/third_party/mbedtls/programs/fuzz/ |
H A D | fuzz_dtlsserver.c | 23 static mbedtls_x509_crt srvcert; variable 52 mbedtls_x509_crt_init(&srvcert); in LLVMFuzzerTestOneInput() 74 if (mbedtls_x509_crt_parse(&srvcert, (const unsigned char *) mbedtls_test_srv_crt, in LLVMFuzzerTestOneInput() 78 if (mbedtls_x509_crt_parse(&srvcert, (const unsigned char *) mbedtls_test_cas_pem, in LLVMFuzzerTestOneInput() 105 mbedtls_ssl_conf_ca_chain(&conf, srvcert.next, NULL); in LLVMFuzzerTestOneInput() 106 if (mbedtls_ssl_conf_own_cert(&conf, &srvcert, &pkey) != 0) { in LLVMFuzzerTestOneInput() 167 mbedtls_x509_crt_free(&srvcert); in LLVMFuzzerTestOneInput()
|
H A D | fuzz_server.c | 18 static mbedtls_x509_crt srvcert; variable 60 mbedtls_x509_crt_init(&srvcert); in LLVMFuzzerTestOneInput() 83 if (mbedtls_x509_crt_parse(&srvcert, (const unsigned char *) mbedtls_test_srv_crt, in LLVMFuzzerTestOneInput() 87 if (mbedtls_x509_crt_parse(&srvcert, (const unsigned char *) mbedtls_test_cas_pem, in LLVMFuzzerTestOneInput() 118 mbedtls_ssl_conf_ca_chain(&conf, srvcert.next, NULL); in LLVMFuzzerTestOneInput() 119 if (mbedtls_ssl_conf_own_cert(&conf, &srvcert, &pkey) != 0) { in LLVMFuzzerTestOneInput() 203 mbedtls_x509_crt_free(&srvcert); in LLVMFuzzerTestOneInput()
|
/third_party/mbedtls/programs/ssl/ |
H A D | dtls_server.c | 90 mbedtls_x509_crt srvcert; in main() local 105 mbedtls_x509_crt_init(&srvcert); in main() 150 ret = mbedtls_x509_crt_parse(&srvcert, (const unsigned char *) mbedtls_test_srv_crt, in main() 157 ret = mbedtls_x509_crt_parse(&srvcert, (const unsigned char *) mbedtls_test_cas_pem, in main() 215 mbedtls_ssl_conf_ca_chain(&conf, srvcert.next, NULL); in main() 216 if ((ret = mbedtls_ssl_conf_own_cert(&conf, &srvcert, &pkey)) != 0) { in main() 384 mbedtls_x509_crt_free(&srvcert); in main()
|
H A D | ssl_fork_server.c | 84 mbedtls_x509_crt srvcert; in main() local 93 mbedtls_x509_crt_init(&srvcert); in main() 133 ret = mbedtls_x509_crt_parse(&srvcert, (const unsigned char *) mbedtls_test_srv_crt, in main() 140 ret = mbedtls_x509_crt_parse(&srvcert, (const unsigned char *) mbedtls_test_cas_pem, in main() 174 mbedtls_ssl_conf_ca_chain(&conf, srvcert.next, NULL); in main() 175 if ((ret = mbedtls_ssl_conf_own_cert(&conf, &srvcert, &pkey)) != 0) { in main() 366 mbedtls_x509_crt_free(&srvcert); in main()
|
H A D | ssl_server.c | 77 mbedtls_x509_crt srvcert; in main() local 90 mbedtls_x509_crt_init(&srvcert); in main() 135 ret = mbedtls_x509_crt_parse(&srvcert, (const unsigned char *) mbedtls_test_srv_crt, in main() 142 ret = mbedtls_x509_crt_parse(&srvcert, (const unsigned char *) mbedtls_test_cas_pem, in main() 195 mbedtls_ssl_conf_ca_chain(&conf, srvcert.next, NULL); in main() 196 if ((ret = mbedtls_ssl_conf_own_cert(&conf, &srvcert, &pkey)) != 0) { in main() 344 mbedtls_x509_crt_free(&srvcert); in main()
|
H A D | ssl_pthread_server.c | 287 mbedtls_x509_crt srvcert; in main() local 305 mbedtls_x509_crt_init(&srvcert); in main() 359 ret = mbedtls_x509_crt_parse(&srvcert, (const unsigned char *) mbedtls_test_srv_crt, in main() 411 if ((ret = mbedtls_ssl_conf_own_cert(&conf, &srvcert, &pkey)) != 0) { in main() 466 mbedtls_x509_crt_free(&srvcert); in main()
|
