Searched refs:crt_file (Results 1 – 6 of 6) sorted by relevance
/third_party/mbedtls/tests/suites/ |
D | test_suite_x509parse.function | 404 void x509_parse_san( char * crt_file, char * result_str ) 417 TEST_ASSERT( mbedtls_x509_crt_parse_file( &crt, crt_file ) == 0 ); 444 void x509_cert_info( char * crt_file, char * result_str ) 453 TEST_ASSERT( mbedtls_x509_crt_parse_file( &crt, crt_file ) == 0 ); 545 void x509_verify_restart( char *crt_file, char *ca_file, 569 TEST_ASSERT( mbedtls_x509_crt_parse_file( &crt, crt_file ) == 0 ); 601 void x509_verify( char *crt_file, char *ca_file, char *crl_file, 646 TEST_ASSERT( mbedtls_x509_crt_parse_file( &crt, crt_file ) == 0 ); 677 void x509_verify_ca_cb_failure( char *crt_file, char *ca_file, char *name, 688 TEST_ASSERT( mbedtls_x509_crt_parse_file( &crt, crt_file ) == 0 ); [all …]
|
D | test_suite_debug.function | 150 void mbedtls_debug_print_crt( char * crt_file, char * file, int line, 173 TEST_ASSERT( mbedtls_x509_crt_parse_file( &crt, crt_file ) == 0 );
|
D | test_suite_ssl.function | 1440 const char *crt_file ) 1453 if( crt_file != NULL && strlen( crt_file ) != 0 ) 1459 ret = mbedtls_x509_crt_parse_file( &tmp_crt, crt_file ); 1491 (void) crt_file; 4093 void ssl_serialize_session_save_load( int ticket_len, char *crt_file ) 4107 TEST_ASSERT( ssl_populate_session_tls12( &original, ticket_len, crt_file ) == 0 ); 4191 void ssl_serialize_session_load_save( int ticket_len, char *crt_file ) 4204 TEST_ASSERT( ssl_populate_session_tls12( &session, ticket_len, crt_file ) == 0 ); 4241 void ssl_serialize_session_save_buf_size( int ticket_len, char *crt_file ) 4254 TEST_ASSERT( ssl_populate_session_tls12( &session, ticket_len, crt_file ) == 0 ); [all …]
|
/third_party/mbedtls/programs/ssl/ |
D | ssl_mail_client.c | 157 const char *crt_file; /* the file with the client certificate */ member 425 opt.crt_file = DFL_CRT_FILE; in main() 469 opt.crt_file = q; in main() 541 if( strlen( opt.crt_file ) ) in main() 542 ret = mbedtls_x509_crt_parse_file( &clicert, opt.crt_file ); in main()
|
D | ssl_server2.c | 574 const char *crt_file; /* the file with the server certificate */ member 731 char *crt_file, *key_file, *ca_file, *auth_str; in sni_parse() local 749 GET_ITEM( crt_file ); in sni_parse() 764 if( mbedtls_x509_crt_parse_file( new->cert, crt_file ) != 0 || in sni_parse() 1500 opt.crt_file = DFL_CRT_FILE; in main() 1629 opt.crt_file = q; in main() 2389 if( strlen( opt.crt_file ) && strcmp( opt.crt_file, "none" ) != 0 ) in main() 2392 if( ( ret = mbedtls_x509_crt_parse_file( &srvcert, opt.crt_file ) ) != 0 ) in main() 2443 strcmp( opt.crt_file, "none" ) != 0 && in main()
|
D | ssl_client2.c | 459 const char *crt_file; /* the file with the client certificate */ member 827 opt.crt_file = DFL_CRT_FILE; in main() 954 opt.crt_file = q; in main() 1657 if( strcmp( opt.crt_file, "none" ) == 0 ) in main() 1661 if( strlen( opt.crt_file ) ) in main() 1662 ret = mbedtls_x509_crt_parse_file( &clicert, opt.crt_file ); in main() 1887 if( strcmp( opt.crt_file, "none" ) != 0 && in main()
|