Lines Matching refs:int
35 static int rng_seed = 0xBEEF;
36 static int rng_get( void *p_rng, unsigned char *output, size_t output_len )
51 void log_analyzer( void *ctx, int level,
52 const char *file, int line,
77 int expected_handshake_result;
78 int expected_ciphersuite;
79 int pk_alg;
80 int opaque_alg;
81 int opaque_alg2;
82 int opaque_usage;
84 int dtls;
85 int srv_auth_mode;
86 int serialize;
87 int mfl;
88 int cli_msg_len;
89 int srv_msg_len;
90 int expected_cli_fragments;
91 int expected_srv_fragments;
92 int renegotiate;
93 int legacy_renegotiation;
96 void (*srv_log_fun)(void *, int, const char *, int, const char *);
97 void (*cli_log_fun)(void *, int, const char *, int, const char *);
98 int resize_buffers;
198 int mbedtls_test_buffer_setup( mbedtls_test_buffer *buf, size_t capacity )
228 int mbedtls_test_buffer_put( mbedtls_test_buffer *buf,
289 int mbedtls_test_buffer_get( mbedtls_test_buffer *buf,
334 int pos;
335 int num;
336 int capacity;
348 int mbedtls_test_message_queue_setup( mbedtls_test_message_queue *queue,
381 int mbedtls_test_message_queue_push_info( mbedtls_test_message_queue *queue,
384 int place;
407 int mbedtls_test_message_queue_pop_info( mbedtls_test_message_queue *queue,
439 int mbedtls_test_message_queue_peek_info( mbedtls_test_message_queue *queue,
458 int status;
518 int mbedtls_mock_socket_connect( mbedtls_mock_socket* peer1,
522 int ret = -1;
573 int mbedtls_mock_tcp_send_b( void *ctx, const unsigned char *buf, size_t len )
583 int mbedtls_mock_tcp_recv_b( void *ctx, unsigned char *buf, size_t len )
597 int mbedtls_mock_tcp_send_nb( void *ctx, const unsigned char *buf, size_t len )
612 int mbedtls_mock_tcp_recv_nb( void *ctx, unsigned char *buf, size_t len )
663 int mbedtls_message_socket_setup( mbedtls_test_message_queue* queue_input,
669 int ret = mbedtls_test_message_queue_setup( queue_input, queue_capacity );
706 int mbedtls_mock_tcp_send_msg( void *ctx, const unsigned char *buf, size_t len )
724 if( mbedtls_mock_tcp_send_b( socket, buf, len ) != (int) len )
742 int mbedtls_mock_tcp_recv_msg( void *ctx, unsigned char *buf, size_t buf_len )
749 int ret;
775 if( mbedtls_mock_tcp_recv_b( socket, buf, msg_len ) != (int) msg_len )
781 if( mbedtls_mock_tcp_recv_b( socket, NULL, drop_len ) != (int) drop_len )
859 int mbedtls_endpoint_certificate_init( mbedtls_endpoint *ep, int pk_alg,
860 int opaque_alg, int opaque_alg2,
861 int opaque_usage )
863 int i = 0;
864 int ret = -1;
1006 int mbedtls_endpoint_init( mbedtls_endpoint *ep, int endpoint_type,
1013 int ret = -1;
1140 int mbedtls_move_handshake_to_state( mbedtls_ssl_context *ssl,
1142 int state )
1145 int max_steps = 1000;
1146 int ret = 0;
1186 int mbedtls_ssl_write_fragment( mbedtls_ssl_context *ssl, unsigned char *buf,
1187 int buf_len, int *written,
1188 const int expected_fragments )
1190 int ret = mbedtls_ssl_write( ssl, buf + *written, buf_len - *written );
1230 int mbedtls_ssl_read_fragment( mbedtls_ssl_context *ssl, unsigned char *buf,
1231 int buf_len, int *read,
1232 int *fragments, const int expected_fragments )
1234 int ret = mbedtls_ssl_read( ssl, buf + *read, buf_len - *read );
