Searched refs:cert_type (Results 1 – 9 of 9) sorted by relevance
/third_party/mbedtls/tests/suites/ |
D | test_suite_x509write.function | 80 int key_usage, int set_key_usage, int cert_type, 107 TEST_ASSERT( mbedtls_x509write_csr_set_ns_cert_type( &req, cert_type ) == 0 ); 148 int cert_type ) 177 if( cert_type != 0 ) 178 TEST_ASSERT( mbedtls_x509write_csr_set_ns_cert_type( &req, cert_type ) == 0 ); 204 int cert_type, int set_cert_type, int auth_ident, 277 TEST_ASSERT( mbedtls_x509write_crt_set_ns_cert_type( &crt, cert_type ) == 0 );
|
D | test_suite_x509write.data | 35 x509_csr_check:"data_files/server1.key":"data_files/server1.req.cert_type":MBEDTLS_MD_SHA1:0:0:MBED… 63 …DTLS_MD_SHA1:0:0:MBEDTLS_X509_NS_CERT_TYPE_SSL_SERVER:1:1:-1:"data_files/server1.cert_type.crt":0:0
|
D | test_suite_x509parse.data | 99 x509_cert_info:"data_files/server1.cert_type.crt":"cert. version \: 3\nserial number \: 01\…
|
/third_party/mbedtls/tests/data_files/ |
D | Makefile | 892 server1.req.cert_type: server1.key 894 all_final += server1.req.cert_type 979 server1.cert_type.crt: server1.key server1.req.sha256 $(test_ca_crt) $(test_ca_key_file_rsa) 983 server1.cert_type.der: server1.cert_type.crt 985 all_final += server1.cert_type.crt server1.cert_type_noauthid.crt server1.cert_type.der 1032 server1.crt.openssl server1.key_usage.crt.openssl server1.cert_type.crt.openssl: server1.key server… 1041 server1.cert_type.der.openssl: server1.cert_type.crt.openssl 1062 …cert_type.crt server1.cert_type_noauthid.crt server1.cert_type.crt.openssl server1.der server1.der…
|
D | Readme-x509.txt | 64 *CRL for: .cert_type.crt, .crt, .key_usage.crt, .v1.crt 114 - crl.pem, crl-futureRevocationDate.pem, crl_expired.pem: (1) server1{,.cert_type,.key_usage,.v1}.c…
|
/third_party/libcoap/src/ |
D | coap_gnutls.c | 698 #define OUTPUT_CERT_NAME (cert_type == GNUTLS_CRT_X509 ? \ 700 cert_type == GNUTLS_CRT_RAW ? \ 703 #define OUTPUT_CERT_NAME (cert_type == GNUTLS_CRT_X509 ? \ 759 gnutls_certificate_type_t cert_type; in cert_verify_gnutls() local 762 cert_type = get_san_or_cn(g_session, &cert_info); in cert_verify_gnutls() 764 if (cert_type == GNUTLS_CRT_RAW) { in cert_verify_gnutls()
|
/third_party/curl/ |
D | backport-CVE-2022-27782.patch | 167 data->set.proxy_ssl.cert_type = data->set.str[STRING_CERT_TYPE_PROXY]; 176 data->set.ssl.cert_type = data->set.str[STRING_CERT_TYPE]; 223 char *cert_type; /* format for certificate (default: PEM)*/
|
/third_party/openssl/apps/lib/ |
D | s_cb.c | 214 unsigned char cert_type = p[i]; in ssl_print_client_cert_types() local 215 const char *cname = lookup((int)cert_type, cert_type_list, NULL); in ssl_print_client_cert_types() 222 BIO_printf(bio, "UNKNOWN (%d),", cert_type); in ssl_print_client_cert_types()
|
/third_party/mbedtls/ |
D | ChangeLog | 4070 * Fixed offset for cert_type list in ssl_parse_certificate_request()
|