Home
last modified time | relevance | path

Searched refs:PSA_SUCCESS (Results 1 – 25 of 47) sorted by relevance

12

/Zephyr-latest/tests/subsys/secure_storage/psa/crypto/src/
Dmain.c30 zassert_equal(psa_generate_random(data, size), PSA_SUCCESS); in fill_data()
48 zassert_equal(ret, PSA_SUCCESS); in ZTEST()
50 zassert_equal(ret, PSA_SUCCESS); in ZTEST()
54 zassert_equal(ret, PSA_SUCCESS); in ZTEST()
57 zassert_equal(ret, PSA_SUCCESS); in ZTEST()
60 zassert_equal(ret, PSA_SUCCESS); in ZTEST()
64 zassert_equal(ret, PSA_SUCCESS); in ZTEST()
69 zassert_equal(ret, PSA_SUCCESS); in ZTEST()
73 zassert_equal(ret, PSA_SUCCESS); in ZTEST()
78 zassert_equal(ret, PSA_SUCCESS); in ZTEST()
[all …]
/Zephyr-latest/subsys/bluetooth/host/
Dcrypto_psa.c32 if (psa_crypto_init() != PSA_SUCCESS) { in prng_init()
42 if (psa_generate_random(buf, len) == PSA_SUCCESS) { in bt_rand()
82 if (psa_import_key(&attr, tmp, 16, &key_id) != PSA_SUCCESS) { in bt_encrypt_le()
91 if (status != PSA_SUCCESS) { in bt_encrypt_le()
96 if (destroy_status != PSA_SUCCESS) { in bt_encrypt_le()
100 if ((status != PSA_SUCCESS) || (destroy_status != PSA_SUCCESS)) { in bt_encrypt_le()
130 if (psa_import_key(&attr, key, 16, &key_id) != PSA_SUCCESS) { in bt_encrypt_be()
137 if (status != PSA_SUCCESS) { in bt_encrypt_be()
142 if (destroy_status != PSA_SUCCESS) { in bt_encrypt_be()
146 if ((status != PSA_SUCCESS) || (destroy_status != PSA_SUCCESS)) { in bt_encrypt_be()
/Zephyr-latest/samples/tfm_integration/psa_crypto/src/
Dpsa_crypto.c63 if (status != PSA_SUCCESS) { in crp_get_pub_key()
72 if (status != PSA_SUCCESS) { in crp_get_pub_key()
84 if (status != PSA_SUCCESS) { in crp_get_pub_key()
114 psa_status_t status = PSA_SUCCESS; in crp_imp_key_secp256r1()
139 if (status != PSA_SUCCESS) { in crp_imp_key_secp256r1()
148 if (status != PSA_SUCCESS) { in crp_imp_key_secp256r1()
162 if (status != PSA_SUCCESS) { in crp_imp_key_secp256r1()
172 if (status != PSA_SUCCESS) { in crp_imp_key_secp256r1()
199 if (status != PSA_SUCCESS) { in crp_imp_key_secp256r1()
226 psa_status_t status = PSA_SUCCESS; in crp_gen_key_secp256r1()
[all …]
Dpsa_attestation.c20 psa_status_t err = PSA_SUCCESS; in att_get_pub_key()
31 psa_status_t err = PSA_SUCCESS; in att_get_iat()
97 psa_status_t err = PSA_SUCCESS; in att_test()
Dutil_app_log.c18 case PSA_SUCCESS: in al_psa_status()
98 if (status != PSA_SUCCESS) { in al_psa_status()
/Zephyr-latest/subsys/secure_storage/src/its/
Dimplementation.c28 if (ret != PSA_SUCCESS) { in get_stored_data()
34 return PSA_SUCCESS; in get_stored_data()
47 if (ret != PSA_SUCCESS) { in transform_stored_data()
51 return PSA_SUCCESS; in transform_stored_data()
62 if (ret != PSA_SUCCESS) { in get_entry()
79 if (*ret != PSA_SUCCESS) { in keep_stored_entry()
93 *ret = PSA_SUCCESS; in keep_stored_entry()
108 if (ret != PSA_SUCCESS) { in store_entry()
114 if (ret != PSA_SUCCESS) { in store_entry()
153 return PSA_SUCCESS; in secure_storage_its_get()
[all …]
/Zephyr-latest/tests/subsys/secure_storage/psa/its/src/
Dmain.c38 zassert_equal(ret, PSA_SUCCESS); in ZTEST()
41 zassert_equal(ret, PSA_SUCCESS); in ZTEST()
47 zassert_equal(ret, PSA_SUCCESS); in ZTEST()
52 zassert_equal(ret, PSA_SUCCESS); in ZTEST()
