Home
last modified time | relevance | path

Searched refs:id (Results 1 – 25 of 80) sorted by relevance

1234

/mbedtls-3.7.0/tests/suites/
Dtest_suite_oid.data7 OID get certificate policy wrong oid - id-ce-authorityKeyIdentifier
10 OID get Ext Key Usage - id-kp-serverAuth
13 OID get Ext Key Usage - id-kp-clientAuth
16 OID get Ext Key Usage - id-kp-codeSigning
19 OID get Ext Key Usage - id-kp-emailProtection
22 OID get Ext Key Usage - id-kp-timeStamping
25 OID get Ext Key Usage - id-kp-OCSPSigning
28 OID get Ext Key Usage - id-kp-wisun-fan-device
34 OID get Ext Key Usage wrong oid - id-ce-authorityKeyIdentifier
37 OID get x509 extension - id-ce-basicConstraints
[all …]
Dtest_suite_psa_crypto_se_driver_hal_mocks.function82 psa_key_id_t id;
86 * MAX_KEY_ID_FOR_TEST. In addition, run the destroy function on key id
88 for (id = 0; id <= MAX_KEY_ID_FOR_TEST; id++) {
89 psa_destroy_persistent_key(mbedtls_svc_key_id_make(1, id));
329 mbedtls_svc_key_id_t id = mbedtls_svc_key_id_make(1, 1);
348 psa_set_key_id(&attributes, id);
362 mock_import_data.attributes.id, id));
365 mock_import_data.attributes.id) == 0);
367 mock_import_data.attributes.id) == 0);
378 PSA_ASSERT(psa_destroy_key(id));
[all …]
Dtest_suite_ecp.function37 if (grp1->id != grp2->id) {
108 void mbedtls_ecp_curve_info(int id, int tls_id, int size, char *name)
112 by_id = mbedtls_ecp_curve_info_from_grp_id(id);
153 void ecp_test_vect_restart(int id,
191 TEST_ASSERT(mbedtls_ecp_group_load(&grp, id) == 0);
252 void ecp_muladd_restart(int id, char *xR_str, char *yR_str,
277 TEST_ASSERT(mbedtls_ecp_group_load(&grp, id) == 0);
323 void ecp_test_vect(int id, char *dA_str, char *xA_str, char *yA_str,
337 TEST_ASSERT(mbedtls_ecp_group_load(&grp, id) == 0);
380 void ecp_test_vec_x(int id, char *dA_hex, char *xA_hex, char *dB_hex,
[all …]
Dtest_suite_psa_crypto_attributes.data5 PSA key attributes: id only
11 PSA key attributes: id then back to volatile
14 PSA key attributes: id then back to non local volatile
17 PSA key attributes: id then lifetime
20 PSA key attributes: lifetime then id
23 PSA key attributes: non local volatile lifetime then id
Dtest_suite_psa_crypto_slot_management.data16 Persistent slot, check after closing, id=min
19 Persistent slot, check after closing and restarting, id=min
22 Persistent slot, check after destroying, id=min
25 Persistent slot, check after destroying and restarting, id=min
28 Persistent slot, check after purging, id=min
31 Persistent slot, check after purging and restarting, id=min
34 Persistent slot, check after restart with live handle, id=min
37 Persistent slot, check after closing, id=max
40 Persistent slot, check after destroying, id=max
43 Persistent slot, check after purging, id=max
[all …]
Dtest_suite_psa_crypto_se_driver_hal.function867 mbedtls_svc_key_id_t id = mbedtls_svc_key_id_make(1, 1);
875 TEST_USES_KEY_ID(id);
892 psa_set_key_id(&attributes, id);
955 attributes.id = returned_id;
1002 mbedtls_svc_key_id_t id = mbedtls_svc_key_id_make(1, 1);
1008 TEST_USES_KEY_ID(id);
1024 psa_set_key_id(&attributes, id);
1060 PSA_ASSERT(psa_get_key_attributes(id, &attributes));
1062 PSA_ASSERT(psa_destroy_key(id));
1068 TEST_EQUAL(psa_open_key(id, &handle), PSA_ERROR_DOES_NOT_EXIST);
[all …]
Dtest_suite_psa_crypto_slot_management.function198 mbedtls_svc_key_id_t id = mbedtls_svc_key_id_make(owner_id_arg, id_arg);
217 TEST_USES_KEY_ID(id);
