Home
last modified time | relevance | path

Searched refs:int (Results 1 – 25 of 113) sorted by relevance

12345

/mbedtls-latest/tests/suites/
Dtest_suite_x509parse.function66 static int verify_none(void *data, mbedtls_x509_crt *crt, int certificate_depth, uint32_t *flags)
76 static int verify_all(void *data, mbedtls_x509_crt *crt, int certificate_depth, uint32_t *flags)
88 static int ca_callback_fail(void *data, mbedtls_x509_crt const *child,
98 static int ca_callback(void *data, mbedtls_x509_crt const *child,
101 int ret = 0;
148 static int verify_fatal(void *data, mbedtls_x509_crt *crt, int certificate_depth, uint32_t *flags)
150 int *levels = (int *) data;
204 static int verify_print(void *data, mbedtls_x509_crt *crt, int certificate_depth, uint32_t *flags)
206 int ret;
232 static int verify_parse_san(mbedtls_x509_subject_alternative_name *san,
[all …]
Dtest_suite_psa_crypto_persistent_key.function47 int key_lifetime, int key_type, int key_bits,
48 int key_usage, int key_alg, int key_alg2)
78 int expected_key_lifetime,
79 int expected_key_type,
80 int expected_key_bits,
81 int expected_key_usage,
82 int expected_key_alg,
83 int expected_key_alg2,
84 int expected_status)
121 void save_large_persistent_key(int data_length_arg, int expected_status)
[all …]
Dtest_suite_asn1parse.function19 static int nested_parse(unsigned char **const p,
22 int ret;
51 int val = -257;
73 /* If we're sure that the number fits in an int, also
75 if (ret == 0 && len < sizeof(int)) {
76 int val = -257;
125 static int get_len_step(const data_t *input, size_t buffer_size,
132 int ret;
182 static int traverse_callback(void *ctx, int tag,
227 int full_result,
[all …]
Dtest_suite_pkcs12.function18 void pkcs12_derive_key(int md_type, int key_size_arg,
19 data_t *password_arg, int password_usage,
20 data_t *salt_arg, int salt_usage,
21 int iterations,
22 data_t *expected_output, int expected_status)
49 int ret = mbedtls_pkcs12_derivation(output_data,
73 void pkcs12_pbe_encrypt(int params_tag, int cipher, int md, data_t *params_hex, data_t *pw,
74 data_t *data, int outsize, int ref_ret, data_t *ref_out)
76 int my_ret;
128 void pkcs12_pbe_decrypt(int params_tag, int cipher, int md, data_t *params_hex, data_t *pw,
[all …]
Dtest_suite_psa_crypto_op_fail.function6 static int test_equal_status(const char *test,
7 int line_no, const char *filename,
45 void hash_fail(int alg_arg, int expected_status_arg)
72 void mac_fail(int key_type_arg, data_t *key_data,
73 int alg_arg, int expected_status_arg)
118 void cipher_fail(int key_type_arg, data_t *key_data,
119 int alg_arg, int expected_status_arg)
164 void aead_fail(int key_type_arg, data_t *key_data,
165 int alg_arg, int expected_status_arg)
212 void sign_fail(int key_type_arg, data_t *key_data,
[all …]
Dtest_suite_psa_crypto_attributes.function11 void attributes_set_get(int owner_id_arg, int id_arg, int lifetime_arg,
12 int usage_flags_arg, int alg_arg,
13 int type_arg, int bits_arg)
63 void persistence_attributes(int id1_arg, int owner_id1_arg, int lifetime_arg,
64 int id2_arg, int owner_id2_arg,
65 int expected_id_arg, int expected_owner_id_arg,
66 int expected_lifetime_arg)
Dtest_suite_constant_time.function95 void mbedtls_ct_uchar_in_range_if(int li, int hi, int ti)
118 void mbedtls_ct_error_if(int cond, int t, int f)
122 int expected = c ? t : f;
123 int expected0 = c ? t : 0;
175 void mbedtls_ct_zeroize_if(char *c_str, int len)
209 int result = mbedtls_ct_memcmp(a, b, size);
243 void mbedtls_ct_memcmp(int same, int size, int offset)
253 for (int i = 0; i < size + offset; i++) {
262 int reference = memcmp(a + offset, b + offset, size);
267 int actual = mbedtls_ct_memcmp(a + offset, b + offset, size);
[all …]
Dtest_suite_cipher.function15 static int check_cipher_info(mbedtls_cipher_type_t type,
98 static int cipher_reset_key(mbedtls_cipher_context_t *ctx, int cipher_id,
99 int use_psa, size_t tag_len, const data_t *key, int direction)
132 static int buffer_is_all_zero(const uint8_t *buf, size_t size)
153 const int *cipher_type;
