/mbedtls-3.5.0/tests/suites/ |
D | test_suite_psa_crypto_metadata.function | 72 /* Check that in the value of flags, the bit flag (which should be a macro 83 #define TEST_CLASSIFICATION_MACRO(cond, flag, alg, flags) \ 88 if ((flags) & (flag)) \ 119 void algorithm_classification(psa_algorithm_t alg, unsigned flags) 122 TEST_CLASSIFICATION_MACRO(1, ALG_IS_VENDOR_DEFINED, alg, flags); 123 TEST_CLASSIFICATION_MACRO(1, ALG_IS_HMAC, alg, flags); 124 TEST_CLASSIFICATION_MACRO(1, ALG_IS_BLOCK_CIPHER_MAC, alg, flags); 125 TEST_CLASSIFICATION_MACRO(1, ALG_IS_STREAM_CIPHER, alg, flags); 126 TEST_CLASSIFICATION_MACRO(1, ALG_IS_RSA_PKCS1V15_SIGN, alg, flags); 127 TEST_CLASSIFICATION_MACRO(1, ALG_IS_RSA_PSS, alg, flags); [all …]
|
D | test_suite_x509parse.function | 64 int verify_none(void *data, mbedtls_x509_crt *crt, int certificate_depth, uint32_t *flags) 69 *flags |= MBEDTLS_X509_BADCERT_OTHER; 74 int verify_all(void *data, mbedtls_x509_crt *crt, int certificate_depth, uint32_t *flags) 79 *flags = 0; 145 int verify_fatal(void *data, mbedtls_x509_crt *crt, int certificate_depth, uint32_t *flags) 154 *flags |= (1 << certificate_depth); 202 int verify_print(void *data, mbedtls_x509_crt *crt, int certificate_depth, uint32_t *flags) 208 ((void) flags); 222 ret = mbedtls_snprintf(p, n, " - flags 0x%08x\n", *flags); 555 void x509_verify_info(int flags, char *prefix, char *result_str) [all …]
|
D | test_suite_psa_its.function | 90 uint32_t flags = flags_arg; 97 PSA_ASSERT(psa_its_set_wrap(uid, data->len, data->x, flags)); 101 TEST_ASSERT(info.flags == flags); 130 TEST_ASSERT(info.flags == flags1); 137 TEST_ASSERT(info.flags == flags2);
|
D | test_suite_psa_crypto_storage_format.function | 233 int flags) 270 if ((flags & TEST_FLAG_EXERCISE) && can_exercise(&actual_attributes)) { 278 if (flags & TEST_FLAG_READ_ONLY) { 354 data_t *representation, int flags) 384 uid, representation, flags));
|
D | test_suite_x509parse.data | 1012 …larSSL, CN=Polarssl Test EC CA - flags 0x00000000\ndepth 0 - serial 09 - subject C=NL, O=PolarSSL,… 1016 …:AD\:83\:7D\:A8\:94\:B2 - subject CN=selfsigned, OU=testing, O=PolarSSL, C=NL - flags 0x00000000\n" 1020 …61\:05\:E3\:A3\:CD\:78 - subject C=UK, O=mbed TLS, OU=testsuite, CN=localhost - flags 0x00000001\n" 1024 …arSSL, CN=PolarSSL Test CA - flags 0x00000000\ndepth 0 - serial 01 - subject C=NL, O=PolarSSL, CN=… 1028 …larSSL, CN=Polarssl Test EC CA - flags 0x00000000\ndepth 0 - serial 1E - subject C=NL, O=PolarSSL,… 1032 …larSSL, CN=Polarssl Test EC CA - flags 0x00000001\ndepth 0 - serial 09 - subject C=NL, O=PolarSSL,… 1036 …arSSL, CN=PolarSSL Test CA - flags 0x00000000\ndepth 0 - serial 01 - subject C=NL, O=PolarSSL, CN=… 1040 …arSSL, CN=PolarSSL Test CA - flags 0x00000000\ndepth 0 - serial 01 - subject C=NL, O=PolarSSL, CN=… 1044 …arSSL, CN=PolarSSL Test CA - flags 0x00000000\ndepth 0 - serial 01 - subject C=NL, O=PolarSSL, CN=… 1048 …flags 0x00000000\ndepth 1 - serial 0E - subject C=NL, O=PolarSSL, CN=PolarSSL Test Intermediate CA… [all …]
|
