/Zephyr-latest/tests/subsys/secure_storage/psa/crypto/src/ |
D | main.c | 30 zassert_equal(psa_generate_random(data, size), PSA_SUCCESS); in fill_data() 48 zassert_equal(ret, PSA_SUCCESS); in ZTEST() 50 zassert_equal(ret, PSA_SUCCESS); in ZTEST() 54 zassert_equal(ret, PSA_SUCCESS); in ZTEST() 57 zassert_equal(ret, PSA_SUCCESS); in ZTEST() 60 zassert_equal(ret, PSA_SUCCESS); in ZTEST() 64 zassert_equal(ret, PSA_SUCCESS); in ZTEST() 69 zassert_equal(ret, PSA_SUCCESS); in ZTEST() 73 zassert_equal(ret, PSA_SUCCESS); in ZTEST() 78 zassert_equal(ret, PSA_SUCCESS); in ZTEST() [all …]
|
/Zephyr-latest/subsys/bluetooth/host/ |
D | crypto_psa.c | 32 if (psa_crypto_init() != PSA_SUCCESS) { in prng_init() 42 if (psa_generate_random(buf, len) == PSA_SUCCESS) { in bt_rand() 82 if (psa_import_key(&attr, tmp, 16, &key_id) != PSA_SUCCESS) { in bt_encrypt_le() 91 if (status != PSA_SUCCESS) { in bt_encrypt_le() 96 if (destroy_status != PSA_SUCCESS) { in bt_encrypt_le() 100 if ((status != PSA_SUCCESS) || (destroy_status != PSA_SUCCESS)) { in bt_encrypt_le() 130 if (psa_import_key(&attr, key, 16, &key_id) != PSA_SUCCESS) { in bt_encrypt_be() 137 if (status != PSA_SUCCESS) { in bt_encrypt_be() 142 if (destroy_status != PSA_SUCCESS) { in bt_encrypt_be() 146 if ((status != PSA_SUCCESS) || (destroy_status != PSA_SUCCESS)) { in bt_encrypt_be()
|
/Zephyr-latest/samples/tfm_integration/psa_crypto/src/ |
D | psa_crypto.c | 63 if (status != PSA_SUCCESS) { in crp_get_pub_key() 72 if (status != PSA_SUCCESS) { in crp_get_pub_key() 84 if (status != PSA_SUCCESS) { in crp_get_pub_key() 114 psa_status_t status = PSA_SUCCESS; in crp_imp_key_secp256r1() 139 if (status != PSA_SUCCESS) { in crp_imp_key_secp256r1() 148 if (status != PSA_SUCCESS) { in crp_imp_key_secp256r1() 162 if (status != PSA_SUCCESS) { in crp_imp_key_secp256r1() 172 if (status != PSA_SUCCESS) { in crp_imp_key_secp256r1() 199 if (status != PSA_SUCCESS) { in crp_imp_key_secp256r1() 226 psa_status_t status = PSA_SUCCESS; in crp_gen_key_secp256r1() [all …]
|
D | psa_attestation.c | 20 psa_status_t err = PSA_SUCCESS; in att_get_pub_key() 31 psa_status_t err = PSA_SUCCESS; in att_get_iat() 97 psa_status_t err = PSA_SUCCESS; in att_test()
|
D | util_app_log.c | 18 case PSA_SUCCESS: in al_psa_status() 98 if (status != PSA_SUCCESS) { in al_psa_status()
|
/Zephyr-latest/subsys/secure_storage/src/its/ |
D | implementation.c | 28 if (ret != PSA_SUCCESS) { in get_stored_data() 34 return PSA_SUCCESS; in get_stored_data() 47 if (ret != PSA_SUCCESS) { in transform_stored_data() 51 return PSA_SUCCESS; in transform_stored_data() 62 if (ret != PSA_SUCCESS) { in get_entry() 79 if (*ret != PSA_SUCCESS) { in keep_stored_entry() 93 *ret = PSA_SUCCESS; in keep_stored_entry() 108 if (ret != PSA_SUCCESS) { in store_entry() 114 if (ret != PSA_SUCCESS) { in store_entry() 153 return PSA_SUCCESS; in secure_storage_its_get() [all …]
|
/Zephyr-latest/tests/subsys/secure_storage/psa/its/src/ |
D | main.c | 38 zassert_equal(ret, PSA_SUCCESS); in ZTEST() 41 zassert_equal(ret, PSA_SUCCESS); in ZTEST() 47 zassert_equal(ret, PSA_SUCCESS); in ZTEST() 52 zassert_equal(ret, PSA_SUCCESS); in ZTEST() 67 zassert_equal(ret, PSA_SUCCESS); in ZTEST() 72 zassert_equal(ret, PSA_SUCCESS); in ZTEST() 81 psa_status_t ret = PSA_SUCCESS; in ZTEST() 85 for (i = 0; ret == PSA_SUCCESS; ++i) { in ZTEST() 99 zassert_equal(ret, PSA_SUCCESS); in ZTEST() 104 zassert_equal(ret, PSA_SUCCESS); in ZTEST() [all …]
