| /mbedtls/tests/suites/ |
| A D | test_suite_psa_crypto_metadata.function | 83 #define TEST_CLASSIFICATION_MACRO(cond, flag, alg, flags) \ 88 if ((flags) & (flag)) \ 123 TEST_CLASSIFICATION_MACRO(1, ALG_IS_HMAC, alg, flags); 127 TEST_CLASSIFICATION_MACRO(1, ALG_IS_RSA_PSS, alg, flags); 130 TEST_CLASSIFICATION_MACRO(1, ALG_IS_DSA, alg, flags); 135 TEST_CLASSIFICATION_MACRO(1, ALG_IS_ECDSA, alg, flags); 143 TEST_CLASSIFICATION_MACRO(1, ALG_IS_RSA_OAEP, alg, flags); 144 TEST_CLASSIFICATION_MACRO(1, ALG_IS_HKDF, alg, flags); 148 TEST_CLASSIFICATION_MACRO(1, ALG_IS_ECDH, alg, flags); 149 TEST_CLASSIFICATION_MACRO(1, ALG_IS_FFDH, alg, flags); [all …]
|
| A D | test_suite_x509parse.function | 68 *flags |= MBEDTLS_X509_BADCERT_OTHER; 78 *flags = 0; 207 ((void) flags); 221 ret = mbedtls_snprintf(p, n, " - flags 0x%08x\n", *flags); 648 uint32_t flags = 0; 705 uint32_t flags = 0; 764 flags = 0; 794 uint32_t flags = 0; 827 uint32_t flags = 0; 1411 uint32_t flags; [all …]
|
| A D | test_suite_psa_its.function | 90 uint32_t flags = flags_arg; 97 PSA_ASSERT(psa_its_set_wrap(uid, data->len, data->x, flags)); 101 TEST_ASSERT(info.flags == flags); 130 TEST_ASSERT(info.flags == flags1); 137 TEST_ASSERT(info.flags == flags2);
|
| A D | test_suite_psa_crypto_storage_format.function | 149 int flags) 186 if ((flags & TEST_FLAG_EXERCISE) && can_exercise(&actual_attributes)) { 194 if (flags & TEST_FLAG_READ_ONLY) { 270 data_t *representation, int flags) 300 uid, representation, flags));
|
| A D | test_suite_x509parse.data | 1199 …arSSL, CN=PolarSSL Test CA - flags 0x00000000\ndepth 0 - serial 01 - subject C=NL, O=PolarSSL, CN=… 1211 …arSSL, CN=PolarSSL Test CA - flags 0x00000000\ndepth 0 - serial 01 - subject C=NL, O=PolarSSL, CN=… 1215 …arSSL, CN=PolarSSL Test CA - flags 0x00000000\ndepth 0 - serial 01 - subject C=NL, O=PolarSSL, CN=… 1219 …arSSL, CN=PolarSSL Test CA - flags 0x00000000\ndepth 0 - serial 01 - subject C=NL, O=PolarSSL, CN=… 1223 …flags 0x00000000\ndepth 1 - serial 0E - subject C=NL, O=PolarSSL, CN=PolarSSL Test Intermediate CA… 1227 …flags 0x00000000\ndepth 1 - serial 0E - subject C=NL, O=PolarSSL, CN=PolarSSL Test Intermediate CA… 1243 …flags 0x00000001\ndepth 1 - serial 0E - subject C=NL, O=PolarSSL, CN=PolarSSL Test Intermediate CA… 1247 …flags 0x00000000\ndepth 2 - serial 0F - subject C=NL, O=PolarSSL, CN=PolarSSL Test Intermediate EC… 1251 …flags 0x00000000\ndepth 2 - serial 0F - subject C=NL, O=PolarSSL, CN=PolarSSL Test Intermediate EC… 1255 …flags 0x00000000\ndepth 1 - serial 4D - subject C=UK, O=mbed TLS, CN=mbed TLS Test intermediate CA… [all …]
|
| A D | test_suite_psa_crypto_generate_key.function | 21 // key lifetime, usage flags, algorithm are irrelevant for this test
|
| A D | test_suite_psa_its.data | 10 Set/get/remove with flags
|
| /mbedtls/library/ |
