Home
last modified time | relevance | path

Searched refs:flags (Results 1 – 25 of 55) sorted by relevance

123

/mbedtls-latest/tests/suites/
Dtest_suite_psa_crypto_metadata.function72 /* Check that in the value of flags, the bit flag (which should be a macro
83 #define TEST_CLASSIFICATION_MACRO(cond, flag, alg, flags) \
88 if ((flags) & (flag)) \
119 static void algorithm_classification(psa_algorithm_t alg, unsigned flags)
122 TEST_CLASSIFICATION_MACRO(1, ALG_IS_VENDOR_DEFINED, alg, flags);
123 TEST_CLASSIFICATION_MACRO(1, ALG_IS_HMAC, alg, flags);
124 TEST_CLASSIFICATION_MACRO(1, ALG_IS_BLOCK_CIPHER_MAC, alg, flags);
125 TEST_CLASSIFICATION_MACRO(1, ALG_IS_STREAM_CIPHER, alg, flags);
126 TEST_CLASSIFICATION_MACRO(1, ALG_IS_RSA_PKCS1V15_SIGN, alg, flags);
127 TEST_CLASSIFICATION_MACRO(1, ALG_IS_RSA_PSS, alg, flags);
[all …]
Dtest_suite_x509parse.function66 static int verify_none(void *data, mbedtls_x509_crt *crt, int certificate_depth, uint32_t *flags)
71 *flags |= MBEDTLS_X509_BADCERT_OTHER;
76 static int verify_all(void *data, mbedtls_x509_crt *crt, int certificate_depth, uint32_t *flags)
81 *flags = 0;
148 static int verify_fatal(void *data, mbedtls_x509_crt *crt, int certificate_depth, uint32_t *flags)
157 *flags |= (1 << certificate_depth);
204 static int verify_print(void *data, mbedtls_x509_crt *crt, int certificate_depth, uint32_t *flags)
210 ((void) flags);
224 ret = mbedtls_snprintf(p, n, " - flags 0x%08x\n", *flags);
633 void x509_verify_info(int flags, char *prefix, char *result_str)
[all …]
Dtest_suite_psa_its.function90 uint32_t flags = flags_arg;
97 PSA_ASSERT(psa_its_set_wrap(uid, data->len, data->x, flags));
101 TEST_ASSERT(info.flags == flags);
130 TEST_ASSERT(info.flags == flags1);
137 TEST_ASSERT(info.flags == flags2);
Dtest_suite_psa_crypto_storage_format.function149 int flags)
186 if ((flags & TEST_FLAG_EXERCISE) && can_exercise(&actual_attributes)) {
194 if (flags & TEST_FLAG_READ_ONLY) {
270 data_t *representation, int flags)
300 uid, representation, flags));
Dtest_suite_x509parse.data1187 …larSSL, CN=Polarssl Test EC CA - flags 0x00000000\ndepth 0 - serial 09 - subject C=NL, O=PolarSSL,…
1191 …:AD\:83\:7D\:A8\:94\:B2 - subject CN=selfsigned, OU=testing, O=PolarSSL, C=NL - flags 0x00000000\n"
1195 …61\:05\:E3\:A3\:CD\:78 - subject C=UK, O=mbed TLS, OU=testsuite, CN=localhost - flags 0x00000001\n"
1199 …arSSL, CN=PolarSSL Test CA - flags 0x00000000\ndepth 0 - serial 01 - subject C=NL, O=PolarSSL, CN=…
1203 …larSSL, CN=Polarssl Test EC CA - flags 0x00000000\ndepth 0 - serial 1E - subject C=NL, O=PolarSSL,…
1207 …larSSL, CN=Polarssl Test EC CA - flags 0x00000001\ndepth 0 - serial 09 - subject C=NL, O=PolarSSL,…
1211 …arSSL, CN=PolarSSL Test CA - flags 0x00000000\ndepth 0 - serial 01 - subject C=NL, O=PolarSSL, CN=…
1215 …arSSL, CN=PolarSSL Test CA - flags 0x00000000\ndepth 0 - serial 01 - subject C=NL, O=PolarSSL, CN=…
1219 …arSSL, CN=PolarSSL Test CA - flags 0x00000000\ndepth 0 - serial 01 - subject C=NL, O=PolarSSL, CN=…
1223flags 0x00000000\ndepth 1 - serial 0E - subject C=NL, O=PolarSSL, CN=PolarSSL Test Intermediate CA…
