Home
last modified time | relevance | path

Searched refs:crt_file (Results 1 – 8 of 8) sorted by relevance

/mbedtls-latest/tests/suites/
Dtest_suite_x509parse.function495 void x509_parse_san(char *crt_file, char *result_str, int parse_result)
509 TEST_EQUAL(mbedtls_x509_crt_parse_file(&crt, crt_file), parse_result);
540 void x509_cert_info(char *crt_file, char *result_str)
550 TEST_EQUAL(mbedtls_x509_crt_parse_file(&crt, crt_file), 0);
653 void x509_verify_restart(char *crt_file, char *ca_file,
677 TEST_EQUAL(mbedtls_x509_crt_parse_file(&crt, crt_file), 0);
710 void x509_verify(char *crt_file, char *ca_file, char *crl_file,
757 TEST_EQUAL(mbedtls_x509_crt_parse_file(&crt, crt_file), 0);
801 void x509_verify_ca_cb_failure(char *crt_file, char *ca_file, char *name,
813 TEST_EQUAL(mbedtls_x509_crt_parse_file(&crt, crt_file), 0);
[all …]
Dtest_suite_debug.function166 void mbedtls_debug_print_crt(char *crt_file, char *file, int line,
192 TEST_ASSERT(mbedtls_x509_crt_parse_file(&crt, crt_file) == 0);
Dtest_suite_ssl.function1982 void ssl_serialize_session_save_load(int ticket_len, char *crt_file,
1999 ((void) crt_file);
2010 &original, ticket_len, endpoint_type, crt_file) == 0);
2167 void ssl_serialize_session_load_save(int ticket_len, char *crt_file,
2182 ((void) crt_file);
2195 &session, ticket_len, endpoint_type, crt_file) == 0);
2240 void ssl_serialize_session_save_buf_size(int ticket_len, char *crt_file,
2255 ((void) crt_file);
2267 &session, ticket_len, endpoint_type, crt_file) == 0);
2299 void ssl_serialize_session_load_buf_size(int ticket_len, char *crt_file,
[all …]
/mbedtls-latest/programs/ssl/
Dssl_mail_client.c134 const char *crt_file; /* the file with the client certificate */ member
394 opt.crt_file = DFL_CRT_FILE; in main()
435 opt.crt_file = q; in main()
504 if (strlen(opt.crt_file)) { in main()
505 ret = mbedtls_x509_crt_parse_file(&clicert, opt.crt_file); in main()
Dssl_server2.c617 const char *crt_file; /* the file with the server certificate */ member
794 char *crt_file, *key_file, *ca_file, *auth_str; in sni_parse() local
811 GET_ITEM(crt_file); in sni_parse()
827 if (mbedtls_x509_crt_parse_file(new->cert, crt_file) != 0 || in sni_parse()
1704 opt.crt_file = DFL_CRT_FILE; in main()
1898 opt.crt_file = q; in main()
2630 if (strlen(opt.crt_file) && strcmp(opt.crt_file, "none") != 0) { in main()
2632 if ((ret = mbedtls_x509_crt_parse_file(&srvcert, opt.crt_file)) != 0) { in main()
2675 strcmp(opt.crt_file, "none") != 0 && in main()
Dssl_client2.c480 const char *crt_file; /* the file with the client certificate */ member
936 opt.crt_file = DFL_CRT_FILE; in main()
1118 opt.crt_file = q; in main()
1743 if (strcmp(opt.crt_file, "none") == 0) { in main()
1747 if (strlen(opt.crt_file)) { in main()
1748 ret = mbedtls_x509_crt_parse_file(&clicert, opt.crt_file); in main()
1979 if (strcmp(opt.crt_file, "none") != 0 && in main()
/mbedtls-latest/tests/src/test_helpers/
Dssl_helpers.c1677 const char *crt_file) in mbedtls_test_ssl_tls12_populate_session() argument
1696 if (crt_file != NULL && strlen(crt_file) != 0) { in mbedtls_test_ssl_tls12_populate_session()
1701 ret = mbedtls_x509_crt_parse_file(&tmp_crt, crt_file); in mbedtls_test_ssl_tls12_populate_session()
1751 (void) crt_file; in mbedtls_test_ssl_tls12_populate_session()
/mbedtls-latest/tests/include/test/
Dssl_helpers.h551 const char *crt_file);