Lines Matching refs:int
190 static int get_predefined_key_data(int is_ec, int group_id_or_keybits,
257 static int pk_setup(mbedtls_pk_context *pk, mbedtls_pk_type_t pk_type, int curve_or_keybits)
263 int ret = MBEDTLS_ERR_PK_BAD_INPUT_DATA;
396 static int pk_public_same(const mbedtls_pk_context *pk1,
399 int ok = 0;
416 int len1 = mbedtls_rsa_write_pubkey(rsa1, buf1, &p1);
420 int len2 = mbedtls_rsa_write_pubkey(rsa2, buf2, &p2);
471 static int mbedtls_rsa_decrypt_func(void *ctx, size_t *olen,
479 static int mbedtls_rsa_sign_func(void *ctx,
480 int (*f_rng)(void *, unsigned char *, size_t), void *p_rng,
481 mbedtls_md_type_t md_alg, unsigned int hashlen,
503 static int pk_setup_for_type(mbedtls_pk_type_t pk_type, int want_pair,
648 void pk_psa_utils(int key_is_rsa)
754 void pk_can_do_ext(int opaque_key, int key_type, int key_usage, int key_alg,
755 int key_alg2, int curve_or_keybits, int alg_check, int usage_check,
756 int result)
971 void pk_utils(int type, int curve_or_keybits, int bitlen, int len, char *name)
980 TEST_ASSERT((int) mbedtls_pk_get_type(&pk) == type);
993 void mbedtls_pk_check_pair(char *pub_file, char *prv_file, int ret)
999 int is_ec_key = 0;
1067 void pk_rsa_verify_test_vec(data_t *message_str, int padding, int digest,
1068 int mod, char *input_N, char *input_E,
1069 data_t *result_str, int expected_result)
1097 int actual_result;
1136 void pk_rsa_verify_ext_test_vec(data_t *message_str, int digest,
1137 int mod, char *input_N,
1139 int pk_type, int mgf1_hash_id,
1140 int salt_len, int sig_len,
1141 int result)
1147 int ret;
1198 void pk_ec_test_vec(int type, int id, data_t *key, data_t *hash,
1199 data_t *sig, int ret)
1233 void pk_sign_verify_restart(int pk_type, int grp_id, char *d_str,
1235 int md_alg, data_t *hash, data_t *sig_check,
1236 int max_ops, int min_restart, int max_restart)
1238 int ret, cnt_restart;
1320 void pk_sign_verify(int type, int curve_or_keybits, int rsa_padding, int rsa_md_alg,
1321 int sign_ret, int verify_ret)
1418 void pk_rsa_encrypt_decrypt_test(data_t *message, int mod, int padding,
1421 int ret)
1498 void pk_rsa_decrypt_test_vec(data_t *cipher, int mod, int padding, int md_alg,
1501 data_t *clear, int ret)
1560 void pk_wrap_rsa_decrypt_test_vec(data_t *cipher, int mod,
1563 int padding_mode,
1564 data_t *clear, int ret)
1634 void pk_ec_nocrypt(int type)
1641 int ret = MBEDTLS_ERR_PK_TYPE_MISMATCH;
1725 int ret = MBEDTLS_ERR_PK_TYPE_MISMATCH;
1808 void pk_psa_sign(int psa_type, int bits, int rsa_padding)
1819 int ret;
1972 void pk_sign_ext(int pk_type, int curve_or_keybits, int key_pk_type, int md_alg)
2008 void pk_psa_wrap_sign_ext(int pk_type, int key_bits, int key_pk_type, int md_alg)
2022 int ret;
2111 void pk_get_psa_attributes(int pk_type, int from_pair,
2112 int usage_arg,
2113 int to_pair, int expected_alg)
2174 void pk_rsa_v21_get_psa_attributes(int md_type, int from_pair,
2175 int usage_arg,
2176 int to_pair, int expected_alg)
2222 void pk_get_psa_attributes_fail(int pk_type, int from_pair,
2223 int usage_arg,
2224 int expected_ret)
2248 void pk_import_into_psa_lifetime(int from_opaque,
2249 int from_persistent, /* when from opaque */
2250 int from_exportable, /* when from opaque */
2251 int to_public,
2252 int to_persistent)
2335 void pk_get_psa_attributes_opaque(int from_type_arg, int from_bits_arg,
2336 int from_usage_arg, int from_alg_arg,
2337 int usage_arg,
2338 int expected_ret,
2339 int to_pair, int expected_usage_arg)
2375 int expected_import_ret = 0;
2399 void pk_import_into_psa_fail(int pk_type, int from_pair,
2400 int type_arg, int bits_arg,
2401 int expected_ret)
2432 void pk_import_into_psa_opaque(int from_type, int from_bits,
2433 int from_usage, int from_alg,
2434 int to_type, int to_bits,
2435 int to_usage, int to_alg,
2436 int expected_ret)
2562 void pk_copy_from_psa_success(data_t *priv_key_data, int key_type_arg,
2563 int key_alg_arg)
2649 void pk_copy_public_from_psa(data_t *priv_key_data, int key_type_arg)