/mbedtls-3.7.0/tests/suites/ |
D | test_suite_oid.data | 7 OID get certificate policy wrong oid - id-ce-authorityKeyIdentifier 10 OID get Ext Key Usage - id-kp-serverAuth 13 OID get Ext Key Usage - id-kp-clientAuth 16 OID get Ext Key Usage - id-kp-codeSigning 19 OID get Ext Key Usage - id-kp-emailProtection 22 OID get Ext Key Usage - id-kp-timeStamping 25 OID get Ext Key Usage - id-kp-OCSPSigning 28 OID get Ext Key Usage - id-kp-wisun-fan-device 34 OID get Ext Key Usage wrong oid - id-ce-authorityKeyIdentifier 37 OID get x509 extension - id-ce-basicConstraints [all …]
|
D | test_suite_psa_crypto_se_driver_hal_mocks.function | 82 psa_key_id_t id; 86 * MAX_KEY_ID_FOR_TEST. In addition, run the destroy function on key id 88 for (id = 0; id <= MAX_KEY_ID_FOR_TEST; id++) { 89 psa_destroy_persistent_key(mbedtls_svc_key_id_make(1, id)); 329 mbedtls_svc_key_id_t id = mbedtls_svc_key_id_make(1, 1); 348 psa_set_key_id(&attributes, id); 362 mock_import_data.attributes.id, id)); 365 mock_import_data.attributes.id) == 0); 367 mock_import_data.attributes.id) == 0); 378 PSA_ASSERT(psa_destroy_key(id)); [all …]
|
D | test_suite_ecp.function | 37 if (grp1->id != grp2->id) { 108 void mbedtls_ecp_curve_info(int id, int tls_id, int size, char *name) 112 by_id = mbedtls_ecp_curve_info_from_grp_id(id); 153 void ecp_test_vect_restart(int id, 191 TEST_ASSERT(mbedtls_ecp_group_load(&grp, id) == 0); 252 void ecp_muladd_restart(int id, char *xR_str, char *yR_str, 277 TEST_ASSERT(mbedtls_ecp_group_load(&grp, id) == 0); 323 void ecp_test_vect(int id, char *dA_str, char *xA_str, char *yA_str, 337 TEST_ASSERT(mbedtls_ecp_group_load(&grp, id) == 0); 380 void ecp_test_vec_x(int id, char *dA_hex, char *xA_hex, char *dB_hex, [all …]
|
D | test_suite_psa_crypto_attributes.data | 5 PSA key attributes: id only 11 PSA key attributes: id then back to volatile 14 PSA key attributes: id then back to non local volatile 17 PSA key attributes: id then lifetime 20 PSA key attributes: lifetime then id 23 PSA key attributes: non local volatile lifetime then id
|
D | test_suite_psa_crypto_slot_management.data | 16 Persistent slot, check after closing, id=min 19 Persistent slot, check after closing and restarting, id=min 22 Persistent slot, check after destroying, id=min 25 Persistent slot, check after destroying and restarting, id=min 28 Persistent slot, check after purging, id=min 31 Persistent slot, check after purging and restarting, id=min 34 Persistent slot, check after restart with live handle, id=min 37 Persistent slot, check after closing, id=max 40 Persistent slot, check after destroying, id=max 43 Persistent slot, check after purging, id=max [all …]
|
D | test_suite_psa_crypto_se_driver_hal.function | 867 mbedtls_svc_key_id_t id = mbedtls_svc_key_id_make(1, 1); 875 TEST_USES_KEY_ID(id); 892 psa_set_key_id(&attributes, id); 955 attributes.id = returned_id; 1002 mbedtls_svc_key_id_t id = mbedtls_svc_key_id_make(1, 1); 1008 TEST_USES_KEY_ID(id); 1024 psa_set_key_id(&attributes, id); 1060 PSA_ASSERT(psa_get_key_attributes(id, &attributes)); 1062 PSA_ASSERT(psa_destroy_key(id)); 1068 TEST_EQUAL(psa_open_key(id, &handle), PSA_ERROR_DOES_NOT_EXIST); [all …]
|