|
D | custom_store.c | 48 return PSA_SUCCESS; in secure_storage_its_store_set() 61 return PSA_SUCCESS; in secure_storage_its_store_get() 72 return PSA_SUCCESS; in secure_storage_its_store_remove()
|
D | custom_transform.c | 19 return PSA_SUCCESS; in secure_storage_its_transform_to_store() 32 return PSA_SUCCESS; in secure_storage_its_transform_from_store()
|
/Zephyr-latest/samples/tfm_integration/psa_protected_storage/src/ |
D | main.c | 29 if (status != PSA_SUCCESS) { in main() 38 if (status != PSA_SUCCESS) { in main() 52 if (status != PSA_SUCCESS) { in main() 60 if (status != PSA_SUCCESS) { in main() 70 if (status != PSA_SUCCESS) { in main() 85 if (status != PSA_SUCCESS) { in main()
|
/Zephyr-latest/subsys/bluetooth/mesh/ |
D | crypto_psa.c | 53 if (psa_crypto_init() != PSA_SUCCESS) { in bt_mesh_crypto_init() 72 if (status != PSA_SUCCESS || output_len != 16) { in bt_mesh_encrypt() 95 if (status != PSA_SUCCESS || output_len != len + mic_size) { in bt_mesh_ccm_encrypt() 118 if (status != PSA_SUCCESS || output_len != len) { in bt_mesh_ccm_decrypt() 133 if (status != PSA_SUCCESS) { in bt_mesh_aes_cmac_mesh_key() 139 if (status != PSA_SUCCESS) { in bt_mesh_aes_cmac_mesh_key() 148 if (status != PSA_SUCCESS) { in bt_mesh_aes_cmac_mesh_key() 197 if (status != PSA_SUCCESS) { in bt_mesh_sha256_hmac_raw_key() 205 if (status != PSA_SUCCESS) { in bt_mesh_sha256_hmac_raw_key() 212 if (status != PSA_SUCCESS) { in bt_mesh_sha256_hmac_raw_key() [all …]
|
/Zephyr-latest/samples/psa/persistent_key/src/ |
D | main.c | 29 if (ret != PSA_SUCCESS) { in generate_persistent_key() 37 if (ret != PSA_SUCCESS) { in generate_persistent_key() 61 if (ret != PSA_SUCCESS) { in use_persistent_key() 68 if (ret != PSA_SUCCESS) { in use_persistent_key() 93 if (ret != PSA_SUCCESS) { in destroy_persistent_key()
|
/Zephyr-latest/subsys/bluetooth/crypto/ |
D | bt_crypto_psa.c | 33 if (status != PSA_SUCCESS) { in bt_crypto_aes_cmac() 40 if ((status != PSA_SUCCESS) || (destroy_status != PSA_SUCCESS)) { in bt_crypto_aes_cmac()
|
/Zephyr-latest/modules/openthread/platform/ |
D | crypto_psa.c | 25 case PSA_SUCCESS: in psaToOtError() 217 return status == PSA_SUCCESS; in otPlatCryptoHasKey() 321 psa_status_t status = PSA_SUCCESS; in otPlatCryptoAesEncrypt() 437 if (status != PSA_SUCCESS) { in otPlatCryptoEcdsaGenerateKey() 443 if (status != PSA_SUCCESS) { in otPlatCryptoEcdsaGenerateKey() 470 if (status != PSA_SUCCESS) { in otPlatCryptoEcdsaSign() 477 if (status != PSA_SUCCESS) { in otPlatCryptoEcdsaSign() 509 if (status != PSA_SUCCESS) { in otPlatCryptoEcdsaVerify() 516 if (status != PSA_SUCCESS) { in otPlatCryptoEcdsaVerify() 537 if (status != PSA_SUCCESS) { in otPlatCryptoEcdsaSignUsingKeyRef() [all …]
|
/Zephyr-latest/samples/psa/its/src/ |
D | main.c | 31 if (ret != PSA_SUCCESS) { in write_and_read_data() 47 if (ret != PSA_SUCCESS) { in write_and_read_data() 78 if (ret != PSA_SUCCESS) { in read_info() 101 if (ret != PSA_SUCCESS) { in remove_entry()
|
/Zephyr-latest/tests/crypto/mbedtls_psa/src/ |
