Home
last modified time | relevance | path

Searched refs:cert_type (Results 1 – 23 of 23) sorted by relevance

/third_party/curl/lib/
Dldap.c389 int cert_type = LDAPSSL_CERT_FILETYPE_B64; in ldap_do()
390 if((data->set.ssl.cert_type) && in ldap_do()
391 (strcasecompare(data->set.ssl.cert_type, "DER"))) in ldap_do()
392 cert_type = LDAPSSL_CERT_FILETYPE_DER; in ldap_do()
395 (cert_type == LDAPSSL_CERT_FILETYPE_DER ? "DER" : "PEM")); in ldap_do()
400 (cert_type == LDAPSSL_CERT_FILETYPE_DER ? "DER" : "PEM"), in ldap_do()
402 rc = ldapssl_add_trusted_cert(ldap_ca, cert_type); in ldap_do()
405 (cert_type == LDAPSSL_CERT_FILETYPE_DER ? "DER" : "PEM"), in ldap_do()
431 if((data->set.ssl.cert_type) && in ldap_do()
432 (!strcasecompare(data->set.ssl.cert_type, "PEM"))) { in ldap_do()
Durldata.h300 char *cert_type; /* format for certificate (default: PEM)*/ member
Durl.c3640 data->set.proxy_ssl.cert_type = data->set.str[STRING_CERT_TYPE_PROXY];
3648 data->set.ssl.cert_type = data->set.str[STRING_CERT_TYPE];
/third_party/mbedtls/tests/suites/
Dtest_suite_x509write.function139 int key_usage, int set_key_usage, int cert_type,
194 TEST_ASSERT(mbedtls_x509write_csr_set_ns_cert_type(&req, cert_type) == 0);
258 int cert_type)
301 if (cert_type != 0) {
302 TEST_ASSERT(mbedtls_x509write_csr_set_ns_cert_type(&req, cert_type) == 0);
330 int cert_type, int set_cert_type, int auth_ident,
448 TEST_ASSERT(mbedtls_x509write_crt_set_ns_cert_type(&crt, cert_type) == 0);
Dtest_suite_x509write.data39 x509_csr_check:"data_files/server1.key":"data_files/server1.req.cert_type":MBEDTLS_MD_SHA1:0:0:MBED…
95 …:"NULL":MBEDTLS_X509_NS_CERT_TYPE_SSL_SERVER:1:1:-1:"data_files/server1.cert_type.crt":0:0:"data_f…
135 …:"NULL":MBEDTLS_X509_NS_CERT_TYPE_SSL_SERVER:1:1:-1:"data_files/server1.cert_type.crt":2:0:"data_f…
Dtest_suite_x509parse.data103 x509_cert_info:"data_files/server1.cert_type.crt":"cert. version \: 3\nserial number \: 01\…
/third_party/curl/lib/vtls/
Dopenssl.h53 const char *cert_type, char *key_file,
Dopenssl.c1262 const char *cert_type, in cert_stuff() argument
1271 int file_type = do_file_type(cert_type); in cert_stuff()
1503 failf(data, "not supported file type '%s' for certificate", cert_type); in cert_stuff()
1649 const char *cert_type, char *key_file, in Curl_ossl_set_client_cert() argument
1653 int rv = cert_stuff(data, ctx, cert_file, cert_blob, cert_type, key_file, in Curl_ossl_set_client_cert()
3466 const char * const ssl_cert_type = ssl_config->cert_type; in ossl_connect_step1()
Dgtls.c627 do_file_type(ssl_config->cert_type), in gtls_client_init()
642 do_file_type(ssl_config->cert_type) ) != in gtls_client_init()
Dwolfssl.c583 int file_type = do_file_type(ssl_config->cert_type); in wolfssl_connect_step1()
Dschannel.c578 if((fInCert || blob) && (data->set.ssl.cert_type) && in schannel_acquire_credential_handle()
579 (!strcasecompare(data->set.ssl.cert_type, "P12"))) { in schannel_acquire_credential_handle()
Dsectransp.c1859 if(!ssl_config->cert_type)
1862 else if(!strcasecompare(ssl_config->cert_type, "P12")) {
/third_party/mbedtls/tests/data_files/
DMakefile1318 server1.req.cert_type: server1.key
1320 all_final += server1.req.cert_type
1465 parse_input/server1.cert_type.crt: parse_input/server1.req.sha256
1466 server1.cert_type.crt: server1.req.sha256
1467 parse_input/server1.cert_type.crt server1.cert_type.crt: $(test_ca_crt) $(test_ca_key_file_rsa)
1468 parse_input/server1.cert_type.crt server1.cert_type.crt:
1472 server1.cert_type.der: server1.cert_type.crt
1474 all_final += server1.cert_type.crt server1.cert_type_noauthid.crt server1.cert_type.der
1521 server1.crt.openssl server1.key_usage.crt.openssl server1.cert_type.crt.openssl: server1.key server…
1530 server1.cert_type.der.openssl: server1.cert_type.crt.openssl
[all …]
DReadme-x509.txt64 *CRL for: .cert_type.crt, .crt, .key_usage.crt, .v1.crt
114 - crl.pem, crl-futureRevocationDate.pem, crl_expired.pem: (1) server1{,.cert_type,.key_usage,.v1}.c…
/third_party/curl/src/
Dtool_cfgable.h139 char *cert_type; member
Dtool_cfgable.c118 Curl_safefree(config->cert_type); in free_config_fields()
Dtool_operate.c1809 if(!config->cert_type) { in single_transfer()
1811 config->cert_type = strdup("ENG"); in single_transfer()
1889 my_setopt_str(curl, CURLOPT_SSLCERTTYPE, config->cert_type); in single_transfer()
Dtool_getparam.c1890 GetStr(&config->cert_type, nextarg); in getparameter()
/third_party/libcoap/src/
Dcoap_gnutls.c723 #define OUTPUT_CERT_NAME (cert_type == GNUTLS_CRT_X509 ? \
725 cert_type == GNUTLS_CRT_RAW ? \
728 #define OUTPUT_CERT_NAME (cert_type == GNUTLS_CRT_X509 ? \
784 gnutls_certificate_type_t cert_type; in cert_verify_gnutls() local
787 cert_type = get_san_or_cn(g_session, &cert_info); in cert_verify_gnutls()
789 if (cert_type == GNUTLS_CRT_RAW) { in cert_verify_gnutls()
/third_party/node/deps/openssl/openssl/apps/lib/
Ds_cb.c214 unsigned char cert_type = p[i]; in ssl_print_client_cert_types() local
215 const char *cname = lookup((int)cert_type, cert_type_list, NULL); in ssl_print_client_cert_types()
222 BIO_printf(bio, "UNKNOWN (%d),", cert_type); in ssl_print_client_cert_types()
/third_party/openssl/apps/lib/
Ds_cb.c214 unsigned char cert_type = p[i]; in ssl_print_client_cert_types() local
215 const char *cname = lookup((int)cert_type, cert_type_list, NULL); in ssl_print_client_cert_types()
222 BIO_printf(bio, "UNKNOWN (%d),", cert_type); in ssl_print_client_cert_types()
/third_party/curl/lib/vquic/
Dcurl_ngtcp2.c498 || ssl_config->cert_type) { in quic_set_client_cert()
501 ssl_config->primary.cert_blob, ssl_config->cert_type, in quic_set_client_cert()
/third_party/mbedtls/
DChangeLog4769 * Fixed offset for cert_type list in ssl_parse_certificate_request()