67 zassert_equal(ret, PSA_SUCCESS); in ZTEST()
72 zassert_equal(ret, PSA_SUCCESS); in ZTEST()
81 psa_status_t ret = PSA_SUCCESS; in ZTEST()
85 for (i = 0; ret == PSA_SUCCESS; ++i) { in ZTEST()
99 zassert_equal(ret, PSA_SUCCESS); in ZTEST()
104 zassert_equal(ret, PSA_SUCCESS); in ZTEST()
[all …]
Dcustom_store.c48 return PSA_SUCCESS; in secure_storage_its_store_set()
61 return PSA_SUCCESS; in secure_storage_its_store_get()
72 return PSA_SUCCESS; in secure_storage_its_store_remove()
Dcustom_transform.c19 return PSA_SUCCESS; in secure_storage_its_transform_to_store()
32 return PSA_SUCCESS; in secure_storage_its_transform_from_store()
/Zephyr-latest/samples/tfm_integration/psa_protected_storage/src/
Dmain.c29 if (status != PSA_SUCCESS) { in main()
38 if (status != PSA_SUCCESS) { in main()
52 if (status != PSA_SUCCESS) { in main()
60 if (status != PSA_SUCCESS) { in main()
70 if (status != PSA_SUCCESS) { in main()
85 if (status != PSA_SUCCESS) { in main()
/Zephyr-latest/subsys/bluetooth/mesh/
Dcrypto_psa.c53 if (psa_crypto_init() != PSA_SUCCESS) { in bt_mesh_crypto_init()
72 if (status != PSA_SUCCESS || output_len != 16) { in bt_mesh_encrypt()
95 if (status != PSA_SUCCESS || output_len != len + mic_size) { in bt_mesh_ccm_encrypt()
118 if (status != PSA_SUCCESS || output_len != len) { in bt_mesh_ccm_decrypt()
133 if (status != PSA_SUCCESS) { in bt_mesh_aes_cmac_mesh_key()
139 if (status != PSA_SUCCESS) { in bt_mesh_aes_cmac_mesh_key()
148 if (status != PSA_SUCCESS) { in bt_mesh_aes_cmac_mesh_key()
197 if (status != PSA_SUCCESS) { in bt_mesh_sha256_hmac_raw_key()
205 if (status != PSA_SUCCESS) { in bt_mesh_sha256_hmac_raw_key()
212 if (status != PSA_SUCCESS) { in bt_mesh_sha256_hmac_raw_key()
[all …]
/Zephyr-latest/samples/psa/persistent_key/src/
Dmain.c29 if (ret != PSA_SUCCESS) { in generate_persistent_key()
37 if (ret != PSA_SUCCESS) { in generate_persistent_key()
61 if (ret != PSA_SUCCESS) { in use_persistent_key()
68 if (ret != PSA_SUCCESS) { in use_persistent_key()
93 if (ret != PSA_SUCCESS) { in destroy_persistent_key()
/Zephyr-latest/subsys/bluetooth/crypto/
Dbt_crypto_psa.c33 if (status != PSA_SUCCESS) { in bt_crypto_aes_cmac()
40 if ((status != PSA_SUCCESS) || (destroy_status != PSA_SUCCESS)) { in bt_crypto_aes_cmac()
/Zephyr-latest/modules/openthread/platform/
Dcrypto_psa.c25 case PSA_SUCCESS: in psaToOtError()
217 return status == PSA_SUCCESS; in otPlatCryptoHasKey()
321 psa_status_t status = PSA_SUCCESS; in otPlatCryptoAesEncrypt()
437 if (status != PSA_SUCCESS) { in otPlatCryptoEcdsaGenerateKey()
443 if (status != PSA_SUCCESS) { in otPlatCryptoEcdsaGenerateKey()
470 if (status != PSA_SUCCESS) { in otPlatCryptoEcdsaSign()
477 if (status != PSA_SUCCESS) { in otPlatCryptoEcdsaSign()
509 if (status != PSA_SUCCESS) { in otPlatCryptoEcdsaVerify()
516 if (status != PSA_SUCCESS) { in otPlatCryptoEcdsaVerify()
537 if (status != PSA_SUCCESS) { in otPlatCryptoEcdsaSignUsingKeyRef()
[all …]
/Zephyr-latest/samples/psa/its/src/
Dmain.c31 if (ret != PSA_SUCCESS) { in write_and_read_data()
47 if (ret != PSA_SUCCESS) { in write_and_read_data()
78 if (ret != PSA_SUCCESS) { in read_info()
101 if (ret != PSA_SUCCESS) { in remove_entry()
