/mbedtls-latest/tests/suites/ |
D | test_suite_psa_crypto_metadata.function | 72 /* Check that in the value of flags, the bit flag (which should be a macro 83 #define TEST_CLASSIFICATION_MACRO(cond, flag, alg, flags) \ 88 if ((flags) & (flag)) \ 119 static void algorithm_classification(psa_algorithm_t alg, unsigned flags) 122 TEST_CLASSIFICATION_MACRO(1, ALG_IS_VENDOR_DEFINED, alg, flags); 123 TEST_CLASSIFICATION_MACRO(1, ALG_IS_HMAC, alg, flags); 124 TEST_CLASSIFICATION_MACRO(1, ALG_IS_BLOCK_CIPHER_MAC, alg, flags); 125 TEST_CLASSIFICATION_MACRO(1, ALG_IS_STREAM_CIPHER, alg, flags); 126 TEST_CLASSIFICATION_MACRO(1, ALG_IS_RSA_PKCS1V15_SIGN, alg, flags); 127 TEST_CLASSIFICATION_MACRO(1, ALG_IS_RSA_PSS, alg, flags); [all …]
|
D | test_suite_x509parse.function | 66 static int verify_none(void *data, mbedtls_x509_crt *crt, int certificate_depth, uint32_t *flags) 71 *flags |= MBEDTLS_X509_BADCERT_OTHER; 76 static int verify_all(void *data, mbedtls_x509_crt *crt, int certificate_depth, uint32_t *flags) 81 *flags = 0; 148 static int verify_fatal(void *data, mbedtls_x509_crt *crt, int certificate_depth, uint32_t *flags) 157 *flags |= (1 << certificate_depth); 204 static int verify_print(void *data, mbedtls_x509_crt *crt, int certificate_depth, uint32_t *flags) 210 ((void) flags); 224 ret = mbedtls_snprintf(p, n, " - flags 0x%08x\n", *flags); 633 void x509_verify_info(int flags, char *prefix, char *result_str) [all …]
|
D | test_suite_psa_its.function | 90 uint32_t flags = flags_arg; 97 PSA_ASSERT(psa_its_set_wrap(uid, data->len, data->x, flags)); 101 TEST_ASSERT(info.flags == flags); 130 TEST_ASSERT(info.flags == flags1); 137 TEST_ASSERT(info.flags == flags2);
|
D | test_suite_psa_crypto_storage_format.function | 149 int flags) 186 if ((flags & TEST_FLAG_EXERCISE) && can_exercise(&actual_attributes)) { 194 if (flags & TEST_FLAG_READ_ONLY) { 270 data_t *representation, int flags) 300 uid, representation, flags));
|
D | test_suite_x509parse.data | 1187 …larSSL, CN=Polarssl Test EC CA - flags 0x00000000\ndepth 0 - serial 09 - subject C=NL, O=PolarSSL,… 1191 …:AD\:83\:7D\:A8\:94\:B2 - subject CN=selfsigned, OU=testing, O=PolarSSL, C=NL - flags 0x00000000\n" 1195 …61\:05\:E3\:A3\:CD\:78 - subject C=UK, O=mbed TLS, OU=testsuite, CN=localhost - flags 0x00000001\n" 1199 …arSSL, CN=PolarSSL Test CA - flags 0x00000000\ndepth 0 - serial 01 - subject C=NL, O=PolarSSL, CN=… 1203 …larSSL, CN=Polarssl Test EC CA - flags 0x00000000\ndepth 0 - serial 1E - subject C=NL, O=PolarSSL,… 1207 …larSSL, CN=Polarssl Test EC CA - flags 0x00000001\ndepth 0 - serial 09 - subject C=NL, O=PolarSSL,… 1211 …arSSL, CN=PolarSSL Test CA - flags 0x00000000\ndepth 0 - serial 01 - subject C=NL, O=PolarSSL, CN=… 1215 …arSSL, CN=PolarSSL Test CA - flags 0x00000000\ndepth 0 - serial 01 - subject C=NL, O=PolarSSL, CN=… 1219 …arSSL, CN=PolarSSL Test CA - flags 0x00000000\ndepth 0 - serial 01 - subject C=NL, O=PolarSSL, CN=… 1223 …flags 0x00000000\ndepth 1 - serial 0E - subject C=NL, O=PolarSSL, CN=PolarSSL Test Intermediate CA… [all …]
|
D | test_suite_psa_crypto_generate_key.function | 21 // key lifetime, usage flags, algorithm are irrelevant for this test