174 int valid_size = sizeof(valid_buffer);
175 int valid_bitlen = valid_size * 8;
176 const int *cipher_list = mbedtls_cipher_list();
300 int valid_size = sizeof(valid_buffer);
301 int valid_bitlen = valid_size * 8;
[all …]
Dtest_suite_pkcs1_v21.function11 void pkcs1_rsaes_oaep_encrypt(int mod, data_t *input_N, data_t *input_E,
12 int hash, data_t *message_str, data_t *rnd_buf,
13 data_t *result_str, int result)
62 void pkcs1_rsaes_oaep_decrypt(int mod, data_t *input_P, data_t *input_Q,
63 data_t *input_N, data_t *input_E, int hash,
65 int result)
126 void pkcs1_rsassa_pss_sign(int mod, data_t *input_P, data_t *input_Q,
127 data_t *input_N, data_t *input_E, int digest,
128 int hash, data_t *hash_digest, data_t *rnd_buf,
129 data_t *result_str, int fixed_salt_length,
[all …]
Dtest_suite_rsa.function16 const int invalid_padding = 42;
17 const int invalid_hash_id = 0xff;
137 void rsa_init_free(int reinit)
161 void mbedtls_rsa_pkcs1_sign(data_t *message_str, int padding_mode,
162 int digest, int mod, char *input_P,
164 data_t *result_str, int result)
209 void mbedtls_rsa_pkcs1_verify(data_t *message_str, int padding_mode,
210 int digest, int mod,
212 data_t *result_str, int result)
241 int padding_mode, int mod,
[all …]
Dtest_suite_bignum.function16 static int sign_is_valid(const mbedtls_mpi *X)
49 static int mbedtls_test_mpi_miller_rabin_determinizer(void *state,
81 static int f_rng_bytes_left(void *state, unsigned char *buf, size_t len)
122 void mpi_read_write_string(int radix_X, char *input_X, int radix_A,
123 char *input_A, int output_size, int result_read,
124 int result_write)
211 int output_size, int result)
242 int output_size, int result)
272 void mpi_read_file(char *input_file, data_t *input_A, int result)
278 int ret;
[all …]
Dtest_suite_ccm.function7 static int check_multipart(mbedtls_ccm_context *ctx,
8 int mode,
17 int ok = 0;
79 void mbedtls_ccm_setkey(int cipher_id, int key_size, int result)
83 int ret;
101 void ccm_lengths(int msg_len, int iv_len, int add_len, int tag_len, int res)
110 int decrypt_ret;
145 void ccm_star_lengths(int msg_len, int iv_len, int add_len, int tag_len,
146 int res)
155 int decrypt_ret;
[all …]
Dtest_suite_cmac.function102 void mbedtls_cmac_setkey(int cipher_type, int key_size, int result)
128 void mbedtls_cmac_multiple_blocks(int cipher_type, data_t *key,
129 int keybits, int block_size,
130 data_t *block1, int block1_len,
131 data_t *block2, int block2_len,
132 data_t *block3, int block3_len,
133 data_t *block4, int block4_len,
196 void mbedtls_cmac_multiple_operations_same_key(int cipher_type,
197 data_t *key, int keybits,
198 int block_size,
[all …]
Dtest_suite_psa_crypto_driver_wrappers.function7 int pake_in_driver = 0;
16 static void ecjpake_do_round(psa_algorithm_t alg, unsigned int primitive,
19 int client_input_first,
20 int round)
428 static int sanity_check_rsa_encryption_result(
442 int ok = 0;
508 void sign_hash(int key_type_arg,
509 int alg_arg,
510 int force_status_arg,
514 int fake_output,
[all …]
Dtest_suite_nist_kw.function125 void mbedtls_nist_kw_setkey(int cipher_id, int key_size,
126 int is_wrap, int result)
130 int ret;
146 void nist_kw_plaintext_lengths(int in_len, int out_len, int mode, int res)
193 void nist_kw_ciphertext_lengths(int in_len, int out_len, int mode, int res)
199 int unwrap_ret;
237 void mbedtls_nist_kw_wrap(int cipher_id, int mode, data_t *key, data_t *msg,
271 void mbedtls_nist_kw_unwrap(int cipher_id, int mode, data_t *key, data_t *msg,
272 data_t *expected_result, int expected_ret)
Dtest_suite_hkdf.function12 void test_hkdf(int md_alg, data_t *ikm, data_t *salt, data_t *info,
15 int ret;
38 void test_hkdf_extract(int md_alg,
43 int ret;
68 void test_hkdf_expand(int md_alg,
74 int ret;
100 void test_hkdf_extract_ret(int hash_len, int ret)
102 int output_ret;
127 void test_hkdf_expand_ret(int hash_len, int prk_len, int okm_len, int ret)
129 int output_ret;
Dtest_suite_pk.function190 static int get_predefined_key_data(int is_ec, int group_id_or_keybits,