/Zephyr-latest/tests/crypto/mbedtls_psa/src/
Dmain.c20 zassert_equal(psa_crypto_init(), PSA_SUCCESS, "psa_crypto_init failed"); in ZTEST_USER()
21 zassert_equal(psa_generate_random(tmp, sizeof(tmp)), PSA_SUCCESS, in ZTEST_USER()
/Zephyr-latest/subsys/net/lib/wifi_credentials/
Dwifi_credentials_backend_psa.c32 if (ret == PSA_SUCCESS && length_read == ENTRY_MAX_LEN) { in wifi_credentials_backend_init()
60 } else if (ret != PSA_SUCCESS) { in wifi_credentials_store_entry()
72 if (ret != PSA_SUCCESS) { in wifi_credentials_delete_entry()
87 if (ret != PSA_SUCCESS) { in wifi_credentials_load_entry()
/Zephyr-latest/samples/tfm_integration/tfm_secure_partition/dummy_partition/
Ddummy_partition.c52 if (status != PSA_SUCCESS) { in tfm_dp_secret_digest()
61 return PSA_SUCCESS; in tfm_dp_secret_digest()
100 psa_reply(msg.handle, PSA_SUCCESS); in dp_signal_handle()
107 psa_reply(msg.handle, PSA_SUCCESS); in dp_signal_handle()
/Zephyr-latest/subsys/mgmt/updatehub/
Dupdatehub_integrity.c13 #define SUCCESS_VALUE PSA_SUCCESS
58 if (ret != PSA_SUCCESS) { in updatehub_integrity_update()
94 if (ret != PSA_SUCCESS) { in updatehub_integrity_finish()
/Zephyr-latest/tests/crypto/secp256r1/src/
Dmain.c67 zassert_equal(status, PSA_SUCCESS, "Unable to generate 1st EC key (%d)", status); in ZTEST_USER()
70 zassert_equal(status, PSA_SUCCESS, "Unable to generate 1st EC key (%d)", status); in ZTEST_USER()
74 zassert_equal(status, PSA_SUCCESS, "Unable to export public key (%d)", status); in ZTEST_USER()
78 zassert_equal(status, PSA_SUCCESS, "Unable to compute shared secret (%d)", status); in ZTEST_USER()
/Zephyr-latest/subsys/secure_storage/src/its/store/
Dzms.c73 psa_ret = PSA_SUCCESS; in secure_storage_its_store_set()
79 LOG_DBG("%s 0x%x with %zu bytes. (%zd)", (psa_ret == PSA_SUCCESS) ? in secure_storage_its_store_set()
98 psa_ret = PSA_SUCCESS; in secure_storage_its_store_get()
120 BUILD_ASSERT(PSA_SUCCESS == 0); in secure_storage_its_store_remove()
/Zephyr-latest/tests/bluetooth/host/crypto/bt_encrypt_be/src/
Dmain.c44 psa_import_key_fake.return_val = PSA_SUCCESS; in ZTEST()
45 psa_cipher_encrypt_fake.return_val = PSA_SUCCESS; in ZTEST()
/Zephyr-latest/tests/bluetooth/host/crypto/bt_encrypt_le/src/
Dmain.c44 psa_import_key_fake.return_val = PSA_SUCCESS; in ZTEST()
45 psa_cipher_encrypt_fake.return_val = PSA_SUCCESS; in ZTEST()
/Zephyr-latest/subsys/net/lib/tls_credentials/
Dtls_credentials_trusted.c75 } else if (status != PSA_SUCCESS) { in credentials_toc_get()
88 if (status != PSA_SUCCESS) { in credentials_toc_write()
154 } else if (status != PSA_SUCCESS) { in credentials_init()
200 if (status != PSA_SUCCESS) { in credential_get_from_uid()
211 if (status != PSA_SUCCESS) { in credential_get_from_uid()
357 if (status != PSA_SUCCESS) { in tls_credential_add()
397 } else if (status != PSA_SUCCESS) { in tls_credential_get()
408 if (status != PSA_SUCCESS) { in tls_credential_get()
449 } else if (status != PSA_SUCCESS) { in tls_credential_delete()
/Zephyr-latest/drivers/entropy/
Dentropy_psa_crypto.c20 if (status != PSA_SUCCESS) { in entropy_psa_crypto_rng_init()
36 if (status != PSA_SUCCESS) { in entropy_psa_crypto_rng_get_entropy()

12