D | test_suite_psa_crypto_slot_management.function | 198 mbedtls_svc_key_id_t id = mbedtls_svc_key_id_make(owner_id_arg, id_arg); 217 TEST_USES_KEY_ID(id); 222 psa_set_key_id(&attributes, id); 230 TEST_ASSERT(mbedtls_svc_key_id_equal(id, returned_id)); 237 PSA_ASSERT(psa_get_key_attributes(id, &attributes)); 240 psa_get_key_id(&attributes), id)); 248 PSA_ASSERT(psa_close_key(id)); 255 PSA_ASSERT(psa_open_key(id, &handle)); 260 psa_get_key_id(&attributes), id)); 272 if (!invalidate_key(invalidate_method, id)) { [all …]
|
D | test_suite_ecdh.function | 66 void ecdh_primitive_random(int id) 79 TEST_ASSERT(mbedtls_ecp_group_load(&grp, id) == 0); 105 void ecdh_primitive_testvec(int id, data_t *rnd_buf_A, char *xA_str, 121 TEST_ASSERT(mbedtls_ecp_group_load(&grp, id) == 0); 196 void ecdh_exchange(int id) 210 TEST_ASSERT(mbedtls_ecdh_setup(&srv, id) == 0); 240 void ecdh_restart(int id, data_t *dA, data_t *dB, data_t *z, 270 TEST_ASSERT(mbedtls_ecp_group_load(&grp, id) == 0); 276 TEST_ASSERT(mbedtls_ecdh_setup(&srv, id) == 0); 469 void ecdh_context_grp(int id) [all …]
|
D | test_suite_ecdsa.function | 11 void ecdsa_prim_zero(int id) 25 TEST_ASSERT(mbedtls_ecp_group_load(&grp, id) == 0); 43 void ecdsa_prim_random(int id) 60 TEST_ASSERT(mbedtls_ecp_group_load(&grp, id) == 0); 78 void ecdsa_prim_test_vectors(int id, char *d_str, char *xQ_str, 94 TEST_ASSERT(mbedtls_ecp_group_load(&grp, id) == 0); 194 void ecdsa_det_test_vectors(int id, char *d_str, int md_alg, data_t *hash, 206 TEST_ASSERT(mbedtls_ecp_group_load(&grp, id) == 0); 230 void ecdsa_write_read_zero(int id) 246 TEST_ASSERT(mbedtls_ecdsa_genkey(&ctx, id, [all …]
|
D | test_suite_psa_crypto_persistent_key.data | 60 Persistent key import (RSA) invalid key id (VENDOR_MIN) 64 Persistent key import (RSA) invalid key id (VOLATILE_MIN) 68 Persistent key import (RSA) invalid key id (VENDOR_MAX) 128 Destroy invalid id: 0 134 Destroy invalid id: 0xffffffff
|
D | test_suite_psa_crypto_se_driver_hal.data | 166 Key registration: key id out of range 169 Key registration: key id min vendor 172 Key registration: key id max vendor except volatile 175 Key registration: key id min volatile 178 Key registration: key id max volatile
|
/mbedtls-3.7.0/library/ |
D | pk_internal.h | 88 mbedtls_ecp_group_id id; in mbedtls_pk_get_ec_group_id() local 101 id = mbedtls_ecc_group_from_psa(curve, psa_get_key_bits(&opaque_attrs)); in mbedtls_pk_get_ec_group_id() 107 id = mbedtls_ecc_group_from_psa(pk->ec_family, pk->ec_bits); in mbedtls_pk_get_ec_group_id() 109 id = mbedtls_pk_ec_ro(*pk)->grp.id; in mbedtls_pk_get_ec_group_id() 113 return id; in mbedtls_pk_get_ec_group_id() 121 #define MBEDTLS_PK_IS_RFC8410_GROUP_ID(id) \ argument 122 ((id == MBEDTLS_ECP_DP_CURVE25519) || (id == MBEDTLS_ECP_DP_CURVE448)) 126 mbedtls_ecp_group_id id = mbedtls_pk_get_ec_group_id(pk); in mbedtls_pk_is_rfc8410() local 128 return MBEDTLS_PK_IS_RFC8410_GROUP_ID(id); in mbedtls_pk_is_rfc8410()
|
D | block_cipher.c | 60 switch (ctx->id) { in mbedtls_block_cipher_free() 79 ctx->id = MBEDTLS_BLOCK_CIPHER_ID_NONE; in mbedtls_block_cipher_free() 85 ctx->id = (cipher_id == MBEDTLS_CIPHER_ID_AES) ? MBEDTLS_BLOCK_CIPHER_ID_AES : in mbedtls_block_cipher_setup() 91 psa_key_type_t psa_key_type = psa_key_type_from_block_cipher_id(ctx->id); in mbedtls_block_cipher_setup() 100 switch (ctx->id) { in mbedtls_block_cipher_setup() 117 ctx->id = MBEDTLS_BLOCK_CIPHER_ID_NONE; in mbedtls_block_cipher_setup() 131 psa_set_key_type(&key_attr, psa_key_type_from_block_cipher_id(ctx->id)); in mbedtls_block_cipher_setkey() 146 switch (ctx->id) { in mbedtls_block_cipher_setkey() 182 switch (ctx->id) { in mbedtls_block_cipher_encrypt()