257 static int pk_setup(mbedtls_pk_context *pk, mbedtls_pk_type_t pk_type, int curve_or_keybits)
263 int ret = MBEDTLS_ERR_PK_BAD_INPUT_DATA;
396 static int pk_public_same(const mbedtls_pk_context *pk1,
399 int ok = 0;
416 int len1 = mbedtls_rsa_write_pubkey(rsa1, buf1, &p1);
420 int len2 = mbedtls_rsa_write_pubkey(rsa2, buf2, &p2);
471 static int mbedtls_rsa_decrypt_func(void *ctx, size_t *olen,
479 static int mbedtls_rsa_sign_func(void *ctx,
480 int (*f_rng)(void *, unsigned char *, size_t), void *p_rng,
[all …]
Dtest_suite_psa_crypto_metadata.function109 static int has_even_parity(uint32_t value)
195 static void mac_algorithm_core(psa_algorithm_t alg, int classification_flags,
221 static void aead_algorithm_core(psa_algorithm_t alg, int classification_flags,
251 void hash_algorithm(int alg_arg, int length_arg)
295 void mac_algorithm(int alg_arg, int classification_flags,
296 int length_arg,
297 int key_type_arg, int key_bits_arg)
375 void hmac_algorithm(int alg_arg,
376 int length_arg,
377 int block_size_arg)
[all …]
Dtest_suite_psa_crypto.function56 static int mem_is_char(void *buffer, unsigned char c, size_t size)
68 static int asn1_write_10x(unsigned char **p,
73 int ret;
74 int len = bits / 8 + 1;
97 static int construct_fake_rsa_key(unsigned char *buffer,
101 int keypair)
104 int ret;
105 int len = 0;
156 static int exercise_mac_setup(psa_key_type_t key_type,
188 static int exercise_cipher_setup(psa_key_type_t key_type,
[all …]
Dtest_suite_psa_crypto_init.function11 static int check_stats(void)
55 static int fake_entropy_source(void *state_arg,
136 int do_init;
156 int can_do = psa_can_do_hash(PSA_ALG_NONE);
202 void init_deinit(int count)
205 int i;
228 void deinit_without_init(int count)
230 int i;
240 void psa_threaded_init(int arg_thread_count)
301 void validate_module_init_generate_random(int count)
[all …]
Dtest_suite_ecdh.function4 static int load_public_key(int grp_id, data_t *point,
7 int ok = 0;
20 static int load_private_key(int grp_id, data_t *private_key,
24 int ok = 0;
51 int invalid_side = 42;
66 void ecdh_primitive_random(int id)
105 void ecdh_primitive_testvec(int id, data_t *rnd_buf_A, char *xA_str,
196 void ecdh_exchange(int id)
240 void ecdh_restart(int id, data_t *dA, data_t *dB, data_t *z,
241 int enable, int max_ops, int min_restart, int max_restart)
[all …]
Dtest_suite_ecp.function19 inline static int mbedtls_ecp_group_cmp(mbedtls_ecp_group *grp1,
83 int invalid_fmt = 42;
108 void mbedtls_ecp_curve_info(int id, int tls_id, int size, char *name)
129 void ecp_check_pub(int grp_id, char *x_hex, char *y_hex, char *z_hex,
130 int ret)
153 void ecp_test_vect_restart(int id,
156 int max_ops, int min_restarts, int max_restarts)
180 int cnt_restarts;
181 int ret;
252 void ecp_muladd_restart(int id, char *xR_str, char *yR_str,
[all …]
Dtest_suite_gcm.function7 static int check_multipart(mbedtls_gcm_context *ctx,
8 int mode,
17 int ok = 0;
66 int mode,
108 int mode,
138 int mode,
158 int starts_ret)
160 int mode = MBEDTLS_GCM_ENCRYPT;
179 void gcm_bad_parameters(int cipher_id, int direction,
182 int tag_len_bits, int gcm_result)
[all …]
Dtest_suite_psa_crypto_storage_format.function19 static int test_written_key(const psa_key_attributes_t *attributes,
28 int ok = 0;
53 static int can_export(const psa_key_attributes_t *attributes)
65 static int is_accelerated_rsa(psa_algorithm_t alg)
89 static int can_exercise(const psa_key_attributes_t *attributes)
145 static int test_read_key(const psa_key_attributes_t *expected_attributes,
149 int flags)
154 int ok = 0;
222 void key_storage_save(int lifetime_arg, int type_arg, int bits_arg,
223 int usage_arg, int alg_arg, int alg2_arg,
[all …]
Dtest_suite_oid.function17 int ret;
38 int ret;
56 void oid_get_x509_extension(data_t *oid, int exp_type)
59 int ret;
60 int ext_type;
77 void oid_get_md_alg_id(data_t *oid, int exp_md_id)
80 int ret;
100 void mbedtls_oid_get_md_hmac(data_t *oid, int exp_md_id)
103 int ret;
123 void oid_get_numeric_string(data_t *oid, int error_ret, char *result_str)
[all …]

12345