D | main.c | 20 zassert_equal(psa_crypto_init(), PSA_SUCCESS, "psa_crypto_init failed"); in ZTEST_USER() 21 zassert_equal(psa_generate_random(tmp, sizeof(tmp)), PSA_SUCCESS, in ZTEST_USER()
|
/Zephyr-latest/subsys/net/lib/wifi_credentials/ |
D | wifi_credentials_backend_psa.c | 32 if (ret == PSA_SUCCESS && length_read == ENTRY_MAX_LEN) { in wifi_credentials_backend_init() 60 } else if (ret != PSA_SUCCESS) { in wifi_credentials_store_entry() 72 if (ret != PSA_SUCCESS) { in wifi_credentials_delete_entry() 87 if (ret != PSA_SUCCESS) { in wifi_credentials_load_entry()
|
/Zephyr-latest/samples/tfm_integration/tfm_secure_partition/dummy_partition/ |
D | dummy_partition.c | 52 if (status != PSA_SUCCESS) { in tfm_dp_secret_digest() 61 return PSA_SUCCESS; in tfm_dp_secret_digest() 100 psa_reply(msg.handle, PSA_SUCCESS); in dp_signal_handle() 107 psa_reply(msg.handle, PSA_SUCCESS); in dp_signal_handle()
|
/Zephyr-latest/subsys/mgmt/updatehub/ |
D | updatehub_integrity.c | 13 #define SUCCESS_VALUE PSA_SUCCESS 58 if (ret != PSA_SUCCESS) { in updatehub_integrity_update() 94 if (ret != PSA_SUCCESS) { in updatehub_integrity_finish()
|
/Zephyr-latest/tests/crypto/secp256r1/src/ |
D | main.c | 67 zassert_equal(status, PSA_SUCCESS, "Unable to generate 1st EC key (%d)", status); in ZTEST_USER() 70 zassert_equal(status, PSA_SUCCESS, "Unable to generate 1st EC key (%d)", status); in ZTEST_USER() 74 zassert_equal(status, PSA_SUCCESS, "Unable to export public key (%d)", status); in ZTEST_USER() 78 zassert_equal(status, PSA_SUCCESS, "Unable to compute shared secret (%d)", status); in ZTEST_USER()
|
/Zephyr-latest/subsys/secure_storage/src/its/store/ |
D | zms.c | 73 psa_ret = PSA_SUCCESS; in secure_storage_its_store_set() 79 LOG_DBG("%s 0x%x with %zu bytes. (%zd)", (psa_ret == PSA_SUCCESS) ? in secure_storage_its_store_set() 98 psa_ret = PSA_SUCCESS; in secure_storage_its_store_get() 120 BUILD_ASSERT(PSA_SUCCESS == 0); in secure_storage_its_store_remove()
|
/Zephyr-latest/tests/bluetooth/host/crypto/bt_encrypt_be/src/ |
D | main.c | 44 psa_import_key_fake.return_val = PSA_SUCCESS; in ZTEST() 45 psa_cipher_encrypt_fake.return_val = PSA_SUCCESS; in ZTEST()
|
/Zephyr-latest/tests/bluetooth/host/crypto/bt_encrypt_le/src/ |
D | main.c | 44 psa_import_key_fake.return_val = PSA_SUCCESS; in ZTEST() 45 psa_cipher_encrypt_fake.return_val = PSA_SUCCESS; in ZTEST()
|
/Zephyr-latest/subsys/net/lib/tls_credentials/ |
D | tls_credentials_trusted.c | 75 } else if (status != PSA_SUCCESS) { in credentials_toc_get() 88 if (status != PSA_SUCCESS) { in credentials_toc_write() 154 } else if (status != PSA_SUCCESS) { in credentials_init() 200 if (status != PSA_SUCCESS) { in credential_get_from_uid() 211 if (status != PSA_SUCCESS) { in credential_get_from_uid() 357 if (status != PSA_SUCCESS) { in tls_credential_add() 397 } else if (status != PSA_SUCCESS) { in tls_credential_get() 408 if (status != PSA_SUCCESS) { in tls_credential_get() 449 } else if (status != PSA_SUCCESS) { in tls_credential_delete()
|
/Zephyr-latest/drivers/entropy/ |
D | entropy_psa_crypto.c | 20 if (status != PSA_SUCCESS) { in entropy_psa_crypto_rng_init() 36 if (status != PSA_SUCCESS) { in entropy_psa_crypto_rng_get_entropy()
|