Searched refs:key_file (Results 1 – 8 of 8) sorted by relevance
/mbedtls-development/tests/suites/ |
A D | test_suite_pkparse.function | 13 void pk_parse_keyfile_rsa( char * key_file, char * password, int result ) 24 res = mbedtls_pk_parse_keyfile( &ctx, key_file, pwd, 43 void pk_parse_public_keyfile_rsa( char * key_file, int result ) 50 res = mbedtls_pk_parse_public_keyfile( &ctx, key_file ); 68 void pk_parse_public_keyfile_ec( char * key_file, int result ) 75 res = mbedtls_pk_parse_public_keyfile( &ctx, key_file ); 93 void pk_parse_keyfile_ec( char * key_file, char * password, int result ) 100 res = mbedtls_pk_parse_keyfile( &ctx, key_file, password,
|
A D | test_suite_pkwrite.function | 13 void pk_write_pubkey_check( char * key_file ) 26 TEST_ASSERT( mbedtls_pk_parse_public_keyfile( &key, key_file ) == 0 ); 39 f = fopen( key_file, "r" ); 53 void pk_write_key_check( char * key_file ) 66 TEST_ASSERT( mbedtls_pk_parse_keyfile( &key, key_file, NULL, 80 f = fopen( key_file, "r" );
|
A D | test_suite_x509write.function | 79 void x509_csr_check( char * key_file, char * cert_req_check_file, int md_type, 97 TEST_ASSERT( mbedtls_pk_parse_keyfile( &key, key_file, NULL, 147 void x509_csr_check_opaque( char *key_file, int md_type, int key_usage, 167 TEST_ASSERT( mbedtls_pk_parse_keyfile( &key, key_file, NULL,
|
/mbedtls-development/programs/psa/ |
A D | key_ladder_demo.c | 174 FILE *key_file = NULL; in save_key() local 181 SYS_CHECK( fclose( key_file ) == 0 ); in save_key() 182 key_file = NULL; in save_key() 185 if( key_file != NULL) in save_key() 186 fclose( key_file ); in save_key() 230 FILE *key_file = NULL; in import_key_from_file() local 236 if( fread( &extra_byte, 1, 1, key_file ) != 0 ) in import_key_from_file() 243 SYS_CHECK( fclose( key_file ) == 0 ); in import_key_from_file() 244 key_file = NULL; in import_key_from_file() 251 if( key_file != NULL ) in import_key_from_file() [all …]
|
/mbedtls-development/programs/ssl/ |
A D | ssl_mail_client.c | 158 const char *key_file; /* the file with the client key */ member 426 opt.key_file = DFL_KEY_FILE; in main() 471 opt.key_file = q; in main() 554 if( strlen( opt.key_file ) ) in main() 556 ret = mbedtls_pk_parse_keyfile( &pkey, opt.key_file, "", in main()
|
A D | ssl_server2.c | 571 const char *key_file; /* the file with the server key */ member 727 char *crt_file, *key_file, *ca_file, *auth_str; in sni_parse() local 746 GET_ITEM( key_file ); in sni_parse() 761 mbedtls_pk_parse_keyfile( new->key, key_file, "", rng_get, &rng ) != 0 ) in sni_parse() 1498 opt.key_file = DFL_KEY_FILE; in main() 1628 opt.key_file = q; in main() 2398 if( strlen( opt.key_file ) && strcmp( opt.key_file, "none" ) != 0 ) in main() 2401 if( ( ret = mbedtls_pk_parse_keyfile( &pkey, opt.key_file, in main() 2443 strcmp( opt.key_file, "none" ) != 0 && in main()
|
A D | ssl_client2.c | 456 const char *key_file; /* the file with the client key */ member 825 opt.key_file = DFL_KEY_FILE; in main() 953 opt.key_file = q; in main() 1664 if( strcmp( opt.key_file, "none" ) == 0 ) in main() 1668 if( strlen( opt.key_file ) ) in main() 1669 ret = mbedtls_pk_parse_keyfile( &pkey, opt.key_file, opt.key_pwd, rng_get, &rng ); in main() 1877 strcmp( opt.key_file, "none" ) != 0 ) in main()
|
/mbedtls-development/ |
A D | ChangeLog | 852 specified through the existing key_file argument. This allows the use of
|
Completed in 21 milliseconds