Home
last modified time | relevance | path

Searched refs:flags (Results 1 – 25 of 49) sorted by relevance

12

/mbedtls-3.5.0/tests/suites/
Dtest_suite_psa_crypto_metadata.function72 /* Check that in the value of flags, the bit flag (which should be a macro
83 #define TEST_CLASSIFICATION_MACRO(cond, flag, alg, flags) \
88 if ((flags) & (flag)) \
119 void algorithm_classification(psa_algorithm_t alg, unsigned flags)
122 TEST_CLASSIFICATION_MACRO(1, ALG_IS_VENDOR_DEFINED, alg, flags);
123 TEST_CLASSIFICATION_MACRO(1, ALG_IS_HMAC, alg, flags);
124 TEST_CLASSIFICATION_MACRO(1, ALG_IS_BLOCK_CIPHER_MAC, alg, flags);
125 TEST_CLASSIFICATION_MACRO(1, ALG_IS_STREAM_CIPHER, alg, flags);
126 TEST_CLASSIFICATION_MACRO(1, ALG_IS_RSA_PKCS1V15_SIGN, alg, flags);
127 TEST_CLASSIFICATION_MACRO(1, ALG_IS_RSA_PSS, alg, flags);
[all …]
Dtest_suite_x509parse.function64 int verify_none(void *data, mbedtls_x509_crt *crt, int certificate_depth, uint32_t *flags)
69 *flags |= MBEDTLS_X509_BADCERT_OTHER;
74 int verify_all(void *data, mbedtls_x509_crt *crt, int certificate_depth, uint32_t *flags)
79 *flags = 0;
145 int verify_fatal(void *data, mbedtls_x509_crt *crt, int certificate_depth, uint32_t *flags)
154 *flags |= (1 << certificate_depth);
202 int verify_print(void *data, mbedtls_x509_crt *crt, int certificate_depth, uint32_t *flags)
208 ((void) flags);
222 ret = mbedtls_snprintf(p, n, " - flags 0x%08x\n", *flags);
555 void x509_verify_info(int flags, char *prefix, char *result_str)
[all …]
Dtest_suite_psa_its.function90 uint32_t flags = flags_arg;
97 PSA_ASSERT(psa_its_set_wrap(uid, data->len, data->x, flags));
101 TEST_ASSERT(info.flags == flags);
130 TEST_ASSERT(info.flags == flags1);
137 TEST_ASSERT(info.flags == flags2);
Dtest_suite_psa_crypto_storage_format.function233 int flags)
270 if ((flags & TEST_FLAG_EXERCISE) && can_exercise(&actual_attributes)) {
278 if (flags & TEST_FLAG_READ_ONLY) {
354 data_t *representation, int flags)
384 uid, representation, flags));
Dtest_suite_x509parse.data1012 …larSSL, CN=Polarssl Test EC CA - flags 0x00000000\ndepth 0 - serial 09 - subject C=NL, O=PolarSSL,…
1016 …:AD\:83\:7D\:A8\:94\:B2 - subject CN=selfsigned, OU=testing, O=PolarSSL, C=NL - flags 0x00000000\n"
1020 …61\:05\:E3\:A3\:CD\:78 - subject C=UK, O=mbed TLS, OU=testsuite, CN=localhost - flags 0x00000001\n"
1024 …arSSL, CN=PolarSSL Test CA - flags 0x00000000\ndepth 0 - serial 01 - subject C=NL, O=PolarSSL, CN=…
1028 …larSSL, CN=Polarssl Test EC CA - flags 0x00000000\ndepth 0 - serial 1E - subject C=NL, O=PolarSSL,…
1032 …larSSL, CN=Polarssl Test EC CA - flags 0x00000001\ndepth 0 - serial 09 - subject C=NL, O=PolarSSL,…
1036 …arSSL, CN=PolarSSL Test CA - flags 0x00000000\ndepth 0 - serial 01 - subject C=NL, O=PolarSSL, CN=…
1040 …arSSL, CN=PolarSSL Test CA - flags 0x00000000\ndepth 0 - serial 01 - subject C=NL, O=PolarSSL, CN=…
1044 …arSSL, CN=PolarSSL Test CA - flags 0x00000000\ndepth 0 - serial 01 - subject C=NL, O=PolarSSL, CN=…
1048flags 0x00000000\ndepth 1 - serial 0E - subject C=NL, O=PolarSSL, CN=PolarSSL Test Intermediate CA…
