Home
last modified time | relevance | path

Searched refs:key_file (Results 1 – 8 of 8) sorted by relevance

/mbedtls-development/tests/suites/
A Dtest_suite_pkparse.function13 void pk_parse_keyfile_rsa( char * key_file, char * password, int result )
24 res = mbedtls_pk_parse_keyfile( &ctx, key_file, pwd,
43 void pk_parse_public_keyfile_rsa( char * key_file, int result )
50 res = mbedtls_pk_parse_public_keyfile( &ctx, key_file );
68 void pk_parse_public_keyfile_ec( char * key_file, int result )
75 res = mbedtls_pk_parse_public_keyfile( &ctx, key_file );
93 void pk_parse_keyfile_ec( char * key_file, char * password, int result )
100 res = mbedtls_pk_parse_keyfile( &ctx, key_file, password,
A Dtest_suite_pkwrite.function13 void pk_write_pubkey_check( char * key_file )
26 TEST_ASSERT( mbedtls_pk_parse_public_keyfile( &key, key_file ) == 0 );
39 f = fopen( key_file, "r" );
53 void pk_write_key_check( char * key_file )
66 TEST_ASSERT( mbedtls_pk_parse_keyfile( &key, key_file, NULL,
80 f = fopen( key_file, "r" );
A Dtest_suite_x509write.function79 void x509_csr_check( char * key_file, char * cert_req_check_file, int md_type,
97 TEST_ASSERT( mbedtls_pk_parse_keyfile( &key, key_file, NULL,
147 void x509_csr_check_opaque( char *key_file, int md_type, int key_usage,
167 TEST_ASSERT( mbedtls_pk_parse_keyfile( &key, key_file, NULL,
/mbedtls-development/programs/psa/
A Dkey_ladder_demo.c174 FILE *key_file = NULL; in save_key() local
181 SYS_CHECK( fclose( key_file ) == 0 ); in save_key()
182 key_file = NULL; in save_key()
185 if( key_file != NULL) in save_key()
186 fclose( key_file ); in save_key()
230 FILE *key_file = NULL; in import_key_from_file() local
236 if( fread( &extra_byte, 1, 1, key_file ) != 0 ) in import_key_from_file()
243 SYS_CHECK( fclose( key_file ) == 0 ); in import_key_from_file()
244 key_file = NULL; in import_key_from_file()
251 if( key_file != NULL ) in import_key_from_file()
[all …]
/mbedtls-development/programs/ssl/
A Dssl_mail_client.c158 const char *key_file; /* the file with the client key */ member
426 opt.key_file = DFL_KEY_FILE; in main()
471 opt.key_file = q; in main()
554 if( strlen( opt.key_file ) ) in main()
556 ret = mbedtls_pk_parse_keyfile( &pkey, opt.key_file, "", in main()
A Dssl_server2.c571 const char *key_file; /* the file with the server key */ member
727 char *crt_file, *key_file, *ca_file, *auth_str; in sni_parse() local
746 GET_ITEM( key_file ); in sni_parse()
761 mbedtls_pk_parse_keyfile( new->key, key_file, "", rng_get, &rng ) != 0 ) in sni_parse()
1498 opt.key_file = DFL_KEY_FILE; in main()
1628 opt.key_file = q; in main()
2398 if( strlen( opt.key_file ) && strcmp( opt.key_file, "none" ) != 0 ) in main()
2401 if( ( ret = mbedtls_pk_parse_keyfile( &pkey, opt.key_file, in main()
2443 strcmp( opt.key_file, "none" ) != 0 && in main()
A Dssl_client2.c456 const char *key_file; /* the file with the client key */ member
825 opt.key_file = DFL_KEY_FILE; in main()
953 opt.key_file = q; in main()
1664 if( strcmp( opt.key_file, "none" ) == 0 ) in main()
1668 if( strlen( opt.key_file ) ) in main()
1669 ret = mbedtls_pk_parse_keyfile( &pkey, opt.key_file, opt.key_pwd, rng_get, &rng ); in main()
1877 strcmp( opt.key_file, "none" ) != 0 ) in main()
/mbedtls-development/
A DChangeLog852 specified through the existing key_file argument. This allows the use of

Completed in 21 milliseconds