Searched refs:crt_file (Results 1 – 8 of 8) sorted by relevance
/openthread-latest/third_party/mbedtls/repo/tests/suites/ |
D | test_suite_x509parse.function | 482 void x509_parse_san(char *crt_file, char *result_str, int parse_result) 496 TEST_EQUAL(mbedtls_x509_crt_parse_file(&crt, crt_file), parse_result); 527 void x509_cert_info(char *crt_file, char *result_str) 537 TEST_EQUAL(mbedtls_x509_crt_parse_file(&crt, crt_file), 0); 640 void x509_verify_restart(char *crt_file, char *ca_file, 664 TEST_EQUAL(mbedtls_x509_crt_parse_file(&crt, crt_file), 0); 697 void x509_verify(char *crt_file, char *ca_file, char *crl_file, 744 TEST_EQUAL(mbedtls_x509_crt_parse_file(&crt, crt_file), 0); 788 void x509_verify_ca_cb_failure(char *crt_file, char *ca_file, char *name, 800 TEST_EQUAL(mbedtls_x509_crt_parse_file(&crt, crt_file), 0); [all …]
|
D | test_suite_debug.function | 166 void mbedtls_debug_print_crt(char *crt_file, char *file, int line, 192 TEST_ASSERT(mbedtls_x509_crt_parse_file(&crt, crt_file) == 0);
|
D | test_suite_ssl.function | 1982 void ssl_serialize_session_save_load(int ticket_len, char *crt_file, 1999 ((void) crt_file); 2010 &original, ticket_len, endpoint_type, crt_file) == 0); 2154 void ssl_serialize_session_load_save(int ticket_len, char *crt_file, 2169 ((void) crt_file); 2182 &session, ticket_len, endpoint_type, crt_file) == 0); 2227 void ssl_serialize_session_save_buf_size(int ticket_len, char *crt_file, 2242 ((void) crt_file); 2254 &session, ticket_len, endpoint_type, crt_file) == 0); 2286 void ssl_serialize_session_load_buf_size(int ticket_len, char *crt_file, [all …]
|
/openthread-latest/third_party/mbedtls/repo/programs/ssl/ |
D | ssl_mail_client.c | 134 const char *crt_file; /* the file with the client certificate */ member 394 opt.crt_file = DFL_CRT_FILE; in main() 435 opt.crt_file = q; in main() 504 if (strlen(opt.crt_file)) { in main() 505 ret = mbedtls_x509_crt_parse_file(&clicert, opt.crt_file); in main()
|
D | ssl_server2.c | 617 const char *crt_file; /* the file with the server certificate */ member 794 char *crt_file, *key_file, *ca_file, *auth_str; in sni_parse() local 811 GET_ITEM(crt_file); in sni_parse() 827 if (mbedtls_x509_crt_parse_file(new->cert, crt_file) != 0 || in sni_parse() 1695 opt.crt_file = DFL_CRT_FILE; in main() 1889 opt.crt_file = q; in main() 2621 if (strlen(opt.crt_file) && strcmp(opt.crt_file, "none") != 0) { in main() 2623 if ((ret = mbedtls_x509_crt_parse_file(&srvcert, opt.crt_file)) != 0) { in main() 2666 strcmp(opt.crt_file, "none") != 0 && in main()
|
D | ssl_client2.c | 478 const char *crt_file; /* the file with the client certificate */ member 927 opt.crt_file = DFL_CRT_FILE; in main() 1108 opt.crt_file = q; in main() 1728 if (strcmp(opt.crt_file, "none") == 0) { in main() 1732 if (strlen(opt.crt_file)) { in main() 1733 ret = mbedtls_x509_crt_parse_file(&clicert, opt.crt_file); in main() 1960 if (strcmp(opt.crt_file, "none") != 0 && in main()
|
/openthread-latest/third_party/mbedtls/repo/tests/include/test/ |
D | ssl_helpers.h | 551 const char *crt_file);
|
/openthread-latest/third_party/mbedtls/repo/tests/src/test_helpers/ |
D | ssl_helpers.c | 1674 const char *crt_file) in mbedtls_test_ssl_tls12_populate_session() argument 1693 if (crt_file != NULL && strlen(crt_file) != 0) { in mbedtls_test_ssl_tls12_populate_session() 1698 ret = mbedtls_x509_crt_parse_file(&tmp_crt, crt_file); in mbedtls_test_ssl_tls12_populate_session() 1748 (void) crt_file; in mbedtls_test_ssl_tls12_populate_session()
|