Home
last modified time | relevance | path

Searched refs:crt_file (Results 1 – 6 of 6) sorted by relevance

/third_party/mbedtls/tests/suites/
Dtest_suite_x509parse.function404 void x509_parse_san( char * crt_file, char * result_str )
417 TEST_ASSERT( mbedtls_x509_crt_parse_file( &crt, crt_file ) == 0 );
444 void x509_cert_info( char * crt_file, char * result_str )
453 TEST_ASSERT( mbedtls_x509_crt_parse_file( &crt, crt_file ) == 0 );
545 void x509_verify_restart( char *crt_file, char *ca_file,
569 TEST_ASSERT( mbedtls_x509_crt_parse_file( &crt, crt_file ) == 0 );
601 void x509_verify( char *crt_file, char *ca_file, char *crl_file,
646 TEST_ASSERT( mbedtls_x509_crt_parse_file( &crt, crt_file ) == 0 );
677 void x509_verify_ca_cb_failure( char *crt_file, char *ca_file, char *name,
688 TEST_ASSERT( mbedtls_x509_crt_parse_file( &crt, crt_file ) == 0 );
[all …]
Dtest_suite_debug.function150 void mbedtls_debug_print_crt( char * crt_file, char * file, int line,
173 TEST_ASSERT( mbedtls_x509_crt_parse_file( &crt, crt_file ) == 0 );
Dtest_suite_ssl.function1440 const char *crt_file )
1453 if( crt_file != NULL && strlen( crt_file ) != 0 )
1459 ret = mbedtls_x509_crt_parse_file( &tmp_crt, crt_file );
1491 (void) crt_file;
4093 void ssl_serialize_session_save_load( int ticket_len, char *crt_file )
4107 TEST_ASSERT( ssl_populate_session_tls12( &original, ticket_len, crt_file ) == 0 );
4191 void ssl_serialize_session_load_save( int ticket_len, char *crt_file )
4204 TEST_ASSERT( ssl_populate_session_tls12( &session, ticket_len, crt_file ) == 0 );
4241 void ssl_serialize_session_save_buf_size( int ticket_len, char *crt_file )
4254 TEST_ASSERT( ssl_populate_session_tls12( &session, ticket_len, crt_file ) == 0 );
[all …]
/third_party/mbedtls/programs/ssl/
Dssl_mail_client.c157 const char *crt_file; /* the file with the client certificate */ member
425 opt.crt_file = DFL_CRT_FILE; in main()
469 opt.crt_file = q; in main()
541 if( strlen( opt.crt_file ) ) in main()
542 ret = mbedtls_x509_crt_parse_file( &clicert, opt.crt_file ); in main()
Dssl_server2.c574 const char *crt_file; /* the file with the server certificate */ member
731 char *crt_file, *key_file, *ca_file, *auth_str; in sni_parse() local
749 GET_ITEM( crt_file ); in sni_parse()
764 if( mbedtls_x509_crt_parse_file( new->cert, crt_file ) != 0 || in sni_parse()
1500 opt.crt_file = DFL_CRT_FILE; in main()
1629 opt.crt_file = q; in main()
2389 if( strlen( opt.crt_file ) && strcmp( opt.crt_file, "none" ) != 0 ) in main()
2392 if( ( ret = mbedtls_x509_crt_parse_file( &srvcert, opt.crt_file ) ) != 0 ) in main()
2443 strcmp( opt.crt_file, "none" ) != 0 && in main()
Dssl_client2.c459 const char *crt_file; /* the file with the client certificate */ member
827 opt.crt_file = DFL_CRT_FILE; in main()
954 opt.crt_file = q; in main()
1657 if( strcmp( opt.crt_file, "none" ) == 0 ) in main()
1661 if( strlen( opt.crt_file ) ) in main()
1662 ret = mbedtls_x509_crt_parse_file( &clicert, opt.crt_file ); in main()
1887 if( strcmp( opt.crt_file, "none" ) != 0 && in main()