Home
last modified time | relevance | path

Searched refs:crt_file (Results 1 – 8 of 8) sorted by relevance

/openthread-latest/third_party/mbedtls/repo/tests/suites/
Dtest_suite_x509parse.function482 void x509_parse_san(char *crt_file, char *result_str, int parse_result)
496 TEST_EQUAL(mbedtls_x509_crt_parse_file(&crt, crt_file), parse_result);
527 void x509_cert_info(char *crt_file, char *result_str)
537 TEST_EQUAL(mbedtls_x509_crt_parse_file(&crt, crt_file), 0);
640 void x509_verify_restart(char *crt_file, char *ca_file,
664 TEST_EQUAL(mbedtls_x509_crt_parse_file(&crt, crt_file), 0);
697 void x509_verify(char *crt_file, char *ca_file, char *crl_file,
744 TEST_EQUAL(mbedtls_x509_crt_parse_file(&crt, crt_file), 0);
788 void x509_verify_ca_cb_failure(char *crt_file, char *ca_file, char *name,
800 TEST_EQUAL(mbedtls_x509_crt_parse_file(&crt, crt_file), 0);
[all …]
Dtest_suite_debug.function166 void mbedtls_debug_print_crt(char *crt_file, char *file, int line,
192 TEST_ASSERT(mbedtls_x509_crt_parse_file(&crt, crt_file) == 0);
Dtest_suite_ssl.function1982 void ssl_serialize_session_save_load(int ticket_len, char *crt_file,
1999 ((void) crt_file);
2010 &original, ticket_len, endpoint_type, crt_file) == 0);
2154 void ssl_serialize_session_load_save(int ticket_len, char *crt_file,
2169 ((void) crt_file);
2182 &session, ticket_len, endpoint_type, crt_file) == 0);
2227 void ssl_serialize_session_save_buf_size(int ticket_len, char *crt_file,
2242 ((void) crt_file);
2254 &session, ticket_len, endpoint_type, crt_file) == 0);
2286 void ssl_serialize_session_load_buf_size(int ticket_len, char *crt_file,
[all …]
/openthread-latest/third_party/mbedtls/repo/programs/ssl/
Dssl_mail_client.c134 const char *crt_file; /* the file with the client certificate */ member
394 opt.crt_file = DFL_CRT_FILE; in main()
435 opt.crt_file = q; in main()
504 if (strlen(opt.crt_file)) { in main()
505 ret = mbedtls_x509_crt_parse_file(&clicert, opt.crt_file); in main()
Dssl_server2.c617 const char *crt_file; /* the file with the server certificate */ member
794 char *crt_file, *key_file, *ca_file, *auth_str; in sni_parse() local
811 GET_ITEM(crt_file); in sni_parse()
827 if (mbedtls_x509_crt_parse_file(new->cert, crt_file) != 0 || in sni_parse()
1695 opt.crt_file = DFL_CRT_FILE; in main()
1889 opt.crt_file = q; in main()
2621 if (strlen(opt.crt_file) && strcmp(opt.crt_file, "none") != 0) { in main()
2623 if ((ret = mbedtls_x509_crt_parse_file(&srvcert, opt.crt_file)) != 0) { in main()
2666 strcmp(opt.crt_file, "none") != 0 && in main()
Dssl_client2.c478 const char *crt_file; /* the file with the client certificate */ member
927 opt.crt_file = DFL_CRT_FILE; in main()
1108 opt.crt_file = q; in main()
1728 if (strcmp(opt.crt_file, "none") == 0) { in main()
1732 if (strlen(opt.crt_file)) { in main()
1733 ret = mbedtls_x509_crt_parse_file(&clicert, opt.crt_file); in main()
1960 if (strcmp(opt.crt_file, "none") != 0 && in main()
/openthread-latest/third_party/mbedtls/repo/tests/include/test/
Dssl_helpers.h551 const char *crt_file);
/openthread-latest/third_party/mbedtls/repo/tests/src/test_helpers/
Dssl_helpers.c1674 const char *crt_file) in mbedtls_test_ssl_tls12_populate_session() argument
1693 if (crt_file != NULL && strlen(crt_file) != 0) { in mbedtls_test_ssl_tls12_populate_session()
1698 ret = mbedtls_x509_crt_parse_file(&tmp_crt, crt_file); in mbedtls_test_ssl_tls12_populate_session()
1748 (void) crt_file; in mbedtls_test_ssl_tls12_populate_session()