1283 int* forced_ciphersuite )
1311 int psk_dummy_callback( void *p_info, mbedtls_ssl_context *ssl,
1330 static int psa_cipher_encrypt_helper( mbedtls_ssl_transform *transform,
1372 static int build_transforms( mbedtls_ssl_transform *t_in,
1374 int cipher_type, int hash_id,
1375 int etm, int tag_mode,
1381 int ret = 0;
1740 static int ssl_tls12_populate_session( mbedtls_ssl_session *session,
1741 int ticket_len,
1757 int ret;
1834 static int ssl_tls13_populate_session( mbedtls_ssl_session *session,
1835 int ticket_len,
1836 int endpoint_type )
1899 int mbedtls_exchange_data( mbedtls_ssl_context *ssl_1,
1900 int msg_len_1, const int expected_fragments_1,
1902 int msg_len_2, const int expected_fragments_2 )
1908 int msg_type, ret = -1;
1915 int written_1 = 0;
1916 int written_2 = 0;
1917 int read_1 = 0;
1918 int read_2 = 0;
1919 int fragments_1 = 0;
1920 int fragments_2 = 0;
1929 int i, j = 0;
2025 int exchange_data( mbedtls_ssl_context *ssl_1,
2033 static int check_ssl_version( mbedtls_ssl_protocol_version expected_negotiated_version,
2076 int forced_ciphersuite[2];
2090 int ret = -1;
2092 int expected_handshake_result = options->expected_handshake_result;
2484 int tweak_tls13_certificate_msg_vector_len(
2485 unsigned char *buf, unsigned char **end, int tweak,
2486 int *expected_result, mbedtls_ssl_chk_buf_ptr_args *args )
2667 void test_callback_buffer( int size, int put1, int put1_ret,
2668 int get1, int get1_ret, int put2, int put2_ret,
2669 int get2, int get2_ret )
2673 int put_ret[ROUNDS];
2675 int get_ret[ROUNDS];
2809 void ssl_mock_tcp( int blocking )
2818 int send_ret, recv_ret;
2861 int blocking_ret = send( &client, message , 1 );
2894 int blocking_ret = recv( &server, received, 1 );
2921 void ssl_mock_tcp_interleaving( int blocking )
2932 int send_ret[ROUNDS];
2933 int recv_ret[ROUNDS];
2993 int blocking_ret = send( socket, message[i] , 1 );
3034 int blocking_ret = recv( socket, received[i], 1 );
3181 == (int) message_len );
3183 == (int) buffer_len );
3657 void ssl_dtls_replay( data_t * prevs, data_t * new, int ret )
3702 void ssl_crypt_record( int cipher_type, int hash_id,
3703 int etm, int tag_mode, int ver,
3704 int cid0_len, int cid1_len )
3712 int ret;
3713 int num_records = 16;
3840 void ssl_crypt_record_small( int cipher_type, int hash_id,
3841 int etm, int tag_mode, int ver,
3842 int cid0_len, int cid1_len )
3871 int ret;
3872 int mode; /* Mode 1, 2 or 3 as explained above */
3879 int seen_success; /* Indicates if in the current mode we've
4011 void ssl_decrypt_non_etm_cbc( int cipher_type, int hash_id, int trunc_hmac,
4012 int length_selector )
4045 int exp_ret;
4046 int ret;
4245 void ssl_tls13_hkdf_expand_label( int hash_alg,
4247 int label_idx,
4249 int desired_length,
4257 if( label_idx == (int) tls13_label_ ## name ) \
4287 void ssl_tls13_traffic_key_generation( int hash_alg,
4290 int desired_iv_len,
4291 int desired_key_len,
4338 void ssl_tls13_derive_secret( int hash_alg,
4340 int label_idx,
4342 int desired_length,
4343 int already_hashed,
4351 if( label_idx == (int) tls13_label_ ## name ) \
4382 void ssl_tls13_derive_early_secrets( int hash_alg,