[all …]
Dtest_suite_psa_crypto_generate_key.function21 // key lifetime, usage flags, algorithm are irrelevant for this test
Dtest_suite_psa_its.data10 Set/get/remove with flags
/mbedtls-3.5.0/library/
Dx509_crt.c86 uint32_t flags; member
389 ver_chain->items[i].flags = (uint32_t) -1; in x509_crt_verify_chain_reset()
1763 uint32_t flags) in mbedtls_x509_crt_verify_info() argument
1771 if ((flags & cur->code) == 0) { in mbedtls_x509_crt_verify_info()
1777 flags ^= cur->code; in mbedtls_x509_crt_verify_info()
1780 if (flags != 0) { in mbedtls_x509_crt_verify_info()
1874 int flags = 0; in x509_crt_verifycrl() local
1884 return flags; in x509_crt_verifycrl()
1899 flags |= MBEDTLS_X509_BADCRL_NOT_TRUSTED; in x509_crt_verifycrl()
1907 flags |= MBEDTLS_X509_BADCRL_BAD_MD; in x509_crt_verifycrl()
[all …]
Dpsa_its_file.c71 uint8_t flags[sizeof(psa_storage_create_flags_t)]; member
117 p_info->flags = (header.flags[0] | in psa_its_read_file()
118 header.flags[1] << 8 | in psa_its_read_file()
119 header.flags[2] << 16 | in psa_its_read_file()
120 header.flags[3] << 24); in psa_its_read_file()
209 MBEDTLS_PUT_UINT32_LE(create_flags, header.flags, 0); in psa_its_set()
Dssl_debug_helpers.h61 unsigned int flags);
74 #define MBEDTLS_SSL_PRINT_TICKET_FLAGS(level, flags) \ argument
75 mbedtls_ssl_print_ticket_flags(ssl, level, __FILE__, __LINE__, flags)
85 #define MBEDTLS_SSL_PRINT_TICKET_FLAGS(level, flags) argument
Dpadlock.c41 static int flags = -1; in mbedtls_padlock_has_support() local
44 if (flags == -1) { in mbedtls_padlock_has_support()
60 flags = edx; in mbedtls_padlock_has_support()
63 return flags & feature; in mbedtls_padlock_has_support()
Dentropy_poll.c93 static int getrandom_wrapper(void *buf, size_t buflen, unsigned int flags) in getrandom_wrapper() argument
101 return syscall(SYS_getrandom, buf, buflen, flags); in getrandom_wrapper()
113 static int getrandom_wrapper(void *buf, size_t buflen, unsigned int flags) in getrandom_wrapper() argument
115 return getrandom(buf, buflen, flags); in getrandom_wrapper()
Dpsa_crypto_core.h144 return slot->attr.flags & mask; in psa_key_slot_get_flags()
157 slot->attr.flags = ((~mask & slot->attr.flags) | in psa_key_slot_set_flags()
169 slot->attr.flags |= mask; in psa_key_slot_set_bits_in_flags()
180 slot->attr.flags &= ~mask; in psa_key_slot_clear_bits()
Dpsa_crypto_its.h50 psa_storage_create_flags_t flags; /**< The flags set when the uid was created **/ member
Dssl_misc.h1672 uint32_t *flags);
2746 mbedtls_ssl_session *session, unsigned int flags) in mbedtls_ssl_session_get_ticket_flags() argument
2749 (flags & MBEDTLS_SSL_TLS1_3_TICKET_FLAGS_MASK); in mbedtls_ssl_session_get_ticket_flags()
2753 mbedtls_ssl_session *session, unsigned int flags) in mbedtls_ssl_session_set_ticket_flags() argument
2755 session->ticket_flags |= (flags & MBEDTLS_SSL_TLS1_3_TICKET_FLAGS_MASK); in mbedtls_ssl_session_set_ticket_flags()
2759 mbedtls_ssl_session *session, unsigned int flags) in mbedtls_ssl_session_clear_ticket_flags() argument