[all …]
Dtest_suite_psa_crypto_generate_key.function21 // key lifetime, usage flags, algorithm are irrelevant for this test
Dtest_suite_psa_its.data10 Set/get/remove with flags
/mbedtls-latest/library/
Dx509_crt.c79 uint32_t flags; member
382 ver_chain->items[i].flags = (uint32_t) -1; in x509_crt_verify_chain_reset()
1903 uint32_t flags) in mbedtls_x509_crt_verify_info() argument
1911 if ((flags & cur->code) == 0) { in mbedtls_x509_crt_verify_info()
1917 flags ^= cur->code; in mbedtls_x509_crt_verify_info()
1920 if (flags != 0) { in mbedtls_x509_crt_verify_info()
2015 int flags = 0; in x509_crt_verifycrl() local
2025 return flags; in x509_crt_verifycrl()
2040 flags |= MBEDTLS_X509_BADCRL_NOT_TRUSTED; in x509_crt_verifycrl()
2048 flags |= MBEDTLS_X509_BADCRL_BAD_MD; in x509_crt_verifycrl()
[all …]
Dssl_debug_helpers.h54 unsigned int flags);
67 #define MBEDTLS_SSL_PRINT_TICKET_FLAGS(level, flags) \ argument
68 mbedtls_ssl_print_ticket_flags(ssl, level, __FILE__, __LINE__, flags)
78 #define MBEDTLS_SSL_PRINT_TICKET_FLAGS(level, flags) argument
Dpadlock.c29 static int flags = -1; in mbedtls_padlock_has_support() local
32 if (flags == -1) { in mbedtls_padlock_has_support()
48 flags = edx; in mbedtls_padlock_has_support()
51 return flags & feature; in mbedtls_padlock_has_support()
Dentropy_poll.c85 static int getrandom_wrapper(void *buf, size_t buflen, unsigned int flags) in getrandom_wrapper() argument
93 return (int) syscall(SYS_getrandom, buf, buflen, flags); in getrandom_wrapper()
105 static int getrandom_wrapper(void *buf, size_t buflen, unsigned int flags) in getrandom_wrapper() argument
107 return (int) getrandom(buf, buflen, flags); in getrandom_wrapper()
Dpsa_its_file.c59 uint8_t flags[sizeof(psa_storage_create_flags_t)]; member
102 p_info->flags = MBEDTLS_GET_UINT32_LE(header.flags, 0); in psa_its_read_file()
192 MBEDTLS_PUT_UINT32_LE(create_flags, header.flags, 0); in psa_its_set()
Dpk_ecc.c52 psa_key_usage_t flags; in mbedtls_pk_ecc_set_key() local
61 flags = PSA_KEY_USAGE_EXPORT; in mbedtls_pk_ecc_set_key()
65 flags = PSA_KEY_USAGE_SIGN_HASH | PSA_KEY_USAGE_SIGN_MESSAGE | in mbedtls_pk_ecc_set_key()
68 psa_set_key_usage_flags(&attributes, flags); in mbedtls_pk_ecc_set_key()
Dssl_misc.h1724 uint32_t *flags);
2922 mbedtls_ssl_session *session, unsigned int flags) in mbedtls_ssl_tls13_session_get_ticket_flags() argument
2925 (flags & MBEDTLS_SSL_TLS1_3_TICKET_FLAGS_MASK); in mbedtls_ssl_tls13_session_get_ticket_flags()
2935 mbedtls_ssl_session *session, unsigned int flags) in mbedtls_ssl_tls13_session_ticket_has_flags() argument
2937 return mbedtls_ssl_tls13_session_get_ticket_flags(session, flags) != 0; in mbedtls_ssl_tls13_session_ticket_has_flags()
2962 mbedtls_ssl_session *session, unsigned int flags) in mbedtls_ssl_tls13_session_set_ticket_flags() argument
2964 session->ticket_flags |= (flags & MBEDTLS_SSL_TLS1_3_TICKET_FLAGS_MASK); in mbedtls_ssl_tls13_session_set_ticket_flags()
2968 mbedtls_ssl_session *session, unsigned int flags) in mbedtls_ssl_tls13_session_clear_ticket_flags() argument