4415 void ssl_tls13_derive_handshake_secrets( int hash_alg,
4448 void ssl_tls13_derive_application_secrets( int hash_alg,
4485 void ssl_tls13_derive_resumption_secrets( int hash_alg,
4514 void ssl_tls13_create_psk_binder( int hash_alg,
4516 int psk_type,
4547 void ssl_tls13_record_protection( int ciphersuite,
4548 int endpoint,
4549 int ctr,
4550 int padding_used,
4564 int other_endpoint;
4647 void ssl_tls13_key_evolution( int hash_alg,
4670 void ssl_tls_prf( int type, data_t * secret, data_t * random,
4671 char *label, data_t *result_str, int exp_ret )
4698 void ssl_serialize_session_save_load( int ticket_len, char *crt_file,
4699 int endpoint_type, int tls_version )
4857 void ssl_serialize_session_load_save( int ticket_len, char *crt_file,
4858 int endpoint_type, int tls_version )
4921 void ssl_serialize_session_save_buf_size( int ticket_len, char *crt_file,
4922 int endpoint_type, int tls_version )
4971 void ssl_serialize_session_load_buf_size( int ticket_len, char *crt_file,
4972 int endpoint_type, int tls_version )
5027 void ssl_session_serialize_version_check( int corrupt_major,
5028 int corrupt_minor,
5029 int corrupt_patch,
5030 int corrupt_config,
5031 int endpoint_type,
5032 int tls_version )
5077 int cur_bit;
5104 void mbedtls_endpoint_sanity( int endpoint_type )
5108 int ret = -1;
5131 void move_handshake_to_state(int endpoint_type, int state, int need_pass)
5135 int ret = -1;
5187 void handshake_version( int dtls, int client_min_version, int client_max_version,
5188 int server_min_version, int server_max_version,
5189 int expected_negotiated_version )
5212 void handshake_psk_cipher( char* cipher, int pk_alg, data_t *psk_str, int dtls )
5233 void handshake_cipher( char* cipher, int pk_alg, int dtls )
5243 void handshake_ciphersuite_select( char* cipher, int pk_alg, data_t *psk_str,
5244 int psa_alg, int psa_alg2, int psa_usage,
5245 int expected_handshake_result,
5246 int expected_ciphersuite )
5270 void app_data( int mfl, int cli_msg_len, int srv_msg_len,
5271 int expected_cli_fragments,
5272 int expected_srv_fragments, int dtls )
5298 void app_data_tls( int mfl, int cli_msg_len, int srv_msg_len,
5299 int expected_cli_fragments,
5300 int expected_srv_fragments )
5310 void app_data_dtls( int mfl, int cli_msg_len, int srv_msg_len,
5311 int expected_cli_fragments,
5312 int expected_srv_fragments )
5338 void handshake_fragmentation( int mfl, int expected_srv_hs_fragmentation, int expected_cli_hs_fragm…
5377 void renegotiation( int legacy_renegotiation )
5396 void resize_buffers( int mfl, int renegotiation, int legacy_renegotiation,
5397 int serialize, int dtls, char *cipher )
5420 void resize_buffers_serialize_mfl( int mfl )
5431 void resize_buffers_renegotiate_mfl( int mfl, int legacy_renegotiation,
5472 void test_multiple_psks_opaque( int mode )
5553 void conf_version( int endpoint, int transport,
5554 int min_tls_version, int max_tls_version,
5555 int expected_ssl_setup_result )
5716 void cookie_parsing( data_t *cookie, int exp_ret )
5762 int cid_enabled;
5836 void raw_key_agreement_fail( int bad_server_ecdhe_key )
5909 int ret = -1;
5913 int step = 0;
5914 int expected_result;