/external/curl/tests/ |
secureserver.pl | 70 my $certfile; # certificate chain PEM file 136 elsif($ARGV[0] eq '--certfile') { 187 $certfile = "$srcdir/". ($stuncert?"certs/$stuncert":"stunnel.pem"); 188 $certfile = abs_path($certfile); 236 $certfile = pathhelp::sys_native_abs_path($certfile); 246 $cmd = "$stunnel -p $certfile -P $pidfile "; 253 print "pem cert file: $certfile\n"; 280 print STUNCONF "cert = $certfile\n" [all...] |
/device/linaro/bootloader/edk2/AppPkg/Applications/Python/Python-2.7.2/Lib/ |
ssl.py | 100 def __init__(self, sock, keyfile=None, certfile=None,
115 if certfile and not keyfile:
116 keyfile = certfile
130 keyfile, certfile,
136 self.certfile = certfile
303 self._sslobj = _ssl.sslwrap(self._sock, False, self.keyfile, self.certfile,
338 certfile=self.certfile,
361 def wrap_socket(sock, keyfile=None, certfile=None, [all...] |
poplib.py | 320 Instantiate with: POP3_SSL(hostname, port=995, keyfile=None, certfile=None)
325 certfile - PEM formatted certificate chain file
330 def __init__(self, host, port = POP3_SSL_PORT, keyfile = None, certfile = None):
334 self.certfile = certfile
352 self.sslobj = ssl.wrap_socket(self.sock, self.keyfile, self.certfile)
|
smtplib.py | 607 def starttls(self, keyfile=None, certfile=None):
614 session. If you provide the keyfile and certfile parameters,
631 self.sock = ssl.wrap_socket(self.sock, keyfile, certfile)
755 omitted, the standard SMTP-over-SSL port (465) is used. keyfile and certfile
763 keyfile=None, certfile=None,
766 self.certfile = certfile
773 new_socket = ssl.wrap_socket(new_socket, self.keyfile, self.certfile)
|
/external/tensorflow/tensorflow/contrib/ignite/kernels/client/ |
ignite_ssl_wrapper.h | 27 SslWrapper(std::shared_ptr<Client> client, string certfile, string keyfile,
|
ignite_ssl_wrapper.cc | 32 SslWrapper::SslWrapper(std::shared_ptr<Client> client, string certfile, 36 certfile_(std::move(certfile)),
|
/external/python/cpython3/Lib/ |
poplib.py | 417 Instantiate with: POP3_SSL(hostname, port=995, keyfile=None, certfile=None, 423 certfile - PEM formatted certificate chain file 429 def __init__(self, host, port=POP3_SSL_PORT, keyfile=None, certfile=None, 434 if context is not None and certfile is not None: 435 raise ValueError("context and certfile arguments are mutually " 437 if keyfile is not None or certfile is not None: 439 warnings.warn("keyfile and certfile are deprecated, use a " 442 self.certfile = certfile 444 context = ssl._create_stdlib_context(certfile=certfile [all...] |
smtplib.py | 732 def starttls(self, keyfile=None, certfile=None, context=None): 739 session. If you provide the keyfile and certfile parameters, 760 if context is not None and certfile is not None: 761 raise ValueError("context and certfile arguments are mutually " 763 if keyfile is not None or certfile is not None: 765 warnings.warn("keyfile and certfile are deprecated, use a " 768 context = ssl._create_stdlib_context(certfile=certfile, [all...] |
ftplib.py | 725 certfile=None, context=None, 730 if context is not None and certfile is not None: 731 raise ValueError("context and certfile arguments are mutually " 733 if keyfile is not None or certfile is not None: 735 warnings.warn("keyfile and certfile are deprecated, use a " 738 self.certfile = certfile 741 certfile=certfile, [all...] |
/external/autotest/client/cros/ |
ownership.py | 288 certfile = scoped_tempfile.tempdir.name + '/cert.pem' 290 OPENSSLREQ, '/CN=me', keyfile, certfile) 292 return (keyfile, certfile) 305 certfile = scoped_tempfile(certpath) 307 cert_extract_pubkey_der(certfile.name)) 310 def push_to_nss(keyfile, certfile, nssdb): 317 @param certfile: path to PEM-formatted cert file for associated public key. 322 OPENSSLP12, certfile, keyfile, for_push.name)
|
/external/python/cpython2/Lib/ |
ssl.py | 466 certfile=None, keyfile=None, 489 if keyfile and not certfile: 490 raise ValueError("certfile must be specified") 491 if certfile or keyfile: 492 context.load_cert_chain(certfile, keyfile) 535 def __init__(self, sock=None, keyfile=None, certfile=None, 548 if server_side and not certfile: 549 raise ValueError("certfile must be specified for server-side " 551 if keyfile and not certfile: 552 raise ValueError("certfile must be specified" [all...] |