222 psa_set_key_id(&attributes, id);
230 TEST_ASSERT(mbedtls_svc_key_id_equal(id, returned_id));
237 PSA_ASSERT(psa_get_key_attributes(id, &attributes));
240 psa_get_key_id(&attributes), id));
248 PSA_ASSERT(psa_close_key(id));
255 PSA_ASSERT(psa_open_key(id, &handle));
260 psa_get_key_id(&attributes), id));
272 if (!invalidate_key(invalidate_method, id)) {
[all …]
Dtest_suite_ecdh.function66 void ecdh_primitive_random(int id)
79 TEST_ASSERT(mbedtls_ecp_group_load(&grp, id) == 0);
105 void ecdh_primitive_testvec(int id, data_t *rnd_buf_A, char *xA_str,
121 TEST_ASSERT(mbedtls_ecp_group_load(&grp, id) == 0);
196 void ecdh_exchange(int id)
210 TEST_ASSERT(mbedtls_ecdh_setup(&srv, id) == 0);
240 void ecdh_restart(int id, data_t *dA, data_t *dB, data_t *z,
270 TEST_ASSERT(mbedtls_ecp_group_load(&grp, id) == 0);
276 TEST_ASSERT(mbedtls_ecdh_setup(&srv, id) == 0);
469 void ecdh_context_grp(int id)
[all …]
Dtest_suite_ecdsa.function11 void ecdsa_prim_zero(int id)
25 TEST_ASSERT(mbedtls_ecp_group_load(&grp, id) == 0);
43 void ecdsa_prim_random(int id)
60 TEST_ASSERT(mbedtls_ecp_group_load(&grp, id) == 0);
78 void ecdsa_prim_test_vectors(int id, char *d_str, char *xQ_str,
94 TEST_ASSERT(mbedtls_ecp_group_load(&grp, id) == 0);
194 void ecdsa_det_test_vectors(int id, char *d_str, int md_alg, data_t *hash,
206 TEST_ASSERT(mbedtls_ecp_group_load(&grp, id) == 0);
230 void ecdsa_write_read_zero(int id)
246 TEST_ASSERT(mbedtls_ecdsa_genkey(&ctx, id,
[all …]
Dtest_suite_psa_crypto_persistent_key.data60 Persistent key import (RSA) invalid key id (VENDOR_MIN)
64 Persistent key import (RSA) invalid key id (VOLATILE_MIN)
68 Persistent key import (RSA) invalid key id (VENDOR_MAX)
128 Destroy invalid id: 0
134 Destroy invalid id: 0xffffffff
Dtest_suite_psa_crypto_se_driver_hal.data166 Key registration: key id out of range
169 Key registration: key id min vendor
172 Key registration: key id max vendor except volatile
175 Key registration: key id min volatile
178 Key registration: key id max volatile
/mbedtls-3.7.0/library/
Dpk_internal.h88 mbedtls_ecp_group_id id; in mbedtls_pk_get_ec_group_id() local
101 id = mbedtls_ecc_group_from_psa(curve, psa_get_key_bits(&opaque_attrs)); in mbedtls_pk_get_ec_group_id()
107 id = mbedtls_ecc_group_from_psa(pk->ec_family, pk->ec_bits); in mbedtls_pk_get_ec_group_id()
109 id = mbedtls_pk_ec_ro(*pk)->grp.id; in mbedtls_pk_get_ec_group_id()
113 return id; in mbedtls_pk_get_ec_group_id()
121 #define MBEDTLS_PK_IS_RFC8410_GROUP_ID(id) \ argument
122 ((id == MBEDTLS_ECP_DP_CURVE25519) || (id == MBEDTLS_ECP_DP_CURVE448))
126 mbedtls_ecp_group_id id = mbedtls_pk_get_ec_group_id(pk); in mbedtls_pk_is_rfc8410() local
128 return MBEDTLS_PK_IS_RFC8410_GROUP_ID(id); in mbedtls_pk_is_rfc8410()
Dblock_cipher.c60 switch (ctx->id) { in mbedtls_block_cipher_free()
79 ctx->id = MBEDTLS_BLOCK_CIPHER_ID_NONE; in mbedtls_block_cipher_free()
85 ctx->id = (cipher_id == MBEDTLS_CIPHER_ID_AES) ? MBEDTLS_BLOCK_CIPHER_ID_AES : in mbedtls_block_cipher_setup()
91 psa_key_type_t psa_key_type = psa_key_type_from_block_cipher_id(ctx->id); in mbedtls_block_cipher_setup()
100 switch (ctx->id) { in mbedtls_block_cipher_setup()
117 ctx->id = MBEDTLS_BLOCK_CIPHER_ID_NONE; in mbedtls_block_cipher_setup()
131 psa_set_key_type(&key_attr, psa_key_type_from_block_cipher_id(ctx->id)); in mbedtls_block_cipher_setkey()
146 switch (ctx->id) { in mbedtls_block_cipher_setkey()