|
D | psa_crypto_driver_wrappers.h | 567 switch( operation->id ) in psa_driver_wrapper_sign_hash_get_num_ops() 591 switch( operation->id ) in psa_driver_wrapper_verify_hash_get_num_ops() 643 operation->id = PSA_CRYPTO_MBED_TLS_DRIVER_ID; in psa_driver_wrapper_sign_hash_start() 666 switch( operation->id ) in psa_driver_wrapper_sign_hash_complete() 691 switch( operation->id ) in psa_driver_wrapper_sign_hash_abort() 738 operation->id = PSA_CRYPTO_MBED_TLS_DRIVER_ID; in psa_driver_wrapper_verify_hash_start() 760 switch( operation->id ) in psa_driver_wrapper_verify_hash_complete() 781 switch( operation->id ) in psa_driver_wrapper_verify_hash_abort() 1426 operation->id = MBEDTLS_TEST_TRANSPARENT_DRIVER_ID; in psa_driver_wrapper_cipher_encrypt_setup() 1438 operation->id = PSA_CRYPTO_CC3XX_DRIVER_ID; in psa_driver_wrapper_cipher_encrypt_setup() [all …]
|
D | psa_crypto_slot_management.c | 120 (mbedtls_svc_key_id_equal(key, slot->attr.id))) { in psa_get_and_lock_key_slot_in_memory() 134 (mbedtls_svc_key_id_equal(key, slot->attr.id))) { in psa_get_and_lock_key_slot_in_memory() 299 MBEDTLS_SVC_KEY_ID_GET_KEY_ID(slot->attr.id))) { in psa_load_builtin_key_into_slot() 305 slot->attr.id, &lifetime, &slot_number); in psa_load_builtin_key_into_slot() 312 psa_set_key_id(&attributes, slot->attr.id); in psa_load_builtin_key_into_slot() 409 (*p_slot)->attr.id = key; in psa_get_and_lock_key_slot() 668 psa_key_id_t id = MBEDTLS_SVC_KEY_ID_GET_KEY_ID(slot->attr.id); in mbedtls_psa_get_stats() local 670 if (id > stats->max_open_internal_key_id) { in mbedtls_psa_get_stats() 671 stats->max_open_internal_key_id = id; in mbedtls_psa_get_stats() 676 psa_key_id_t id = MBEDTLS_SVC_KEY_ID_GET_KEY_ID(slot->attr.id); in mbedtls_psa_get_stats() local [all …]
|
D | mps_trace.c | 43 void mbedtls_mps_trace_print_msg(int id, int line, const char *format, ...) in mbedtls_mps_trace_print_msg() argument 54 mbedtls_printf("[%d|L%d]: %s\n", id, line, str); in mbedtls_mps_trace_print_msg() 71 void mbedtls_mps_trace_color(int id) in mbedtls_mps_trace_color() argument 73 if (id > (int) (sizeof(colors) / sizeof(*colors))) { in mbedtls_mps_trace_color() 76 printf("%s", colors[id]); in mbedtls_mps_trace_color()
|
D | ecjpake.c | 145 ctx->grp.id == MBEDTLS_ECP_DP_NONE || in mbedtls_ecjpake_check() 198 const char *id, in ecjpake_hash() argument 205 const size_t id_len = strlen(id); in ecjpake_hash() 224 memcpy(p, id, id_len); in ecjpake_hash() 248 const char *id, in ecjpake_zkp_read() argument 292 MBEDTLS_MPI_CHK(ecjpake_hash(md_type, grp, pf, G, &V, X, id, &h)); in ecjpake_zkp_read() 319 const char *id, in ecjpake_zkp_write() argument 342 MBEDTLS_MPI_CHK(ecjpake_hash(md_type, grp, pf, G, &V, X, id, &h)); in ecjpake_zkp_write() 379 const char *id, in ecjpake_kkp_read() argument 401 MBEDTLS_MPI_CHK(ecjpake_zkp_read(md_type, grp, pf, G, X, id, p, end)); in ecjpake_kkp_read() [all …]
|
D | sha3.c | 270 int mbedtls_sha3_starts(mbedtls_sha3_context *ctx, mbedtls_sha3_id id) in mbedtls_sha3_starts() argument 272 switch (id) { in mbedtls_sha3_starts() 379 int mbedtls_sha3(mbedtls_sha3_id id, const uint8_t *input, in mbedtls_sha3() argument 388 if ((ret = mbedtls_sha3_starts(&ctx, id)) != 0) { in mbedtls_sha3() 538 mbedtls_sha3_id id, in mbedtls_sha3_kat_test() argument 544 result = mbedtls_sha3(id, in mbedtls_sha3_kat_test() 556 switch (id) { in mbedtls_sha3_kat_test() 590 mbedtls_sha3_id id) in mbedtls_sha3_long_kat_test() argument 605 result = mbedtls_sha3_starts(&ctx, id); in mbedtls_sha3_long_kat_test() 633 switch (id) { in mbedtls_sha3_long_kat_test()
