Lines Matching refs:int

7 int pake_in_driver = 0;
16 static void ecjpake_do_round(psa_algorithm_t alg, unsigned int primitive,
19 int client_input_first,
20 int round)
428 static int sanity_check_rsa_encryption_result(
442 int ok = 0;
508 void sign_hash(int key_type_arg,
509 int alg_arg,
510 int force_status_arg,
514 int fake_output,
515 int expected_status_arg)
580 void verify_hash(int key_type_arg,
581 int key_type_public_arg,
582 int alg_arg,
583 int force_status_arg,
584 int register_public_key,
588 int expected_status_arg)
636 void sign_message(int key_type_arg,
637 int alg_arg,
638 int force_status_arg,
642 int fake_output,
643 int expected_status_arg)
709 void verify_message(int key_type_arg,
710 int key_type_public_arg,
711 int alg_arg,
712 int force_status_arg,
713 int register_public_key,
717 int expected_status_arg)
767 void generate_ec_key(int force_status_arg,
769 int expected_status_arg)
836 void validate_key(int force_status_arg,
837 int location,
838 int owner_id_arg,
839 int id_arg,
840 int key_type_arg,
842 int expected_status_arg)
882 void export_key(int force_status_arg,
884 int key_in_type_arg,
886 int key_out_type_arg,
888 int expected_status_arg)
960 void key_agreement(int alg_arg,
961 int force_status_arg,
962 int our_key_type_arg,
967 int expected_status_arg)
1044 void cipher_encrypt_validation(int alg_arg,
1045 int key_type_arg,
1129 void cipher_encrypt_multipart(int alg_arg,
1130 int key_type_arg,
1134 int first_part_size_arg,
1135 int output1_length_arg,
1136 int output2_length_arg,
1138 int mock_output_arg,
1139 int force_status_arg,
1140 int expected_status_arg)
1258 void cipher_decrypt_multipart(int alg_arg,
1259 int key_type_arg,
1263 int first_part_size_arg,
1264 int output1_length_arg,
1265 int output2_length_arg,
1267 int mock_output_arg,
1268 int force_status_arg,
1269 int expected_status_arg)
1388 void cipher_decrypt(int alg_arg,
1389 int key_type_arg,
1394 int mock_output_arg,
1395 int force_status_arg,
1396 int expected_status_arg)
1461 void cipher_entry_points(int alg_arg, int key_type_arg,
1666 void aead_encrypt(int key_type_arg, data_t *key_data,
1667 int alg_arg,
1672 int forced_status_arg)
1734 void aead_decrypt(int key_type_arg, data_t *key_data,
1735 int alg_arg,
1740 int forced_status_arg)
1797 void mac_sign(int key_type_arg,
1799 int alg_arg,
1802 int forced_status_arg)
1870 void mac_sign_multipart(int key_type_arg,
1872 int alg_arg,
1875 int fragments_count,
1876 int forced_status_arg)
1925 for (int i = 0; i < fragments_count; i++) {
1926 int fragment_size = input->len / fragments_count;
1988 void mac_verify(int key_type_arg,
1990 int alg_arg,
1993 int forced_status_arg)
2042 void mac_verify_multipart(int key_type_arg,
2044 int alg_arg,
2047 int fragments_count,
2048 int forced_status_arg)
2090 for (int i = 0; i < fragments_count; i++) {
2091 int fragment_size = input->len / fragments_count;
2146 void builtin_key_export(int builtin_key_id_arg,
2147 int builtin_key_type_arg,
2148 int builtin_key_bits_arg,
2149 int builtin_key_algorithm_arg,
2151 int expected_status_arg)
2197 void builtin_pubkey_export(int builtin_key_id_arg,
2198 int builtin_key_type_arg,
2199 int builtin_key_bits_arg,
2200 int builtin_key_algorithm_arg,
2202 int expected_status_arg)
2245 void hash_compute(int alg_arg,
2247 int forced_status_arg,
2248 int expected_status_arg)
2282 void hash_multipart_setup(int alg_arg,
2284 int forced_status_arg,
2285 int expected_status_arg)
2331 void hash_multipart_update(int alg_arg,
2333 int forced_status_arg)
2388 void hash_multipart_finish(int alg_arg,
2390 int forced_status_arg)
2442 void hash_clone(int alg_arg,
2444 int forced_status_arg)
2503 void asymmetric_encrypt_decrypt(int alg_arg,
2509 int forced_status_encrypt_arg,
2510 int forced_status_decrypt_arg,
2511 int expected_status_encrypt_arg,
2512 int expected_status_decrypt_arg)
2626 void asymmetric_decrypt(int alg_arg,
2632 int forced_status_decrypt_arg,
2633 int expected_status_decrypt_arg)
2695 void asymmetric_encrypt(int alg_arg,
2702 int forced_status_encrypt_arg,
2703 int expected_status_encrypt_arg)
2787 void aead_encrypt_setup(int key_type_arg, data_t *key_data,
2788 int alg_arg,
2794 int forced_status_arg,
2795 int expected_status_arg)
2904 void aead_decrypt_setup(int key_type_arg, data_t *key_data,
2905 int alg_arg,
2911 int forced_status_arg,
2912 int expected_status_arg)
3005 void pake_operations(data_t *pw_data, int forced_status_setup_arg, int forced_status_arg,
3006 data_t *forced_output, int expected_status_arg,
3007 int fut)
3028 int in_driver = (forced_status_setup_arg == PSA_SUCCESS);
3198 void ecjpake_rounds(int alg_arg, int primitive_arg, int hash_arg,
3199 int derive_alg_arg, data_t *pw_data,
3200 int client_input_first, int in_driver)