D | test_suite_psa_crypto_generate_key.function | 21 // key lifetime, usage flags, algorithm are irrelevant for this test
|
D | test_suite_psa_its.data | 10 Set/get/remove with flags
|
/mbedtls-3.5.0/library/ |
D | x509_crt.c | 86 uint32_t flags; member 389 ver_chain->items[i].flags = (uint32_t) -1; in x509_crt_verify_chain_reset() 1763 uint32_t flags) in mbedtls_x509_crt_verify_info() argument 1771 if ((flags & cur->code) == 0) { in mbedtls_x509_crt_verify_info() 1777 flags ^= cur->code; in mbedtls_x509_crt_verify_info() 1780 if (flags != 0) { in mbedtls_x509_crt_verify_info() 1874 int flags = 0; in x509_crt_verifycrl() local 1884 return flags; in x509_crt_verifycrl() 1899 flags |= MBEDTLS_X509_BADCRL_NOT_TRUSTED; in x509_crt_verifycrl() 1907 flags |= MBEDTLS_X509_BADCRL_BAD_MD; in x509_crt_verifycrl() [all …]
|
D | psa_its_file.c | 71 uint8_t flags[sizeof(psa_storage_create_flags_t)]; member 117 p_info->flags = (header.flags[0] | in psa_its_read_file() 118 header.flags[1] << 8 | in psa_its_read_file() 119 header.flags[2] << 16 | in psa_its_read_file() 120 header.flags[3] << 24); in psa_its_read_file() 209 MBEDTLS_PUT_UINT32_LE(create_flags, header.flags, 0); in psa_its_set()
|
D | ssl_debug_helpers.h | 61 unsigned int flags); 74 #define MBEDTLS_SSL_PRINT_TICKET_FLAGS(level, flags) \ argument 75 mbedtls_ssl_print_ticket_flags(ssl, level, __FILE__, __LINE__, flags) 85 #define MBEDTLS_SSL_PRINT_TICKET_FLAGS(level, flags) argument
|
D | padlock.c | 41 static int flags = -1; in mbedtls_padlock_has_support() local 44 if (flags == -1) { in mbedtls_padlock_has_support() 60 flags = edx; in mbedtls_padlock_has_support() 63 return flags & feature; in mbedtls_padlock_has_support()
|
D | entropy_poll.c | 93 static int getrandom_wrapper(void *buf, size_t buflen, unsigned int flags) in getrandom_wrapper() argument 101 return syscall(SYS_getrandom, buf, buflen, flags); in getrandom_wrapper() 113 static int getrandom_wrapper(void *buf, size_t buflen, unsigned int flags) in getrandom_wrapper() argument 115 return getrandom(buf, buflen, flags); in getrandom_wrapper()
|
D | psa_crypto_core.h | 144 return slot->attr.flags & mask; in psa_key_slot_get_flags() 157 slot->attr.flags = ((~mask & slot->attr.flags) | in psa_key_slot_set_flags() 169 slot->attr.flags |= mask; in psa_key_slot_set_bits_in_flags() 180 slot->attr.flags &= ~mask; in psa_key_slot_clear_bits()
|
D | psa_crypto_its.h | 50 psa_storage_create_flags_t flags; /**< The flags set when the uid was created **/ member
|
D | ssl_misc.h | 1672 uint32_t *flags); 2746 mbedtls_ssl_session *session, unsigned int flags) in mbedtls_ssl_session_get_ticket_flags() argument 2749 (flags & MBEDTLS_SSL_TLS1_3_TICKET_FLAGS_MASK); in mbedtls_ssl_session_get_ticket_flags() 2753 mbedtls_ssl_session *session, unsigned int flags) in mbedtls_ssl_session_set_ticket_flags() argument 2755 session->ticket_flags |= (flags & MBEDTLS_SSL_TLS1_3_TICKET_FLAGS_MASK); in mbedtls_ssl_session_set_ticket_flags() 2759 mbedtls_ssl_session *session, unsigned int flags) in mbedtls_ssl_session_clear_ticket_flags() argument 2761 session->ticket_flags &= ~(flags & MBEDTLS_SSL_TLS1_3_TICKET_FLAGS_MASK); in mbedtls_ssl_session_clear_ticket_flags()
