/mbedtls-development/tests/suites/ |
A D | test_suite_psa_crypto_metadata.function | 81 #define TEST_CLASSIFICATION_MACRO( cond, flag, alg, flags ) \ 86 if( ( flags ) & ( flag ) ) \ 121 TEST_CLASSIFICATION_MACRO( 1, ALG_IS_HMAC, alg, flags ); 125 TEST_CLASSIFICATION_MACRO( 1, ALG_IS_RSA_PSS, alg, flags ); 128 TEST_CLASSIFICATION_MACRO( 1, ALG_IS_DSA, alg, flags ); 133 TEST_CLASSIFICATION_MACRO( 1, ALG_IS_ECDSA, alg, flags ); 141 TEST_CLASSIFICATION_MACRO( 1, ALG_IS_RSA_OAEP, alg, flags ); 142 TEST_CLASSIFICATION_MACRO( 1, ALG_IS_HKDF, alg, flags ); 144 TEST_CLASSIFICATION_MACRO( 1, ALG_IS_ECDH, alg, flags ); 145 TEST_CLASSIFICATION_MACRO( 1, ALG_IS_FFDH, alg, flags ); [all …]
|
A D | test_suite_x509parse.function | 66 *flags |= MBEDTLS_X509_BADCERT_OTHER; 76 *flags = 0; 211 ((void) flags); 225 ret = mbedtls_snprintf( p, n, " - flags 0x%08x\n", *flags ); 553 uint32_t flags = 0; 609 uint32_t flags = 0; 660 flags = 0; 683 uint32_t flags = 0; 713 uint32_t flags = 0; 1044 uint32_t flags; [all …]
|
A D | test_suite_psa_its.function | 85 uint32_t flags = flags_arg; 92 PSA_ASSERT( psa_its_set_wrap( uid, data->len, data->x, flags ) ); 96 TEST_ASSERT( info.flags == flags ); 125 TEST_ASSERT( info.flags == flags1 ); 132 TEST_ASSERT( info.flags == flags2 );
|
A D | test_suite_psa_crypto_storage_format.function | 73 int flags ) 111 if( flags & TEST_FLAG_EXERCISE ) 120 if( flags & TEST_FLAG_READ_ONLY ) 199 data_t *representation, int flags ) 229 uid, representation, flags ) );
|
A D | test_suite_psa_crypto_generate_key.function | 21 // key lifetiem, usage flags, algorithm are irrelevant for this test
|
A D | test_suite_psa_its.data | 10 Set/get/remove with flags
|
A D | test_suite_x509parse.data | 904 …arSSL, CN=PolarSSL Test CA - flags 0x00000000\ndepth 0 - serial 01 - subject C=NL, O=PolarSSL, CN=… 916 …arSSL, CN=PolarSSL Test CA - flags 0x00000000\ndepth 0 - serial 01 - subject C=NL, O=PolarSSL, CN=… 920 …arSSL, CN=PolarSSL Test CA - flags 0x00000000\ndepth 0 - serial 01 - subject C=NL, O=PolarSSL, CN=… 924 …arSSL, CN=PolarSSL Test CA - flags 0x00000000\ndepth 0 - serial 01 - subject C=NL, O=PolarSSL, CN=… 928 …flags 0x00000000\ndepth 1 - serial 0E - subject C=NL, O=PolarSSL, CN=PolarSSL Test Intermediate CA… 932 …flags 0x00000000\ndepth 1 - serial 0E - subject C=NL, O=PolarSSL, CN=PolarSSL Test Intermediate CA… 948 …flags 0x00000001\ndepth 1 - serial 0E - subject C=NL, O=PolarSSL, CN=PolarSSL Test Intermediate CA… 952 …flags 0x00000000\ndepth 2 - serial 0F - subject C=NL, O=PolarSSL, CN=PolarSSL Test Intermediate EC… 956 …flags 0x00000000\ndepth 2 - serial 0F - subject C=NL, O=PolarSSL, CN=PolarSSL Test Intermediate EC… 960 …flags 0x00000000\ndepth 1 - serial 4D - subject C=UK, O=mbed TLS, CN=mbed TLS Test intermediate CA… [all …]
|
A D | helpers.function | 80 /* Helper flags for complex dependencies */
|
/mbedtls-development/library/ |
A D | psa_its_file.c | 76 uint8_t flags[sizeof( psa_storage_create_flags_t )]; member 116 p_info->flags = ( header.flags[0] | in psa_its_read_file() 117 header.flags[1] << 8 | in psa_its_read_file() 118 header.flags[2] << 16 | in psa_its_read_file() 119 header.flags[3] << 24 ); in psa_its_read_file() 195 MBEDTLS_PUT_UINT32_LE( create_flags, header.flags, 0 ); in psa_its_set()
|
A D | padlock.c | 45 static int flags = -1; in mbedtls_padlock_has_support() local 48 if( flags == -1 ) in mbedtls_padlock_has_support() 65 flags = edx; in mbedtls_padlock_has_support() 68 return( flags & feature ); in mbedtls_padlock_has_support()
|
A D | x509_crt.c | 90 uint32_t flags; member 2244 if( flags != 0 ) in mbedtls_x509_crt_verify_info() 2338 int flags = 0; in x509_crt_verifycrl() local 2343 return( flags ); in x509_crt_verifycrl() 2413 return( flags ); in x509_crt_verifycrl() 2818 uint32_t *flags; in x509_crt_verify_chain() local 2839 flags = &cur->flags; in x509_crt_verify_chain() 2854 cur->flags = 0; in x509_crt_verify_chain() 2856 flags = &cur->flags; in x509_crt_verify_chain() 3118 *flags = 0; in x509_crt_verify_restartable_ca_cb() [all …]