poplib.py | 328 Instantiate with: POP3_SSL(hostname, port=995, keyfile=None, certfile=None) 333 certfile - PEM formatted certificate chain file 338 def __init__(self, host, port = POP3_SSL_PORT, keyfile = None, certfile = None): 342 self.certfile = certfile 360 self.sslobj = ssl.wrap_socket(self.sock, self.keyfile, self.certfile)
|
smtplib.py | 626 def starttls(self, keyfile=None, certfile=None): 633 session. If you provide the keyfile and certfile parameters, 650 self.sock = ssl.wrap_socket(self.sock, keyfile, certfile) 789 SMTP class. keyfile and certfile are also optional - they can contain 798 keyfile=None, certfile=None, 801 self.certfile = certfile 808 new_socket = ssl.wrap_socket(new_socket, self.keyfile, self.certfile)
|
/external/tensorflow/tensorflow/contrib/ignite/kernels/dataset/ |
ignite_dataset.cc | 24 string certfile, string keyfile, 38 certfile_(std::move(certfile)), 49 << "', certfile='" << certfile_ << "', keyfile='"
|
ignite_dataset.h | 27 string username, string password, string certfile,
|
ignite_dataset_ops.cc | 82 string certfile = ""; variable 150 if (env_certfile) certfile = string(env_certfile); 188 std::move(certfile), std::move(keyfile), std::move(cert_password),
|
ignite_dataset_iterator.h | 31 string certfile, string keyfile, string cert_password,
|
/external/grpc-grpc/test/core/http/ |
test_server.py | 55 httpd.socket = ssl.wrap_socket(httpd.socket, certfile=_PEM, keyfile=_KEY, server_side=True)
|
/device/linaro/bootloader/edk2/AppPkg/Applications/Python/Python-2.7.2/Lib/test/ |
test_ssl.py | 26 CERTFILE = None
110 p = ssl._ssl._test_decode_cert(CERTFILE, False)
322 pem = ssl.get_server_certificate(("svn.python.org", 443), ca_certs=CERTFILE)
398 certfile=self.server.certificate,
506 certfile=self.certificate,
552 def __init__(self, conn, certfile):
555 certfile=certfile,
597 def __init__(self, certfile):
598 self.certfile = certfile [all...] |
/external/fsverity-utils/ |
sign.c | 62 static X509 *read_certificate(const char *certfile) 67 bio = BIO_new_file(certfile, "r"); 69 error_msg_openssl("can't open '%s' for reading", certfile); 76 certfile); 375 * key in @keyfile, the certificate in @certfile, and the hash algorithm 380 const char *keyfile, const char *certfile, 393 cert = read_certificate(certfile);
|
/external/tensorflow/tensorflow/python/client/ |
notebook.py | 78 proto = "https" if notebookapp.certfile else "http"
|
/external/python/cpython2/Lib/test/ |
ssl_servers.py | 17 CERTFILE = os.path.join(here, 'keycert.pem') 150 def make_https_server(case, context=None, certfile=CERTFILE, 154 # We assume the certfile contains both private key and certificate 155 context.load_cert_chain(certfile) 198 context.load_cert_chain(CERTFILE)
|
test_ssl.py | 41 CERTFILE = data_file("keycert.pem") 42 BYTES_CERTFILE = CERTFILE.encode(sys.getfilesystemencoding()) 194 p = ssl._ssl._test_decode_cert(CERTFILE) 357 "certfile must be specified", 358 ssl.wrap_socket, sock, keyfile=CERTFILE) 360 "certfile must be specified for server-side operations", 363 "certfile must be specified for server-side operations", 364 ssl.wrap_socket, sock, server_side=True, certfile="") 365 with closing(ssl.wrap_socket(sock, server_side=True, certfile=CERTFILE)) as s [all...] |
/external/python/cpython3/Lib/test/ |
ssl_servers.py | 16 CERTFILE = os.path.join(here, 'keycert.pem') 149 def make_https_server(case, *, context=None, certfile=CERTFILE, 153 # We assume the certfile contains both private key and certificate 154 context.load_cert_chain(certfile) 197 context.load_cert_chain(CERTFILE)
|
/external/tensorflow/tensorflow/contrib/ignite/python/ops/ |
ignite_dataset_ops.py | 99 def __init__(self, host, port, certfile=None, keyfile=None, password=None): 105 certfile: File in PEM format containing the certificate as well as any 109 be taken from certfile as well). 119 if certfile is not None: 121 context.load_cert_chain(certfile, keyfile, password) 126 "(to enable SSL specify certfile)") 129 "(to enable SSL specify certfile)") 336 certfile=None, 346 certfile: File in PEM format containing the certificate as well as any 350 be taken from certfile as well) [all...] |