182 switch (ctx->id) { in mbedtls_block_cipher_encrypt()
Dpsa_crypto_driver_wrappers.h567 switch( operation->id ) in psa_driver_wrapper_sign_hash_get_num_ops()
591 switch( operation->id ) in psa_driver_wrapper_verify_hash_get_num_ops()
643 operation->id = PSA_CRYPTO_MBED_TLS_DRIVER_ID; in psa_driver_wrapper_sign_hash_start()
666 switch( operation->id ) in psa_driver_wrapper_sign_hash_complete()
691 switch( operation->id ) in psa_driver_wrapper_sign_hash_abort()
738 operation->id = PSA_CRYPTO_MBED_TLS_DRIVER_ID; in psa_driver_wrapper_verify_hash_start()
760 switch( operation->id ) in psa_driver_wrapper_verify_hash_complete()
781 switch( operation->id ) in psa_driver_wrapper_verify_hash_abort()
1426 operation->id = MBEDTLS_TEST_TRANSPARENT_DRIVER_ID; in psa_driver_wrapper_cipher_encrypt_setup()
1438 operation->id = PSA_CRYPTO_CC3XX_DRIVER_ID; in psa_driver_wrapper_cipher_encrypt_setup()
[all …]
Dpsa_crypto_slot_management.c120 (mbedtls_svc_key_id_equal(key, slot->attr.id))) { in psa_get_and_lock_key_slot_in_memory()
134 (mbedtls_svc_key_id_equal(key, slot->attr.id))) { in psa_get_and_lock_key_slot_in_memory()
299 MBEDTLS_SVC_KEY_ID_GET_KEY_ID(slot->attr.id))) { in psa_load_builtin_key_into_slot()
305 slot->attr.id, &lifetime, &slot_number); in psa_load_builtin_key_into_slot()
312 psa_set_key_id(&attributes, slot->attr.id); in psa_load_builtin_key_into_slot()
409 (*p_slot)->attr.id = key; in psa_get_and_lock_key_slot()
668 psa_key_id_t id = MBEDTLS_SVC_KEY_ID_GET_KEY_ID(slot->attr.id); in mbedtls_psa_get_stats() local
670 if (id > stats->max_open_internal_key_id) { in mbedtls_psa_get_stats()
671 stats->max_open_internal_key_id = id; in mbedtls_psa_get_stats()
676 psa_key_id_t id = MBEDTLS_SVC_KEY_ID_GET_KEY_ID(slot->attr.id); in mbedtls_psa_get_stats() local
[all …]
Dmps_trace.c43 void mbedtls_mps_trace_print_msg(int id, int line, const char *format, ...) in mbedtls_mps_trace_print_msg() argument
54 mbedtls_printf("[%d|L%d]: %s\n", id, line, str); in mbedtls_mps_trace_print_msg()
71 void mbedtls_mps_trace_color(int id) in mbedtls_mps_trace_color() argument
73 if (id > (int) (sizeof(colors) / sizeof(*colors))) { in mbedtls_mps_trace_color()
76 printf("%s", colors[id]); in mbedtls_mps_trace_color()
Decjpake.c145 ctx->grp.id == MBEDTLS_ECP_DP_NONE || in mbedtls_ecjpake_check()
198 const char *id, in ecjpake_hash() argument
205 const size_t id_len = strlen(id); in ecjpake_hash()
224 memcpy(p, id, id_len); in ecjpake_hash()
248 const char *id, in ecjpake_zkp_read() argument
292 MBEDTLS_MPI_CHK(ecjpake_hash(md_type, grp, pf, G, &V, X, id, &h)); in ecjpake_zkp_read()
319 const char *id, in ecjpake_zkp_write() argument
342 MBEDTLS_MPI_CHK(ecjpake_hash(md_type, grp, pf, G, &V, X, id, &h)); in ecjpake_zkp_write()
379 const char *id, in ecjpake_kkp_read() argument
401 MBEDTLS_MPI_CHK(ecjpake_zkp_read(md_type, grp, pf, G, X, id, p, end)); in ecjpake_kkp_read()
[all …]
Dsha3.c270 int mbedtls_sha3_starts(mbedtls_sha3_context *ctx, mbedtls_sha3_id id) in mbedtls_sha3_starts() argument
272 switch (id) { in mbedtls_sha3_starts()
379 int mbedtls_sha3(mbedtls_sha3_id id, const uint8_t *input, in mbedtls_sha3() argument
388 if ((ret = mbedtls_sha3_starts(&ctx, id)) != 0) { in mbedtls_sha3()
538 mbedtls_sha3_id id, in mbedtls_sha3_kat_test() argument
544 result = mbedtls_sha3(id, in mbedtls_sha3_kat_test()
556 switch (id) { in mbedtls_sha3_kat_test()