|
D | pk_ecc.c | 38 if (mbedtls_pk_ec_ro(*pk)->grp.id != MBEDTLS_ECP_DP_NONE && in mbedtls_pk_ecc_set_group() 39 mbedtls_pk_ec_ro(*pk)->grp.id != grp_id) { in mbedtls_pk_ecc_set_group() 76 int ret = mbedtls_ecp_read_key(eck->grp.id, eck, key, key_len); in mbedtls_pk_ecc_set_key() 108 psa_ecc_family_t curve = mbedtls_ecc_group_to_psa(eck->grp.id, &curve_bits); in mbedtls_pk_ecc_set_pubkey_from_prv()
|
/mbedtls-3.7.0/include/psa/ |
D | crypto_struct.h | 80 unsigned int MBEDTLS_PRIVATE(id); 105 unsigned int MBEDTLS_PRIVATE(id); 141 unsigned int MBEDTLS_PRIVATE(id); 169 unsigned int MBEDTLS_PRIVATE(id); 289 mbedtls_svc_key_id_t MBEDTLS_PRIVATE(id); 314 attributes->MBEDTLS_PRIVATE(id) = key; in psa_set_key_id() 327 return attributes->MBEDTLS_PRIVATE(id); in psa_get_key_id() 334 attributes->MBEDTLS_PRIVATE(id).MBEDTLS_PRIVATE(owner) = owner; in mbedtls_set_key_owner_id() 344 attributes->MBEDTLS_PRIVATE(id).MBEDTLS_PRIVATE(key_id) = 0; in psa_set_key_lifetime() 346 attributes->MBEDTLS_PRIVATE(id) = 0; in psa_set_key_lifetime() [all …]
|
D | crypto_values.h | 2439 #define MBEDTLS_SVC_KEY_ID_GET_KEY_ID(id) (id) argument 2440 #define MBEDTLS_SVC_KEY_ID_GET_OWNER_ID(id) (0) argument 2482 #define MBEDTLS_SVC_KEY_ID_GET_KEY_ID(id) ((id).MBEDTLS_PRIVATE(key_id)) argument 2483 #define MBEDTLS_SVC_KEY_ID_GET_OWNER_ID(id) ((id).MBEDTLS_PRIVATE(owner)) argument
|
/mbedtls-3.7.0/scripts/data_files/driver_templates/ |
D | psa_crypto_driver_wrappers.h.jinja | 46 /* BEGIN-driver id definition */ 51 /* END-driver id */ 466 switch( operation->id ) 490 switch( operation->id ) 539 operation->id = PSA_CRYPTO_MBED_TLS_DRIVER_ID; 562 switch( operation->id ) 587 switch( operation->id ) 631 operation->id = PSA_CRYPTO_MBED_TLS_DRIVER_ID; 653 switch( operation->id ) 674 switch( operation->id ) [all …]
|
/mbedtls-3.7.0/scripts/mbedtls_dev/ |
D | psa_storage.py | 104 id: Optional[int] = None, #pylint: disable=redefined-builtin 112 self.id = id #pylint: disable=invalid-name #type: Optional[int] 181 id=1, lifetime=0x00000001, 192 id=1, lifetime='PSA_KEY_LIFETIME_PERSISTENT',
|
/mbedtls-3.7.0/docs/architecture/ |
D | psa-storage-resilience.md | 117 …id` does not exist, to a state where file `id` exists and has its desired final content (containin… 121 …id` has a transaction in progress. The file `id` cannot be used for this purpose because there is … 123 * Write (create or update) a file `t` referencing `id`. 124 * Write the final state of `id`. 129 …id` to be modified only once. In particular, if a key management involves writing an intermediate … 305 …red in the key file. This is because the core needs to know the driver key id in order to access t… 313 * If the file `id` does not exist, then no resources corresponding to that key are in a secure elem… 314 * If `id` is not in the transaction list and the file `id` exists and references a key in a statefu… 316 If `id` is in the transaction list and the file `id` exists, the key may or may not be present in t… 318 …key creation must create `id` before calling the secure element's key creation entry point, and ke… [all …]
|
/mbedtls-3.7.0/include/mbedtls/ |
D | sha3.h | 93 int mbedtls_sha3_starts(mbedtls_sha3_context *ctx, mbedtls_sha3_id id); 153 int mbedtls_sha3(mbedtls_sha3_id id, const uint8_t *input,
|