|
D | test_suite_psa_its.data | 10 Set/get/remove with flags
|
/mbedtls-latest/library/ |
D | x509_crt.c | 79 uint32_t flags; member 382 ver_chain->items[i].flags = (uint32_t) -1; in x509_crt_verify_chain_reset() 1903 uint32_t flags) in mbedtls_x509_crt_verify_info() argument 1911 if ((flags & cur->code) == 0) { in mbedtls_x509_crt_verify_info() 1917 flags ^= cur->code; in mbedtls_x509_crt_verify_info() 1920 if (flags != 0) { in mbedtls_x509_crt_verify_info() 2015 int flags = 0; in x509_crt_verifycrl() local 2025 return flags; in x509_crt_verifycrl() 2040 flags |= MBEDTLS_X509_BADCRL_NOT_TRUSTED; in x509_crt_verifycrl() 2048 flags |= MBEDTLS_X509_BADCRL_BAD_MD; in x509_crt_verifycrl() [all …]
|
D | ssl_debug_helpers.h | 54 unsigned int flags); 67 #define MBEDTLS_SSL_PRINT_TICKET_FLAGS(level, flags) \ argument 68 mbedtls_ssl_print_ticket_flags(ssl, level, __FILE__, __LINE__, flags) 78 #define MBEDTLS_SSL_PRINT_TICKET_FLAGS(level, flags) argument
|
D | padlock.c | 29 static int flags = -1; in mbedtls_padlock_has_support() local 32 if (flags == -1) { in mbedtls_padlock_has_support() 48 flags = edx; in mbedtls_padlock_has_support() 51 return flags & feature; in mbedtls_padlock_has_support()
|
D | entropy_poll.c | 85 static int getrandom_wrapper(void *buf, size_t buflen, unsigned int flags) in getrandom_wrapper() argument 93 return (int) syscall(SYS_getrandom, buf, buflen, flags); in getrandom_wrapper() 105 static int getrandom_wrapper(void *buf, size_t buflen, unsigned int flags) in getrandom_wrapper() argument 107 return (int) getrandom(buf, buflen, flags); in getrandom_wrapper()
|
D | psa_its_file.c | 59 uint8_t flags[sizeof(psa_storage_create_flags_t)]; member 102 p_info->flags = MBEDTLS_GET_UINT32_LE(header.flags, 0); in psa_its_read_file() 192 MBEDTLS_PUT_UINT32_LE(create_flags, header.flags, 0); in psa_its_set()
|
D | pk_ecc.c | 52 psa_key_usage_t flags; in mbedtls_pk_ecc_set_key() local 61 flags = PSA_KEY_USAGE_EXPORT; in mbedtls_pk_ecc_set_key() 65 flags = PSA_KEY_USAGE_SIGN_HASH | PSA_KEY_USAGE_SIGN_MESSAGE | in mbedtls_pk_ecc_set_key() 68 psa_set_key_usage_flags(&attributes, flags); in mbedtls_pk_ecc_set_key()
|
D | ssl_misc.h | 1724 uint32_t *flags); 2922 mbedtls_ssl_session *session, unsigned int flags) in mbedtls_ssl_tls13_session_get_ticket_flags() argument 2925 (flags & MBEDTLS_SSL_TLS1_3_TICKET_FLAGS_MASK); in mbedtls_ssl_tls13_session_get_ticket_flags() 2935 mbedtls_ssl_session *session, unsigned int flags) in mbedtls_ssl_tls13_session_ticket_has_flags() argument 2937 return mbedtls_ssl_tls13_session_get_ticket_flags(session, flags) != 0; in mbedtls_ssl_tls13_session_ticket_has_flags() 2962 mbedtls_ssl_session *session, unsigned int flags) in mbedtls_ssl_tls13_session_set_ticket_flags() argument 2964 session->ticket_flags |= (flags & MBEDTLS_SSL_TLS1_3_TICKET_FLAGS_MASK); in mbedtls_ssl_tls13_session_set_ticket_flags() 2968 mbedtls_ssl_session *session, unsigned int flags) in mbedtls_ssl_tls13_session_clear_ticket_flags() argument 2970 session->ticket_flags &= ~(flags & MBEDTLS_SSL_TLS1_3_TICKET_FLAGS_MASK); in mbedtls_ssl_tls13_session_clear_ticket_flags()