2970 session->ticket_flags &= ~(flags & MBEDTLS_SSL_TLS1_3_TICKET_FLAGS_MASK); in mbedtls_ssl_tls13_session_clear_ticket_flags()
Dssl_client.c220 int flags, in ssl_write_supported_groups_ext() argument
252 if (flags & SSL_WRITE_SUPPORTED_GROUPS_EXT_TLS1_3_FLAG) { in ssl_write_supported_groups_ext()
269 if ((flags & SSL_WRITE_SUPPORTED_GROUPS_EXT_TLS1_2_FLAG) && in ssl_write_supported_groups_ext()
Dpsa_crypto_its.h38 psa_storage_create_flags_t flags; /**< The flags set when the uid was created **/ member
/mbedtls-latest/programs/x509/
Dcert_app.c99 static int my_verify(void *data, mbedtls_x509_crt *crt, int depth, uint32_t *flags) in my_verify() argument
108 if ((*flags) == 0) { in my_verify()
111 mbedtls_x509_crt_verify_info(buf, sizeof(buf), " ! ", *flags); in my_verify()
131 uint32_t flags; in main() local
317 if ((ret = mbedtls_x509_crt_verify(&crt, &cacert, &cacrl, NULL, &flags, in main()
323 mbedtls_x509_crt_verify_info(vrfy_buf, sizeof(vrfy_buf), " ! ", flags); in main()
/mbedtls-latest/include/mbedtls/
Dx509_crt.h252 uint32_t MBEDTLS_PRIVATE(flags);
597 uint32_t flags);
673 const char *cn, uint32_t *flags,
715 const char *cn, uint32_t *flags,
749 const char *cn, uint32_t *flags,
815 const char *cn, uint32_t *flags,
Dcipher.h302 unsigned int MBEDTLS_PRIVATE(flags) : 2;
564 return info->MBEDTLS_PRIVATE(flags) & MBEDTLS_CIPHER_VARIABLE_KEY_LEN; in mbedtls_cipher_info_has_variable_key_bitlen()
583 return info->MBEDTLS_PRIVATE(flags) & MBEDTLS_CIPHER_VARIABLE_IV_LEN; in mbedtls_cipher_info_has_variable_iv_size()
/mbedtls-latest/programs/ssl/
Dssl_test_common_source.c323 uint32_t flags) in x509_crt_verify_info() argument
326 return mbedtls_x509_crt_verify_info(buf, size, prefix, flags); in x509_crt_verify_info()
334 if ((flags & err) != 0) \ in x509_crt_verify_info()
338 flags ^= err; \ in x509_crt_verify_info()
344 if (flags != 0) { in x509_crt_verify_info()
Dssl_client1.c60 uint32_t flags; in main() local
193 if ((flags = mbedtls_ssl_get_verify_result(&ssl)) != 0) { in main()
201 mbedtls_x509_crt_verify_info(vrfy_buf, sizeof(vrfy_buf), " ! ", flags); in main()
Ddtls_client.c73 uint32_t flags; in main() local
222 if ((flags = mbedtls_ssl_get_verify_result(&ssl)) != 0) { in main()
230 mbedtls_x509_crt_verify_info(vrfy_buf, sizeof(vrfy_buf), " ! ", flags); in main()
Dssl_mail_client.c152 uint32_t flags; in do_handshake() local
181 if ((flags = mbedtls_ssl_get_verify_result(ssl)) != 0) { in do_handshake()
189 mbedtls_x509_crt_verify_info(vrfy_buf, sizeof(vrfy_buf), " ! ", flags); in do_handshake()
Dssl_client2.c568 int depth, uint32_t *flags) in my_verify() argument
591 if ((*flags) == 0) { in my_verify()
594 x509_crt_verify_info(buf, sizeof(buf), " ! ", *flags); in my_verify()
836 uint32_t flags; in main() local
2240 flags = mbedtls_ssl_get_verify_result(&ssl); in main()
2242 x509_crt_verify_info(vrfy_buf, sizeof(vrfy_buf), " ! ", flags); in main()
2441 if ((flags = mbedtls_ssl_get_verify_result(&ssl)) != 0) { in main()
2446 " ! ", flags); in main()
/mbedtls-latest/include/psa/
Dcrypto_struct.h228 uint32_t flags; member
253 uint32_t flags; member

123