H A D | ssl_server2.c | 1541 mbedtls_x509_crt srvcert; in main() local 1638 mbedtls_x509_crt_init(&srvcert); in main() 2623 if ((ret = mbedtls_x509_crt_parse_file(&srvcert, opt.crt_file)) != 0) { in main() 2672 if ((ret = mbedtls_x509_crt_parse(&srvcert, in main() 3074 ret = ssl_async_set_key(&ssl_async_keys, &srvcert, pk, 0, in main() 3084 if ((ret = mbedtls_ssl_conf_own_cert(&conf, &srvcert, pk)) != 0) { in main() 4235 mbedtls_x509_crt_free(&srvcert); in main()
|
/third_party/openssl/test/ |
H A D | cmp_vfy_test.c | 75 static X509 *srvcert = NULL; variable 225 || !add_trusted(fixture->cmp_ctx, srvcert)) { in test_validate_msg_signature_partial_chain() 253 fixture->cert = srvcert; in test_validate_msg_signature_srvcert() 259 wrong? clcert : srvcert)) in test_validate_msg_signature_srvcert() 352 || !TEST_true(OSSL_CMP_CTX_set1_srvCert(fixture->cmp_ctx, srvcert))) { in test_validate_with_sender() 362 return test_validate_with_sender(X509_get_subject_name(srvcert), 1); in test_validate_msg_signature_expected_sender() 412 setup_path(&fixture, srvcert /* wrong/non-root cert */, 0); in test_validate_cert_path_wrong_anchor() 561 X509_free(srvcert); in cleanup_tests() 639 if (!TEST_ptr(srvcert = load_cert_pem(server_f, libctx)) in OPT_TEST_DECLARE_USAGE()
|
/third_party/lwip/src/apps/altcp_tls/ |
H A D | altcp_tls_mbedtls.c | 805 mbedtls_x509_crt *srvcert; in altcp_tls_config_server_add_privkey_cert() local 815 srvcert = config->cert + config->cert_count; in altcp_tls_config_server_add_privkey_cert() 816 mbedtls_x509_crt_init(srvcert); in altcp_tls_config_server_add_privkey_cert() 822 ret = mbedtls_x509_crt_parse(srvcert, cert, cert_len); in altcp_tls_config_server_add_privkey_cert() 831 mbedtls_x509_crt_free(srvcert); in altcp_tls_config_server_add_privkey_cert() 835 ret = mbedtls_ssl_conf_own_cert(&config->conf, srvcert, pkey); in altcp_tls_config_server_add_privkey_cert() 838 mbedtls_x509_crt_free(srvcert); in altcp_tls_config_server_add_privkey_cert()
|
/third_party/node/deps/openssl/openssl/apps/ |
H A D | cmp.c | 297 "also used as recipient if neither -recipient nor -srvcert are given"}, 340 "Issuer is used as recipient unless -recipient, -srvcert, or -issuer given"}, 363 "DN of CA. Default: subject of -srvcert, -issuer, issuer of -oldcert or -cert"}, 376 {OPT_MORE_STR, 0, 0, "unless -srvcert is given"}, 379 {"srvcert", OPT_SRVCERT, 's', 382 "DN of expected sender of responses. Defaults to subject of -srvcert, if any"}, 1183 X509 *srvcert; in setup_verification_ctx() local 1189 CMP_warn("-trusted option is ignored since -srvcert option is present"); in setup_verification_ctx() 1193 CMP_warn("-recipient option is ignored since -srvcert option is present"); in setup_verification_ctx() 1196 srvcert in setup_verification_ctx() [all...] |
/third_party/openssl/apps/ |
H A D | cmp.c | 297 "also used as recipient if neither -recipient nor -srvcert are given"}, 340 "Issuer is used as recipient unless -recipient, -srvcert, or -issuer given"}, 363 "DN of CA. Default: subject of -srvcert, -issuer, issuer of -oldcert or -cert"}, 376 {OPT_MORE_STR, 0, 0, "unless -srvcert is given"}, 379 {"srvcert", OPT_SRVCERT, 's', 382 "DN of expected sender of responses. Defaults to subject of -srvcert, if any"}, 1183 X509 *srvcert; in setup_verification_ctx() local 1189 CMP_warn("-trusted option is ignored since -srvcert option is present"); in setup_verification_ctx() 1193 CMP_warn("-recipient option is ignored since -srvcert option is present"); in setup_verification_ctx() 1196 srvcert in setup_verification_ctx() [all...] |