|
A D | psa_crypto_core.h | 133 return( slot->attr.flags & mask ); in psa_key_slot_get_flags() 146 slot->attr.flags = ( ( ~mask & slot->attr.flags ) | in psa_key_slot_set_flags() 158 slot->attr.flags |= mask; in psa_key_slot_set_bits_in_flags() 169 slot->attr.flags &= ~mask; in psa_key_slot_clear_bits()
|
A D | entropy_poll.c | 96 static int getrandom_wrapper( void *buf, size_t buflen, unsigned int flags ) in getrandom_wrapper() argument 104 return( syscall( SYS_getrandom, buf, buflen, flags ) ); in getrandom_wrapper() 116 static int getrandom_wrapper( void *buf, size_t buflen, unsigned int flags ) in getrandom_wrapper() argument 118 return getrandom( buf, buflen, flags ); in getrandom_wrapper()
|
A D | psa_crypto_its.h | 51 psa_storage_create_flags_t flags; /**< The flags set when the uid was created **/ member
|
/mbedtls-development/include/mbedtls/ |
A D | x509_crt.h | 301 uint32_t MBEDTLS_PRIVATE(flags); 657 uint32_t flags ); 729 const char *cn, uint32_t *flags, 771 const char *cn, uint32_t *flags, 805 const char *cn, uint32_t *flags, 871 const char *cn, uint32_t *flags,
|
A D | ssl_ciphersuites.h | 381 unsigned char MBEDTLS_PRIVATE(flags);
|
/mbedtls-development/programs/ssl/ |
A D | ssl_test_common_source.c | 291 uint32_t flags ) in x509_crt_verify_info() argument 294 return( mbedtls_x509_crt_verify_info( buf, size, prefix, flags ) ); in x509_crt_verify_info() 302 if( ( flags & err ) != 0 ) \ in x509_crt_verify_info() 306 flags ^= err; \ in x509_crt_verify_info() 312 if( flags != 0 ) in x509_crt_verify_info()
|
A D | ssl_client1.c | 84 uint32_t flags; in main() local 213 if( ( flags = mbedtls_ssl_get_verify_result( &ssl ) ) != 0 ) in main() 222 mbedtls_x509_crt_verify_info( vrfy_buf, sizeof( vrfy_buf ), " ! ", flags ); in main()
|
A D | dtls_client.c | 95 uint32_t flags; in main() local 238 if( ( flags = mbedtls_ssl_get_verify_result( &ssl ) ) != 0 ) in main() 247 mbedtls_x509_crt_verify_info( vrfy_buf, sizeof( vrfy_buf ), " ! ", flags ); in main()
|
A D | ssl_mail_client.c | 175 uint32_t flags; in do_handshake() local 206 if( ( flags = mbedtls_ssl_get_verify_result( ssl ) ) != 0 ) in do_handshake() 215 mbedtls_x509_crt_verify_info( vrfy_buf, sizeof( vrfy_buf ), " ! ", flags ); in do_handshake()
|
A D | ssl_client2.c | 533 int depth, uint32_t *flags ) in my_verify() argument 554 if ( ( *flags ) == 0 ) in my_verify() 558 x509_crt_verify_info( buf, sizeof( buf ), " ! ", *flags ); in my_verify() 711 uint32_t flags; in main() local 2354 if( ( flags = mbedtls_ssl_get_verify_result( &ssl ) ) != 0 ) in main() 2360 " ! ", flags ); in main()
|
/mbedtls-development/programs/x509/ |
A D | cert_app.c | 124 static int my_verify( void *data, mbedtls_x509_crt *crt, int depth, uint32_t *flags ) in my_verify() argument 133 if ( ( *flags ) == 0 ) in my_verify() 137 mbedtls_x509_crt_verify_info( buf, sizeof( buf ), " ! ", *flags ); in my_verify() 157 uint32_t flags; in main() local 344 if( ( ret = mbedtls_x509_crt_verify( &crt, &cacert, &cacrl, NULL, &flags, in main() 351 mbedtls_x509_crt_verify_info( vrfy_buf, sizeof( vrfy_buf ), " ! ", flags ); in main()
|
/mbedtls-development/tests/scripts/ |
A D | generate_psa_tests.py | 395 flags = [] 402 flags.append('TEST_FLAG_EXERCISE') 404 flags.append('TEST_FLAG_READ_ONLY') 405 extra_arguments = [' | '.join(flags) if flags else '0']
|
/mbedtls-development/include/psa/ |
A D | crypto_extra.h | 145 attributes->MBEDTLS_PRIVATE(core).MBEDTLS_PRIVATE(flags) |= MBEDTLS_PSA_KA_FLAG_HAS_SLOT_NUMBER; in psa_set_key_slot_number() 158 … attributes->MBEDTLS_PRIVATE(core).MBEDTLS_PRIVATE(flags) &= ~MBEDTLS_PSA_KA_FLAG_HAS_SLOT_NUMBER; in psa_clear_key_slot_number()
|
/mbedtls-development/programs/fuzz/ |
A D | README.md | 27 Then you need to compile the code with the compiler flags of the wished sanitizer.
|