2761 session->ticket_flags &= ~(flags & MBEDTLS_SSL_TLS1_3_TICKET_FLAGS_MASK); in mbedtls_ssl_session_clear_ticket_flags()
/mbedtls-3.5.0/scripts/mbedtls_dev/
Dcrypto_knowledge.py551 flags = []
553 flags = ['SIGN_HASH', 'SIGN_MESSAGE',
557 flags = ['DECRYPT', 'ENCRYPT']
559 flags = ['VERIFY_HASH', 'VERIFY_MESSAGE']
561 flags += ['SIGN_HASH', 'SIGN_MESSAGE']
563 flags = ['ENCRYPT']
565 flags += ['DECRYPT']
568 flags = ['DERIVE']
571 return ['PSA_KEY_USAGE_' + flag for flag in flags]
/mbedtls-3.5.0/include/mbedtls/
Dx509_crt.h248 uint32_t MBEDTLS_PRIVATE(flags);
592 uint32_t flags);
664 const char *cn, uint32_t *flags,
706 const char *cn, uint32_t *flags,
740 const char *cn, uint32_t *flags,
806 const char *cn, uint32_t *flags,
Dcipher.h302 int MBEDTLS_PRIVATE(flags);
563 return info->MBEDTLS_PRIVATE(flags) & MBEDTLS_CIPHER_VARIABLE_KEY_LEN; in mbedtls_cipher_info_has_variable_key_bitlen()
582 return info->MBEDTLS_PRIVATE(flags) & MBEDTLS_CIPHER_VARIABLE_IV_LEN; in mbedtls_cipher_info_has_variable_iv_size()
/mbedtls-3.5.0/programs/x509/
Dcert_app.c111 static int my_verify(void *data, mbedtls_x509_crt *crt, int depth, uint32_t *flags) in my_verify() argument
120 if ((*flags) == 0) { in my_verify()
123 mbedtls_x509_crt_verify_info(buf, sizeof(buf), " ! ", *flags); in my_verify()
143 uint32_t flags; in main() local
319 if ((ret = mbedtls_x509_crt_verify(&crt, &cacert, &cacrl, NULL, &flags, in main()
325 mbedtls_x509_crt_verify_info(vrfy_buf, sizeof(vrfy_buf), " ! ", flags); in main()
/mbedtls-3.5.0/programs/ssl/
Dssl_test_common_source.c335 uint32_t flags) in x509_crt_verify_info() argument
338 return mbedtls_x509_crt_verify_info(buf, size, prefix, flags); in x509_crt_verify_info()
346 if ((flags & err) != 0) \ in x509_crt_verify_info()
350 flags ^= err; \ in x509_crt_verify_info()
356 if (flags != 0) { in x509_crt_verify_info()
Dssl_client1.c72 uint32_t flags; in main() local
195 if ((flags = mbedtls_ssl_get_verify_result(&ssl)) != 0) { in main()
203 mbedtls_x509_crt_verify_info(vrfy_buf, sizeof(vrfy_buf), " ! ", flags); in main()
Ddtls_client.c85 uint32_t flags; in main() local
224 if ((flags = mbedtls_ssl_get_verify_result(&ssl)) != 0) { in main()
232 mbedtls_x509_crt_verify_info(vrfy_buf, sizeof(vrfy_buf), " ! ", flags); in main()
Dssl_mail_client.c164 uint32_t flags; in do_handshake() local
193 if ((flags = mbedtls_ssl_get_verify_result(ssl)) != 0) { in do_handshake()
201 mbedtls_x509_crt_verify_info(vrfy_buf, sizeof(vrfy_buf), " ! ", flags); in do_handshake()
/mbedtls-3.5.0/tests/scripts/
Dgenerate_psa_tests.py582 flags = []
584 flags.append('TEST_FLAG_EXERCISE')
586 flags.append('TEST_FLAG_READ_ONLY')
587 extra_arguments = [' | '.join(flags) if flags else '0']
/mbedtls-3.5.0/include/psa/
Dcrypto_extra.h146 attributes->MBEDTLS_PRIVATE(core).MBEDTLS_PRIVATE(flags) |= MBEDTLS_PSA_KA_FLAG_HAS_SLOT_NUMBER; in psa_set_key_slot_number()
159 attributes->MBEDTLS_PRIVATE(core).MBEDTLS_PRIVATE(flags) &= in psa_clear_key_slot_number()

12