static QCryptoTLSCreds *test_tls_creds_create(QCryptoTLSCredsEndpoint endpoint, const char *certdir, Error **errp) { Object *parent = object_get_objects_root(); Object *creds = object_new_with_props( TYPE_QCRYPTO_TLS_CREDS_X509, parent, (endpoint == QCRYPTO_TLS_CREDS_ENDPOINT_SERVER ? "testtlscredsserver" : "testtlscredsclient"), errp, "endpoint", (endpoint == QCRYPTO_TLS_CREDS_ENDPOINT_SERVER ? "server" : "client"), "dir", certdir, "verify-peer", "yes", /* We skip initial sanity checks here because we * want to make sure that problems are being * detected at the TLS session validation stage, * and the test-crypto-tlscreds test already * validate the sanity check code. */ "sanity-check", "no", NULL ); if (*errp) { return NULL; } return QCRYPTO_TLS_CREDS(creds); }
static QCryptoTLSCreds *test_tls_creds_create(QCryptoTLSCredsEndpoint endpoint, const char *certdir, Error **errp) { Object *parent = object_get_objects_root(); Object *creds = object_new_with_props( TYPE_QCRYPTO_TLS_CREDS_X509, parent, "testtlscreds", errp, "endpoint", (endpoint == QCRYPTO_TLS_CREDS_ENDPOINT_SERVER ? "server" : "client"), "dir", certdir, "verify-peer", "yes", "sanity-check", "yes", NULL); if (*errp) { return NULL; } return QCRYPTO_TLS_CREDS(creds); }
cleanup: trace_qcrypto_tls_creds_get_path(creds, filename, *cred ? *cred : "<none>"); return ret; } #endif /* ! CONFIG_GNUTLS */ static void qcrypto_tls_creds_prop_set_verify(Object *obj, bool value, Error **errp G_GNUC_UNUSED) { QCryptoTLSCreds *creds = QCRYPTO_TLS_CREDS(obj); creds->verifyPeer = value; } static bool qcrypto_tls_creds_prop_get_verify(Object *obj, Error **errp G_GNUC_UNUSED) { QCryptoTLSCreds *creds = QCRYPTO_TLS_CREDS(obj); return creds->verifyPeer; }