|
/mbedtls-3.5.0/scripts/mbedtls_dev/ |
D | crypto_knowledge.py | 551 flags = [] 553 flags = ['SIGN_HASH', 'SIGN_MESSAGE', 557 flags = ['DECRYPT', 'ENCRYPT'] 559 flags = ['VERIFY_HASH', 'VERIFY_MESSAGE'] 561 flags += ['SIGN_HASH', 'SIGN_MESSAGE'] 563 flags = ['ENCRYPT'] 565 flags += ['DECRYPT'] 568 flags = ['DERIVE'] 571 return ['PSA_KEY_USAGE_' + flag for flag in flags]
|
/mbedtls-3.5.0/include/mbedtls/ |
D | x509_crt.h | 248 uint32_t MBEDTLS_PRIVATE(flags); 592 uint32_t flags); 664 const char *cn, uint32_t *flags, 706 const char *cn, uint32_t *flags, 740 const char *cn, uint32_t *flags, 806 const char *cn, uint32_t *flags,
|
D | cipher.h | 302 int MBEDTLS_PRIVATE(flags); 563 return info->MBEDTLS_PRIVATE(flags) & MBEDTLS_CIPHER_VARIABLE_KEY_LEN; in mbedtls_cipher_info_has_variable_key_bitlen() 582 return info->MBEDTLS_PRIVATE(flags) & MBEDTLS_CIPHER_VARIABLE_IV_LEN; in mbedtls_cipher_info_has_variable_iv_size()
|
/mbedtls-3.5.0/programs/x509/ |
D | cert_app.c | 111 static int my_verify(void *data, mbedtls_x509_crt *crt, int depth, uint32_t *flags) in my_verify() argument 120 if ((*flags) == 0) { in my_verify() 123 mbedtls_x509_crt_verify_info(buf, sizeof(buf), " ! ", *flags); in my_verify() 143 uint32_t flags; in main() local 319 if ((ret = mbedtls_x509_crt_verify(&crt, &cacert, &cacrl, NULL, &flags, in main() 325 mbedtls_x509_crt_verify_info(vrfy_buf, sizeof(vrfy_buf), " ! ", flags); in main()
|
/mbedtls-3.5.0/programs/ssl/ |
D | ssl_test_common_source.c | 335 uint32_t flags) in x509_crt_verify_info() argument 338 return mbedtls_x509_crt_verify_info(buf, size, prefix, flags); in x509_crt_verify_info() 346 if ((flags & err) != 0) \ in x509_crt_verify_info() 350 flags ^= err; \ in x509_crt_verify_info() 356 if (flags != 0) { in x509_crt_verify_info()
|
D | ssl_client1.c | 72 uint32_t flags; in main() local 195 if ((flags = mbedtls_ssl_get_verify_result(&ssl)) != 0) { in main() 203 mbedtls_x509_crt_verify_info(vrfy_buf, sizeof(vrfy_buf), " ! ", flags); in main()
|
D | dtls_client.c | 85 uint32_t flags; in main() local 224 if ((flags = mbedtls_ssl_get_verify_result(&ssl)) != 0) { in main() 232 mbedtls_x509_crt_verify_info(vrfy_buf, sizeof(vrfy_buf), " ! ", flags); in main()
|
D | ssl_mail_client.c | 164 uint32_t flags; in do_handshake() local 193 if ((flags = mbedtls_ssl_get_verify_result(ssl)) != 0) { in do_handshake() 201 mbedtls_x509_crt_verify_info(vrfy_buf, sizeof(vrfy_buf), " ! ", flags); in do_handshake()
|
/mbedtls-3.5.0/tests/scripts/ |
D | generate_psa_tests.py | 582 flags = [] 584 flags.append('TEST_FLAG_EXERCISE') 586 flags.append('TEST_FLAG_READ_ONLY') 587 extra_arguments = [' | '.join(flags) if flags else '0']
|
/mbedtls-3.5.0/include/psa/ |
D | crypto_extra.h | 146 attributes->MBEDTLS_PRIVATE(core).MBEDTLS_PRIVATE(flags) |= MBEDTLS_PSA_KA_FLAG_HAS_SLOT_NUMBER; in psa_set_key_slot_number() 159 attributes->MBEDTLS_PRIVATE(core).MBEDTLS_PRIVATE(flags) &= in psa_clear_key_slot_number()
|