Searched refs:crt_file (Results 1 – 8 of 8) sorted by relevance
/mbedtls-latest/tests/suites/ |
D | test_suite_x509parse.function | 495 void x509_parse_san(char *crt_file, char *result_str, int parse_result) 509 TEST_EQUAL(mbedtls_x509_crt_parse_file(&crt, crt_file), parse_result); 540 void x509_cert_info(char *crt_file, char *result_str) 550 TEST_EQUAL(mbedtls_x509_crt_parse_file(&crt, crt_file), 0); 653 void x509_verify_restart(char *crt_file, char *ca_file, 677 TEST_EQUAL(mbedtls_x509_crt_parse_file(&crt, crt_file), 0); 710 void x509_verify(char *crt_file, char *ca_file, char *crl_file, 757 TEST_EQUAL(mbedtls_x509_crt_parse_file(&crt, crt_file), 0); 801 void x509_verify_ca_cb_failure(char *crt_file, char *ca_file, char *name, 813 TEST_EQUAL(mbedtls_x509_crt_parse_file(&crt, crt_file), 0); [all …]
|
D | test_suite_debug.function | 166 void mbedtls_debug_print_crt(char *crt_file, char *file, int line, 192 TEST_ASSERT(mbedtls_x509_crt_parse_file(&crt, crt_file) == 0);
|
D | test_suite_ssl.function | 1982 void ssl_serialize_session_save_load(int ticket_len, char *crt_file, 1999 ((void) crt_file); 2010 &original, ticket_len, endpoint_type, crt_file) == 0); 2167 void ssl_serialize_session_load_save(int ticket_len, char *crt_file, 2182 ((void) crt_file); 2195 &session, ticket_len, endpoint_type, crt_file) == 0); 2240 void ssl_serialize_session_save_buf_size(int ticket_len, char *crt_file, 2255 ((void) crt_file); 2267 &session, ticket_len, endpoint_type, crt_file) == 0); 2299 void ssl_serialize_session_load_buf_size(int ticket_len, char *crt_file, [all …]
|
/mbedtls-latest/programs/ssl/ |
D | ssl_mail_client.c | 134 const char *crt_file; /* the file with the client certificate */ member 394 opt.crt_file = DFL_CRT_FILE; in main() 435 opt.crt_file = q; in main() 504 if (strlen(opt.crt_file)) { in main() 505 ret = mbedtls_x509_crt_parse_file(&clicert, opt.crt_file); in main()
|
D | ssl_server2.c | 617 const char *crt_file; /* the file with the server certificate */ member 794 char *crt_file, *key_file, *ca_file, *auth_str; in sni_parse() local 811 GET_ITEM(crt_file); in sni_parse() 827 if (mbedtls_x509_crt_parse_file(new->cert, crt_file) != 0 || in sni_parse() 1704 opt.crt_file = DFL_CRT_FILE; in main() 1898 opt.crt_file = q; in main() 2630 if (strlen(opt.crt_file) && strcmp(opt.crt_file, "none") != 0) { in main() 2632 if ((ret = mbedtls_x509_crt_parse_file(&srvcert, opt.crt_file)) != 0) { in main() 2675 strcmp(opt.crt_file, "none") != 0 && in main()
|
D | ssl_client2.c | 480 const char *crt_file; /* the file with the client certificate */ member 936 opt.crt_file = DFL_CRT_FILE; in main() 1118 opt.crt_file = q; in main() 1743 if (strcmp(opt.crt_file, "none") == 0) { in main() 1747 if (strlen(opt.crt_file)) { in main() 1748 ret = mbedtls_x509_crt_parse_file(&clicert, opt.crt_file); in main() 1979 if (strcmp(opt.crt_file, "none") != 0 && in main()
|
/mbedtls-latest/tests/src/test_helpers/ |
D | ssl_helpers.c | 1677 const char *crt_file) in mbedtls_test_ssl_tls12_populate_session() argument 1696 if (crt_file != NULL && strlen(crt_file) != 0) { in mbedtls_test_ssl_tls12_populate_session() 1701 ret = mbedtls_x509_crt_parse_file(&tmp_crt, crt_file); in mbedtls_test_ssl_tls12_populate_session() 1751 (void) crt_file; in mbedtls_test_ssl_tls12_populate_session()
|
/mbedtls-latest/tests/include/test/ |
D | ssl_helpers.h | 551 const char *crt_file);
|