| A D | x509_crt.c | 77 uint32_t flags; member 1918 if (flags != 0) { in mbedtls_x509_crt_verify_info() 2013 int flags = 0; in x509_crt_verifycrl() local 2023 return flags; in x509_crt_verifycrl() 2115 return flags; in x509_crt_verifycrl() 2517 uint32_t *flags; in x509_crt_verify_chain() local 2544 flags = &cur->flags; in x509_crt_verify_chain() 2561 flags = &cur->flags; in x509_crt_verify_chain() 3010 uint32_t *flags, in x509_crt_merge_flags_with_cb() argument 3072 *flags = 0; in x509_crt_verify_restartable_ca_cb() [all …]
|
| A D | ssl_debug_helpers.h | 54 unsigned int flags); 67 #define MBEDTLS_SSL_PRINT_TICKET_FLAGS(level, flags) \ argument 68 mbedtls_ssl_print_ticket_flags(ssl, level, __FILE__, __LINE__, flags) 78 #define MBEDTLS_SSL_PRINT_TICKET_FLAGS(level, flags) argument
|
| A D | padlock.c | 29 static int flags = -1; in mbedtls_padlock_has_support() local 32 if (flags == -1) { in mbedtls_padlock_has_support() 48 flags = edx; in mbedtls_padlock_has_support() 51 return flags & feature; in mbedtls_padlock_has_support()
|
| A D | entropy_poll.c | 83 static int getrandom_wrapper(void *buf, size_t buflen, unsigned int flags) in getrandom_wrapper() argument 91 return (int) syscall(SYS_getrandom, buf, buflen, flags); in getrandom_wrapper() 103 static int getrandom_wrapper(void *buf, size_t buflen, unsigned int flags) in getrandom_wrapper() argument 105 return (int) getrandom(buf, buflen, flags); in getrandom_wrapper()
|
| A D | psa_its_file.c | 59 uint8_t flags[sizeof(psa_storage_create_flags_t)]; member 102 p_info->flags = MBEDTLS_GET_UINT32_LE(header.flags, 0); in psa_its_read_file() 192 MBEDTLS_PUT_UINT32_LE(create_flags, header.flags, 0); in psa_its_set()
|
| A D | pk_ecc.c | 52 psa_key_usage_t flags; in mbedtls_pk_ecc_set_key() local 61 flags = PSA_KEY_USAGE_EXPORT; in mbedtls_pk_ecc_set_key() 65 flags = PSA_KEY_USAGE_SIGN_HASH | PSA_KEY_USAGE_SIGN_MESSAGE | in mbedtls_pk_ecc_set_key() 68 psa_set_key_usage_flags(&attributes, flags); in mbedtls_pk_ecc_set_key()
|
| A D | ssl_misc.h | 1689 uint32_t *flags); 2867 mbedtls_ssl_session *session, unsigned int flags) in mbedtls_ssl_tls13_session_get_ticket_flags() argument 2870 (flags & MBEDTLS_SSL_TLS1_3_TICKET_FLAGS_MASK); in mbedtls_ssl_tls13_session_get_ticket_flags() 2880 mbedtls_ssl_session *session, unsigned int flags) in mbedtls_ssl_tls13_session_ticket_has_flags() argument 2882 return mbedtls_ssl_tls13_session_get_ticket_flags(session, flags) != 0; in mbedtls_ssl_tls13_session_ticket_has_flags() 2907 mbedtls_ssl_session *session, unsigned int flags) in mbedtls_ssl_tls13_session_set_ticket_flags() argument 2909 session->ticket_flags |= (flags & MBEDTLS_SSL_TLS1_3_TICKET_FLAGS_MASK); in mbedtls_ssl_tls13_session_set_ticket_flags() 2913 mbedtls_ssl_session *session, unsigned int flags) in mbedtls_ssl_tls13_session_clear_ticket_flags() argument 2915 session->ticket_flags &= ~(flags & MBEDTLS_SSL_TLS1_3_TICKET_FLAGS_MASK); in mbedtls_ssl_tls13_session_clear_ticket_flags()
|
| A D | psa_crypto_its.h | 38 psa_storage_create_flags_t flags; /**< The flags set when the uid was created **/ member
|
