing we are going to create a `subject_cert.pem` that is trusted by `ca_cert.pem`, here are the 11 1. Generate the private key, `ca_key.pem`, and the cert `ca_cert.pem`, for the CA: 14 …$ openssl req -x509 -newkey rsa:4096 -keyout ca_key.pem -out ca_cert.pem -nodes -days $DURATION_DA… 29 4. Use `ca_key.pem` and `ca_cert.pem` to sign `csr.pem`, and get a certificate, `subject_cert.pem`,… 34 …icy -extensions signing_req -out subject_cert.pem -in csr.pem -keyfile ca_key.pem -cert ca_cert.pem 36 5. Verify the `subject_cert.pem` is trusted by `ca_cert.pem`: 40 $ openssl verify -verbose -CAfile ca_cert.pem subject_cert.pem
|