@@ -233,8 +233,8 @@ def _apply_transforms(self, payload, *, transforms_node: etree._Element, signatu
233
233
234
234
return payload
235
235
236
- def get_cert_chain_verifier (self , ca_pem_file , ca_path ):
237
- return X509CertChainVerifier (ca_pem_file = ca_pem_file , ca_path = ca_path )
236
+ def get_cert_chain_verifier (self , ca_pem_file ):
237
+ return X509CertChainVerifier (ca_pem_file = ca_pem_file )
238
238
239
239
def _match_key_values (self , key_value , der_encoded_key_value , signing_cert , signature_alg ):
240
240
if self .config .ignore_ambiguous_key_info is False :
@@ -279,7 +279,6 @@ def verify(
279
279
cert_subject_name : Optional [str ] = None ,
280
280
cert_resolver : Optional [Callable ] = None ,
281
281
ca_pem_file : Optional [Union [str , bytes ]] = None ,
282
- ca_path : Optional [str ] = None ,
283
282
hmac_key : Optional [str ] = None ,
284
283
validate_schema : bool = True ,
285
284
parser = None ,
@@ -316,7 +315,7 @@ def verify(
316
315
``x509_cert`` argument to specify a certificate that was pre-shared out-of-band (e.g. via SAML metadata, as
317
316
shown in :ref:`Verifying SAML assertions <verifying-saml-assertions>`), or ``cert_subject_name`` to specify a
318
317
subject name that must be in the signing X.509 certificate given by the signature (verified as if it were a
319
- domain name), or ``ca_pem_file``/``ca_path`` to give a custom CA.
318
+ domain name), or ``ca_pem_file`` to give a custom CA.
320
319
321
320
:param data: Signature data to verify
322
321
:type data: String, file-like object, or XML ElementTree Element API compatible object
@@ -336,10 +335,6 @@ def verify(
336
335
:param ca_pem_file:
337
336
Filename of a PEM file containing certificate authority information to use when verifying certificate-based
338
337
signatures.
339
- :param ca_path:
340
- Path to a directory containing PEM-formatted certificate authority files to use when verifying
341
- certificate-based signatures. If neither **ca_pem_file** nor **ca_path** is given, the Mozilla CA bundle
342
- provided by :py:mod:`certifi` will be loaded.
343
338
:param hmac_key: If using HMAC, a string containing the shared secret.
344
339
:param validate_schema: Whether to validate **data** against the XML Signature schema.
345
340
:param parser:
@@ -433,7 +428,7 @@ def verify(
433
428
else :
434
429
cert_chain = [x509 .load_pem_x509_certificate (add_pem_header (cert )) for cert in certs ]
435
430
436
- cert_verifier = self .get_cert_chain_verifier (ca_pem_file = ca_pem_file , ca_path = ca_path )
431
+ cert_verifier = self .get_cert_chain_verifier (ca_pem_file = ca_pem_file )
437
432
438
433
signing_cert = cert_verifier .verify (cert_chain )
439
434
elif isinstance (self .x509_cert , x509 .Certificate ):
0 commit comments