| A D | ssl_client.c | 220 int flags, in ssl_write_supported_groups_ext() argument 252 if (flags & SSL_WRITE_SUPPORTED_GROUPS_EXT_TLS1_3_FLAG) { in ssl_write_supported_groups_ext() 269 if ((flags & SSL_WRITE_SUPPORTED_GROUPS_EXT_TLS1_2_FLAG) && in ssl_write_supported_groups_ext()
|
| /mbedtls/scripts/mbedtls_dev/ |
| A D | crypto_knowledge.py | 548 flags = [] 550 flags = ['SIGN_HASH', 'SIGN_MESSAGE', 554 flags = ['DECRYPT', 'ENCRYPT'] 556 flags = ['VERIFY_HASH', 'VERIFY_MESSAGE'] 558 flags += ['SIGN_HASH', 'SIGN_MESSAGE'] 560 flags = ['ENCRYPT'] 562 flags += ['DECRYPT'] 565 flags = ['DERIVE'] 568 return ['PSA_KEY_USAGE_' + flag for flag in flags]
|
| /mbedtls/programs/x509/ |
| A D | cert_app.c | 99 static int my_verify(void *data, mbedtls_x509_crt *crt, int depth, uint32_t *flags) in my_verify() argument 108 if ((*flags) == 0) { in my_verify() 111 mbedtls_x509_crt_verify_info(buf, sizeof(buf), " ! ", *flags); in my_verify() 131 uint32_t flags; in main() local 317 if ((ret = mbedtls_x509_crt_verify(&crt, &cacert, &cacrl, NULL, &flags, in main() 323 mbedtls_x509_crt_verify_info(vrfy_buf, sizeof(vrfy_buf), " ! ", flags); in main()
|
| /mbedtls/include/mbedtls/ |
| A D | x509_crt.h | 252 uint32_t MBEDTLS_PRIVATE(flags); 597 uint32_t flags); 673 const char *cn, uint32_t *flags, 715 const char *cn, uint32_t *flags, 749 const char *cn, uint32_t *flags, 815 const char *cn, uint32_t *flags,
|
| A D | cipher.h | 302 unsigned int MBEDTLS_PRIVATE(flags) : 2; 564 return info->MBEDTLS_PRIVATE(flags) & MBEDTLS_CIPHER_VARIABLE_KEY_LEN; in mbedtls_cipher_info_has_variable_key_bitlen() 583 return info->MBEDTLS_PRIVATE(flags) & MBEDTLS_CIPHER_VARIABLE_IV_LEN; in mbedtls_cipher_info_has_variable_iv_size()
|
| /mbedtls/programs/ssl/ |
| A D | ssl_test_common_source.c | 323 uint32_t flags) in x509_crt_verify_info() argument 326 return mbedtls_x509_crt_verify_info(buf, size, prefix, flags); in x509_crt_verify_info() 334 if ((flags & err) != 0) \ in x509_crt_verify_info() 338 flags ^= err; \ in x509_crt_verify_info() 344 if (flags != 0) { in x509_crt_verify_info()
|
| A D | ssl_client1.c | 60 uint32_t flags; in main() local 193 if ((flags = mbedtls_ssl_get_verify_result(&ssl)) != 0) { in main() 201 mbedtls_x509_crt_verify_info(vrfy_buf, sizeof(vrfy_buf), " ! ", flags); in main()
|
| A D | dtls_client.c | 73 uint32_t flags; in main() local 222 if ((flags = mbedtls_ssl_get_verify_result(&ssl)) != 0) { in main() 230 mbedtls_x509_crt_verify_info(vrfy_buf, sizeof(vrfy_buf), " ! ", flags); in main()
|
| A D | ssl_mail_client.c | 152 uint32_t flags; in do_handshake() local 181 if ((flags = mbedtls_ssl_get_verify_result(ssl)) != 0) { in do_handshake() 189 mbedtls_x509_crt_verify_info(vrfy_buf, sizeof(vrfy_buf), " ! ", flags); in do_handshake()
|
| /mbedtls/tests/scripts/ |
| A D | generate_psa_tests.py | 506 flags = [] 508 flags.append('TEST_FLAG_EXERCISE') 510 flags.append('TEST_FLAG_READ_ONLY') 511 extra_arguments = [' | '.join(flags) if flags else '0']
|