/third_party/curl/lib/ |
D | ldap.c | 389 int cert_type = LDAPSSL_CERT_FILETYPE_B64; in ldap_do() 390 if((data->set.ssl.cert_type) && in ldap_do() 391 (strcasecompare(data->set.ssl.cert_type, "DER"))) in ldap_do() 392 cert_type = LDAPSSL_CERT_FILETYPE_DER; in ldap_do() 395 (cert_type == LDAPSSL_CERT_FILETYPE_DER ? "DER" : "PEM")); in ldap_do() 400 (cert_type == LDAPSSL_CERT_FILETYPE_DER ? "DER" : "PEM"), in ldap_do() 402 rc = ldapssl_add_trusted_cert(ldap_ca, cert_type); in ldap_do() 405 (cert_type == LDAPSSL_CERT_FILETYPE_DER ? "DER" : "PEM"), in ldap_do() 431 if((data->set.ssl.cert_type) && in ldap_do() 432 (!strcasecompare(data->set.ssl.cert_type, "PEM"))) { in ldap_do()
|
D | urldata.h | 300 char *cert_type; /* format for certificate (default: PEM)*/ member
|
D | url.c | 3640 data->set.proxy_ssl.cert_type = data->set.str[STRING_CERT_TYPE_PROXY]; 3648 data->set.ssl.cert_type = data->set.str[STRING_CERT_TYPE];
|
/third_party/mbedtls/tests/suites/ |
D | test_suite_x509write.function | 139 int key_usage, int set_key_usage, int cert_type, 194 TEST_ASSERT(mbedtls_x509write_csr_set_ns_cert_type(&req, cert_type) == 0); 258 int cert_type) 301 if (cert_type != 0) { 302 TEST_ASSERT(mbedtls_x509write_csr_set_ns_cert_type(&req, cert_type) == 0); 330 int cert_type, int set_cert_type, int auth_ident, 448 TEST_ASSERT(mbedtls_x509write_crt_set_ns_cert_type(&crt, cert_type) == 0);
|
D | test_suite_x509write.data | 39 x509_csr_check:"data_files/server1.key":"data_files/server1.req.cert_type":MBEDTLS_MD_SHA1:0:0:MBED… 95 …:"NULL":MBEDTLS_X509_NS_CERT_TYPE_SSL_SERVER:1:1:-1:"data_files/server1.cert_type.crt":0:0:"data_f… 135 …:"NULL":MBEDTLS_X509_NS_CERT_TYPE_SSL_SERVER:1:1:-1:"data_files/server1.cert_type.crt":2:0:"data_f…
|
D | test_suite_x509parse.data | 103 x509_cert_info:"data_files/server1.cert_type.crt":"cert. version \: 3\nserial number \: 01\…
|
/third_party/curl/lib/vtls/ |
D | openssl.h | 53 const char *cert_type, char *key_file,
|
D | openssl.c | 1262 const char *cert_type, in cert_stuff() argument 1271 int file_type = do_file_type(cert_type); in cert_stuff() 1503 failf(data, "not supported file type '%s' for certificate", cert_type); in cert_stuff() 1649 const char *cert_type, char *key_file, in Curl_ossl_set_client_cert() argument 1653 int rv = cert_stuff(data, ctx, cert_file, cert_blob, cert_type, key_file, in Curl_ossl_set_client_cert() 3466 const char * const ssl_cert_type = ssl_config->cert_type; in ossl_connect_step1()
|
D | gtls.c | 627 do_file_type(ssl_config->cert_type), in gtls_client_init() 642 do_file_type(ssl_config->cert_type) ) != in gtls_client_init()
|
D | wolfssl.c | 583 int file_type = do_file_type(ssl_config->cert_type); in wolfssl_connect_step1()
|
D | schannel.c | 578 if((fInCert || blob) && (data->set.ssl.cert_type) && in schannel_acquire_credential_handle() 579 (!strcasecompare(data->set.ssl.cert_type, "P12"))) { in schannel_acquire_credential_handle()