|
D | ssl_client.c | 220 int flags, in ssl_write_supported_groups_ext() argument 252 if (flags & SSL_WRITE_SUPPORTED_GROUPS_EXT_TLS1_3_FLAG) { in ssl_write_supported_groups_ext() 269 if ((flags & SSL_WRITE_SUPPORTED_GROUPS_EXT_TLS1_2_FLAG) && in ssl_write_supported_groups_ext()
|
D | psa_crypto_its.h | 38 psa_storage_create_flags_t flags; /**< The flags set when the uid was created **/ member
|
/mbedtls-latest/programs/x509/ |
D | cert_app.c | 99 static int my_verify(void *data, mbedtls_x509_crt *crt, int depth, uint32_t *flags) in my_verify() argument 108 if ((*flags) == 0) { in my_verify() 111 mbedtls_x509_crt_verify_info(buf, sizeof(buf), " ! ", *flags); in my_verify() 131 uint32_t flags; in main() local 317 if ((ret = mbedtls_x509_crt_verify(&crt, &cacert, &cacrl, NULL, &flags, in main() 323 mbedtls_x509_crt_verify_info(vrfy_buf, sizeof(vrfy_buf), " ! ", flags); in main()
|
/mbedtls-latest/include/mbedtls/ |
D | x509_crt.h | 252 uint32_t MBEDTLS_PRIVATE(flags); 597 uint32_t flags); 673 const char *cn, uint32_t *flags, 715 const char *cn, uint32_t *flags, 749 const char *cn, uint32_t *flags, 815 const char *cn, uint32_t *flags,
|
D | cipher.h | 302 unsigned int MBEDTLS_PRIVATE(flags) : 2; 564 return info->MBEDTLS_PRIVATE(flags) & MBEDTLS_CIPHER_VARIABLE_KEY_LEN; in mbedtls_cipher_info_has_variable_key_bitlen() 583 return info->MBEDTLS_PRIVATE(flags) & MBEDTLS_CIPHER_VARIABLE_IV_LEN; in mbedtls_cipher_info_has_variable_iv_size()
|
/mbedtls-latest/programs/ssl/ |
D | ssl_test_common_source.c | 323 uint32_t flags) in x509_crt_verify_info() argument 326 return mbedtls_x509_crt_verify_info(buf, size, prefix, flags); in x509_crt_verify_info() 334 if ((flags & err) != 0) \ in x509_crt_verify_info() 338 flags ^= err; \ in x509_crt_verify_info() 344 if (flags != 0) { in x509_crt_verify_info()
|
D | ssl_client1.c | 60 uint32_t flags; in main() local 193 if ((flags = mbedtls_ssl_get_verify_result(&ssl)) != 0) { in main() 201 mbedtls_x509_crt_verify_info(vrfy_buf, sizeof(vrfy_buf), " ! ", flags); in main()
|
D | dtls_client.c | 73 uint32_t flags; in main() local 222 if ((flags = mbedtls_ssl_get_verify_result(&ssl)) != 0) { in main() 230 mbedtls_x509_crt_verify_info(vrfy_buf, sizeof(vrfy_buf), " ! ", flags); in main()
|
D | ssl_mail_client.c | 152 uint32_t flags; in do_handshake() local 181 if ((flags = mbedtls_ssl_get_verify_result(ssl)) != 0) { in do_handshake() 189 mbedtls_x509_crt_verify_info(vrfy_buf, sizeof(vrfy_buf), " ! ", flags); in do_handshake()
|
D | ssl_client2.c | 568 int depth, uint32_t *flags) in my_verify() argument 591 if ((*flags) == 0) { in my_verify() 594 x509_crt_verify_info(buf, sizeof(buf), " ! ", *flags); in my_verify() 836 uint32_t flags; in main() local 2240 flags = mbedtls_ssl_get_verify_result(&ssl); in main() 2242 x509_crt_verify_info(vrfy_buf, sizeof(vrfy_buf), " ! ", flags); in main() 2441 if ((flags = mbedtls_ssl_get_verify_result(&ssl)) != 0) { in main() 2446 " ! ", flags); in main()
|
/mbedtls-latest/include/psa/ |
D | crypto_struct.h | 228 uint32_t flags; member 253 uint32_t flags; member
|