590 mbedtls_sha3_id id) in mbedtls_sha3_long_kat_test() argument
605 result = mbedtls_sha3_starts(&ctx, id); in mbedtls_sha3_long_kat_test()
633 switch (id) { in mbedtls_sha3_long_kat_test()
Dpk_ecc.c38 if (mbedtls_pk_ec_ro(*pk)->grp.id != MBEDTLS_ECP_DP_NONE && in mbedtls_pk_ecc_set_group()
39 mbedtls_pk_ec_ro(*pk)->grp.id != grp_id) { in mbedtls_pk_ecc_set_group()
76 int ret = mbedtls_ecp_read_key(eck->grp.id, eck, key, key_len); in mbedtls_pk_ecc_set_key()
108 psa_ecc_family_t curve = mbedtls_ecc_group_to_psa(eck->grp.id, &curve_bits); in mbedtls_pk_ecc_set_pubkey_from_prv()
/mbedtls-3.7.0/include/psa/
Dcrypto_struct.h80 unsigned int MBEDTLS_PRIVATE(id);
105 unsigned int MBEDTLS_PRIVATE(id);
141 unsigned int MBEDTLS_PRIVATE(id);
169 unsigned int MBEDTLS_PRIVATE(id);
289 mbedtls_svc_key_id_t MBEDTLS_PRIVATE(id);
314 attributes->MBEDTLS_PRIVATE(id) = key; in psa_set_key_id()
327 return attributes->MBEDTLS_PRIVATE(id); in psa_get_key_id()
334 attributes->MBEDTLS_PRIVATE(id).MBEDTLS_PRIVATE(owner) = owner; in mbedtls_set_key_owner_id()
344 attributes->MBEDTLS_PRIVATE(id).MBEDTLS_PRIVATE(key_id) = 0; in psa_set_key_lifetime()
346 attributes->MBEDTLS_PRIVATE(id) = 0; in psa_set_key_lifetime()
[all …]
Dcrypto_values.h2439 #define MBEDTLS_SVC_KEY_ID_GET_KEY_ID(id) (id) argument
2440 #define MBEDTLS_SVC_KEY_ID_GET_OWNER_ID(id) (0) argument
2482 #define MBEDTLS_SVC_KEY_ID_GET_KEY_ID(id) ((id).MBEDTLS_PRIVATE(key_id)) argument
2483 #define MBEDTLS_SVC_KEY_ID_GET_OWNER_ID(id) ((id).MBEDTLS_PRIVATE(owner)) argument
/mbedtls-3.7.0/scripts/data_files/driver_templates/
Dpsa_crypto_driver_wrappers.h.jinja46 /* BEGIN-driver id definition */
51 /* END-driver id */
466 switch( operation->id )
490 switch( operation->id )
539 operation->id = PSA_CRYPTO_MBED_TLS_DRIVER_ID;
562 switch( operation->id )
587 switch( operation->id )
631 operation->id = PSA_CRYPTO_MBED_TLS_DRIVER_ID;
653 switch( operation->id )
674 switch( operation->id )
[all …]
/mbedtls-3.7.0/scripts/mbedtls_dev/
Dpsa_storage.py104 id: Optional[int] = None, #pylint: disable=redefined-builtin
112 self.id = id #pylint: disable=invalid-name #type: Optional[int]
181 id=1, lifetime=0x00000001,
192 id=1, lifetime='PSA_KEY_LIFETIME_PERSISTENT',
/mbedtls-3.7.0/docs/architecture/
Dpsa-storage-resilience.md117id` does not exist, to a state where file `id` exists and has its desired final content (containin…
121id` has a transaction in progress. The file `id` cannot be used for this purpose because there is …
123 * Write (create or update) a file `t` referencing `id`.
124 * Write the final state of `id`.
129id` to be modified only once. In particular, if a key management involves writing an intermediate …
305 …red in the key file. This is because the core needs to know the driver key id in order to access t…
313 * If the file `id` does not exist, then no resources corresponding to that key are in a secure elem…
314 * If `id` is not in the transaction list and the file `id` exists and references a key in a statefu…
316 If `id` is in the transaction list and the file `id` exists, the key may or may not be present in t…
318 …key creation must create `id` before calling the secure element's key creation entry point, and ke…
[all …]
/mbedtls-3.7.0/include/mbedtls/
Dsha3.h93 int mbedtls_sha3_starts(mbedtls_sha3_context *ctx, mbedtls_sha3_id id);
153 int mbedtls_sha3(mbedtls_sha3_id id, const uint8_t *input,

1234