/external/wpa_supplicant_8/hs20/server/ca/ |
ocsp-req.sh | 5 openssl ocsp -text -CAfile ca.pem -verify_other demoCA/cacert.pem -trust_other -issuer demoCA/cacert.pem -cert $i -url http://localhost:8888/ 7 # openssl ocsp -text -CAfile rootCA/cacert.pem -issuer demoCA/cacert.pem -cert $i -url http://localhost:8888/ 9 # openssl ocsp -text -CAfile rootCA/cacert.pem -verify_other demoCA/cacert.pem -trust_other -issuer demoCA/cacert.pem -cert $i -url http://localhost:8888/ 10 # openssl ocsp -text -CAfile rootCA/cacert.pem -VAfile ca.pem -trust_other -issuer demoCA/cacert.pem -cert $i -url http://localhost:8888/
|
ocsp-update-cache.sh | 5 -CAfile ca.pem \
|
setup.sh | 206 $OPENSSL verify -CAfile rootCA/cacert.pem demoCA/cacert.pem 207 $OPENSSL verify -CAfile rootCA/cacert.pem -untrusted demoCA/cacert.pem *.pem
|
/frameworks/base/core/java/android/security/net/config/ |
SystemCertificateSource.java | 45 protected boolean isCertMarkedAsRemoved(String caFile) { 46 return new File(mUserRemovedCaDir, caFile).exists();
|
DirectoryCertificateSource.java | 64 protected abstract boolean isCertMarkedAsRemoved(String caFile); 76 for (String caFile : mDir.list()) { 77 if (isCertMarkedAsRemoved(caFile)) { 80 X509Certificate cert = readCertificate(caFile);
|
UserCertificateSource.java | 42 protected boolean isCertMarkedAsRemoved(String caFile) {
|
/external/autotest/client/site_tests/security_OpenSSLBlacklist/ |
security_OpenSSLBlacklist.py | 18 r = os.system('OPENSSL_BLACKLIST_PATH=%s %s -CAfile %s %s' % 48 '-CAfile', self.ca, '-cert', self.cert,
|
/external/autotest/client/site_tests/platform_AccurateTime/ |
platform_AccurateTime.py | 23 '-CAfile', self.ca, '-cert', self.cert,
|
/external/python/cpython2/Lib/ |
ssl.py | 293 "cafile capath openssl_cafile_env openssl_cafile openssl_capath_env " 297 """Return paths to default cafile and capath. 302 cafile = os.environ.get(parts[0], parts[1]) 305 return DefaultVerifyPaths(cafile if os.path.isfile(cafile) else None, 410 def create_default_context(purpose=Purpose.SERVER_AUTH, cafile=None, 449 if cafile or capath or cadata: 450 context.load_verify_locations(cafile, capath, cadata) 452 # no explicit cafile, capath or cadata but the verify mode is 461 cafile=None, capath=None, cadata=None) [all...] |
/external/curl/lib/vtls/ |
cyassl.c | 267 if(SSL_CONN_CONFIG(CAfile)) { 269 SSL_CONN_CONFIG(CAfile), 274 " CAfile: %s\n CApath: %s", 275 SSL_CONN_CONFIG(CAfile)? 276 SSL_CONN_CONFIG(CAfile): "none", 293 " CAfile: %s\n" 295 SSL_CONN_CONFIG(CAfile) ? SSL_CONN_CONFIG(CAfile):
|
gtls.c | 568 if(SSL_CONN_CONFIG(CAfile)) { 574 SSL_CONN_CONFIG(CAfile), 578 SSL_CONN_CONFIG(CAfile), gnutls_strerror(rc)); 584 SSL_CONN_CONFIG(CAfile)); 608 !(SSL_CONN_CONFIG(CAfile) || SSL_CONN_CONFIG(CApath))) { [all...] |
nss.c | 1546 const char *cafile = SSL_CONN_CONFIG(CAfile); local [all...] |
axtls.c | 184 if(SSL_CONN_CONFIG(CAfile)) { 186 SSL_CONN_CONFIG(CAfile), NULL) != SSL_OK) { 188 SSL_CONN_CONFIG(CAfile)); 194 infof(data, "found certificates in %s\n", SSL_CONN_CONFIG(CAfile));
|
vtls.c | 95 Curl_safe_strcasecompare(data->CAfile, needle->CAfile) && 117 CLONE_STRING(CAfile); 129 Curl_safefree(sslc->CAfile); [all...] |
/external/python/cpython3/Lib/ |
ssl.py | 332 "cafile capath openssl_cafile_env openssl_cafile openssl_capath_env " 336 """Return paths to default cafile and capath. 341 cafile = os.environ.get(parts[0], parts[1]) 344 return DefaultVerifyPaths(cafile if os.path.isfile(cafile) else None, 482 def create_default_context(purpose=Purpose.SERVER_AUTH, *, cafile=None, 505 if cafile or capath or cadata: 506 context.load_verify_locations(cafile, capath, cadata) 508 # no explicit cafile, capath or cadata but the verify mode is 517 cafile=None, capath=None, cadata=None) [all...] |
/external/scapy/test/tls/ |
tests_tls_netaccess.uts | 34 ["openssl", "s_client", "-debug", "-cipher", suite, version, "-CAfile", CA_f],
|
/external/python/cpython3/Modules/clinic/ |
_ssl.c.h | 499 "load_verify_locations($self, /, cafile=None, capath=None, cadata=None)\n" 508 PyObject *cafile, 516 static const char * const _keywords[] = {"cafile", "capath", "cadata", NULL}; 518 PyObject *cafile = NULL; local 523 &cafile, &capath, &cadata)) { 526 return_value = _ssl__SSLContext_load_verify_locations_impl(self, cafile, capath, cadata); [all...] |
/external/python/cpython2/Lib/test/ |
test_urllib2_localnet.py | 561 context = ssl.create_default_context(cafile=CERT_localhost) 569 cafile=CERT_localhost) 574 cafile=CERT_fakehostname) 579 cafile=CERT_fakehostname) 599 context = ssl.create_default_context(cafile=CERT_localhost)
|
test_urllibnet.py | 211 context = ssl.create_default_context(cafile=CERT_selfsigned_pythontestdotnet)
|
/external/python/cpython3/Lib/test/ |
test_urllib2_localnet.py | 554 context = ssl.create_default_context(cafile=CERT_localhost) 563 cafile=CERT_localhost) 568 cafile=CERT_fakehostname) 573 cafile=CERT_fakehostname) 595 context = ssl.create_default_context(cafile=CERT_localhost)
|
test_poplib.py | 26 CAFILE = os.path.join(os.path.dirname(__file__) or os.curdir, "pycacert.pem") 354 ctx.load_verify_locations(CAFILE)
|
/device/linaro/bootloader/edk2/BaseTools/Source/Python/Pkcs7Sign/ |
Readme.md | 83 openssl smime -verify -inform DER -in test.bin.p7 -content test.bin -CAfile TestRoot.pub.pem -out test.org.bin
|
/external/libmicrohttpd/src/examples/ |
https_fileserver_example.c | 45 #define CAFILE "ca.pem"
|
/external/scapy/scapy/layers/tls/ |
cert.py | [all...] |
/external/python/cpython2/Modules/ |
_ssl.c | 2835 PyObject *cadata = NULL, *cafile = NULL, *capath = NULL; local [all...] |