Lines Matching refs:cert

84 static char *cert = NULL;
366 &sctx, &cctx, cert, privkey)))
449 &sctx, &cctx, cert, privkey))
566 /* server key, cert, chain, and root */
600 /* application provides intermediate certs needed to verify server cert */
760 &sctx, &cctx, cert, privkey)))
802 &sctx, &cctx, cert, privkey)) {
862 &sctx, &cctx, cert, privkey))
964 if (!TEST_ptr(certbio = BIO_new_file(cert, "r")))
976 max_version, &sctx, &cctx, cert,
1179 &sctx, &cctx, cert, privkey)))
1318 &sctx, &cctx, cert, privkey)))
1610 &sctx, &cctx, cert, privkey)))
1689 &sctx, &cctx, cert,
1867 &sctx, &cctx, cert, privkey))
1945 * We'll just use any old cert for this test - it doesn't have to be an OCSP
1946 * specific one. We'll use the server cert.
1948 if (!TEST_ptr(certbio = BIO_new_file(cert, "r"))
2036 &sctx, &cctx, cert, privkey)))
2430 sctx, cctx, cert, privkey))
2918 &sctx, &cctx, cert, privkey)))
3143 &sctx, &cctx, cert, privkey)))
3393 sctx, cctx, cert, privkey)))
3720 &sctx, &cctx, cert, privkey)))
3869 &sctx, &cctx, cert, privkey)))
4599 &sctx, &cctx, cert, privkey))
4669 &sctx, &cctx, cert, privkey))
4898 max_version, &sctx, &cctx, cert,
5073 max_version, &sctx, &cctx, cert,
5254 &sctx, &cctx, cert, privkey)))
5354 &sctx, &cctx, idx == 3 ? NULL : cert,
5362 * necessary if we have no cert/priv key. In that case the server should
5617 &sctx, &cctx, cert, privkey)))
5847 &sctx, &cctx, cert, privkey)))
5853 &sctx2, NULL, cert, privkey)))
5870 if (!TEST_int_eq(SSL_CTX_use_certificate_file(cctx, cert,
6143 &sctx, &cctx, cert, privkey)))
6229 &sctx, &cctx, cert, privkey)))
6443 &sctx, &cctx, cert, privkey))
6506 &sctx, &cctx, cert, privkey))
6590 &sctx, &cctx, cert, privkey))
6675 &sctx, &cctx, cert, privkey))
6764 &sctx, &cctx, cert, privkey))
6842 &sctx, &cctx, cert, privkey))
7003 &sctx, &cctx, cert, privkey)))
7226 &sctx, &cctx, cert, privkey)))
7488 tlsvers, tlsvers, &sctx, &cctx, cert,
7552 &sctx, &cctx, cert, privkey)))
7559 &sctx, &cctx, cert, privkey)))
7728 &sctx, &cctx, cert, privkey)))
8001 &sctx, &cctx, cert, privkey)))
8109 &sctx, &cctx, cert, privkey)))
8182 &sctx, &cctx, cert, privkey)))
8332 if (!TEST_true(SSL_use_certificate_file(s, cert, SSL_FILETYPE_PEM))
8343 ecdsacert = test_mk_file_path(certsdir, "server-ecdsa-cert.pem");
8372 * If the cert doesn't show as valid here (e.g., because we don't
8405 * Test 4: Failure - SSL_check_chain fails from callback due to bad cert in the
8407 * Test 5: Failure - SSL_check_chain fails from callback due to bad ee cert
8416 /* We use an EC cert in these tests, so we skip in a no-ec build */
8450 * the chain doesn't meet (the root uses an RSA cert)
8458 * the ee cert doesn't meet (the ee uses an ECDSA cert)
8510 in = BIO_new_file(cert, "r");
8555 &sctx, &cctx, cert, privkey)))
8618 &sctx, &cctx, cert, privkey)))
8773 max_version, &sctx, &cctx, cert,
8970 &sctx, &cctx, cert, privkey))
9094 &sctx, &cctx, cert, privkey))
9282 &sctx, &cctx, cert, privkey)))
9384 &sctx, &cctx, cert, privkey))
9428 &sctx, &cctx, cert, privkey)))
9613 &sctx, &cctx, cert, privkey)))
9709 thiscert = cert;
9817 &sctx2, &cctx, cert, privkey)))
9875 &sctx, &cctx, cert, privkey)))
10269 TLS1_2_VERSION, &sctx, &cctx, cert,
10499 max_version, &sctx, &cctx, cert,
10664 cert = test_mk_file_path(certsdir, "servercert.pem");
10665 if (cert == NULL)
10672 cert2 = test_mk_file_path(certsdir, "server-ecdsa-cert.pem");
10680 cert1024 = test_mk_file_path(certsdir, "ee-cert-1024.pem");
10688 cert3072 = test_mk_file_path(certsdir, "ee-cert-3072.pem");
10696 cert4096 = test_mk_file_path(certsdir, "ee-cert-4096.pem");
10704 cert8192 = test_mk_file_path(certsdir, "ee-cert-8192.pem");
10868 OPENSSL_free(cert);
10880 OPENSSL_free(cert);