Home
last modified time | relevance | path

Searched refs:valid (Results 1 – 7 of 7) sorted by relevance

/tests/psa-client-server/psasim/src/
A Dpsa_ff_client.c29 int valid; member
50 if (handles[i].valid == 0) { in get_next_free_handle()
60 if (handles[handle].valid == 1) { in handle_is_valid()
300 handles[idx].valid = 1; in psa_connect()
384 handles[handle].valid = 0; in psa_close()
/tests/suites/
A Dtest_suite_x509parse.data494 # Parse the following valid DN:
838 X509 CRT verification #52 (CA keyUsage valid)
954 X509 CRT verification #82 (Not yet valid CA and valid CA)
958 X509 CRT verification #83 (valid CA and Not yet valid CA)
962 X509 CRT verification #84 (valid CA and Not yet valid CA)
966 X509 CRT verification #85 (Not yet valid CA and valid CA)
1074 X509 CRT parse CN: IPv4 valid address
1119 X509 CRT parse CN: IPv6 valid address
2248 X509 CRT (TBS, valid v3Ext in v3 CRT)
2252 X509 CRT ASN1 (TBS, valid v3Ext in v1 CRT)
[all …]
A Dtest_suite_net.function113 /* In principle, mbedtls_net_poll() with valid arguments should succeed.
A Dtest_suite_ssl.data3078 Version config: valid client TLS 1.2 only
3082 Version config: valid client DTLS 1.2 only
3086 Version config: valid server TLS 1.2 only
3090 Version config: valid server DTLS 1.2 only
3110 Version config: valid client TLS 1.3 only
3118 Version config: valid server TLS 1.3 only
3142 Version config: valid client hybrid TLS 1.2/3
3150 Version config: valid server hybrid TLS 1.2/3
3158 Version config: valid client hybrid TLS 1.2/3, no TLS 1.2
3166 Version config: valid server hybrid TLS 1.2/3, no TLS 1.2
[all …]
A Dtest_suite_ssl.tls-defrag.data29 # 0000 - length of client_shares (empty is valid)
A Dtest_suite_ssl.function284 * Assume the buffer content is a valid sequence of records.
458 * error if the length is not zero, and that a NULL output is valid for data
546 /* In order to always have a valid pointer we always allocate at least 1
560 /* In order to always have a valid pointer we always allocate at least 1
1274 /* Test that the first half of the message is valid, and second one isn't */
1285 /* Test that the first half of the message is valid */
1336 /* Return to a valid state */
3984 /* check that the opaque key is still valid after failure */
5490 * - valid records that contain crafted handshake messages, but only
A Dtest_suite_x509write.data190 X509 String to Names #8 (Escaped valid characters)

Completed in 164 milliseconds