|
D | sectransp.c | 1859 if(!ssl_config->cert_type) 1862 else if(!strcasecompare(ssl_config->cert_type, "P12")) {
|
/third_party/mbedtls/tests/data_files/ |
D | Makefile | 1318 server1.req.cert_type: server1.key 1320 all_final += server1.req.cert_type 1465 parse_input/server1.cert_type.crt: parse_input/server1.req.sha256 1466 server1.cert_type.crt: server1.req.sha256 1467 parse_input/server1.cert_type.crt server1.cert_type.crt: $(test_ca_crt) $(test_ca_key_file_rsa) 1468 parse_input/server1.cert_type.crt server1.cert_type.crt: 1472 server1.cert_type.der: server1.cert_type.crt 1474 all_final += server1.cert_type.crt server1.cert_type_noauthid.crt server1.cert_type.der 1521 server1.crt.openssl server1.key_usage.crt.openssl server1.cert_type.crt.openssl: server1.key server… 1530 server1.cert_type.der.openssl: server1.cert_type.crt.openssl [all …]
|
D | Readme-x509.txt | 64 *CRL for: .cert_type.crt, .crt, .key_usage.crt, .v1.crt 114 - crl.pem, crl-futureRevocationDate.pem, crl_expired.pem: (1) server1{,.cert_type,.key_usage,.v1}.c…
|
/third_party/curl/src/ |
D | tool_cfgable.h | 139 char *cert_type; member
|
D | tool_cfgable.c | 118 Curl_safefree(config->cert_type); in free_config_fields()
|
D | tool_operate.c | 1809 if(!config->cert_type) { in single_transfer() 1811 config->cert_type = strdup("ENG"); in single_transfer() 1889 my_setopt_str(curl, CURLOPT_SSLCERTTYPE, config->cert_type); in single_transfer()
|
D | tool_getparam.c | 1890 GetStr(&config->cert_type, nextarg); in getparameter()
|
/third_party/libcoap/src/ |
D | coap_gnutls.c | 723 #define OUTPUT_CERT_NAME (cert_type == GNUTLS_CRT_X509 ? \ 725 cert_type == GNUTLS_CRT_RAW ? \ 728 #define OUTPUT_CERT_NAME (cert_type == GNUTLS_CRT_X509 ? \ 784 gnutls_certificate_type_t cert_type; in cert_verify_gnutls() local 787 cert_type = get_san_or_cn(g_session, &cert_info); in cert_verify_gnutls() 789 if (cert_type == GNUTLS_CRT_RAW) { in cert_verify_gnutls()
|
/third_party/node/deps/openssl/openssl/apps/lib/ |
D | s_cb.c | 214 unsigned char cert_type = p[i]; in ssl_print_client_cert_types() local 215 const char *cname = lookup((int)cert_type, cert_type_list, NULL); in ssl_print_client_cert_types() 222 BIO_printf(bio, "UNKNOWN (%d),", cert_type); in ssl_print_client_cert_types()
|
/third_party/openssl/apps/lib/ |
D | s_cb.c | 214 unsigned char cert_type = p[i]; in ssl_print_client_cert_types() local 215 const char *cname = lookup((int)cert_type, cert_type_list, NULL); in ssl_print_client_cert_types() 222 BIO_printf(bio, "UNKNOWN (%d),", cert_type); in ssl_print_client_cert_types()
|
/third_party/curl/lib/vquic/ |
D | curl_ngtcp2.c | 498 || ssl_config->cert_type) { in quic_set_client_cert() 501 ssl_config->primary.cert_blob, ssl_config->cert_type, in quic_set_client_cert()
|
/third_party/mbedtls/ |
D | ChangeLog | 4769 * Fixed offset for cert_type list in ssl_parse_certificate_request()
|