Home
last modified time | relevance | path

Searched refs:ok (Results 1 – 21 of 21) sorted by relevance

/mbedtls-latest/tests/src/
Dpsa_exercise_key.c44 int ok = 0; in check_key_attributes_sanity() local
108 ok = 1; in check_key_attributes_sanity()
117 return ok; in check_key_attributes_sanity()
752 int ok = 0; in exercise_raw_key_agreement_key() local
760 ok = 1; in exercise_raw_key_agreement_key()
763 return ok; in exercise_raw_key_agreement_key()
774 int ok = 0; in exercise_key_agreement_key() local
803 ok = 1; in exercise_key_agreement_key()
837 ok = 1; in exercise_key_agreement_key()
840 return ok; in exercise_key_agreement_key()
[all …]
/mbedtls-latest/tests/suites/
Dtest_suite_psa_crypto_storage_format.function28 int ok = 0;
45 ok = 1;
49 return ok;
106 * a hash operation are ok. So randomized ECDSA signature is fine,
154 int ok = 0;
205 ok = 1;
211 return ok;
Dtest_suite_dhm.function9 int ok = 0;
14 ok = 1;
18 return ok;
31 int ok = 0;
47 ok = 1;
50 return ok;
Dtest_suite_ecdh.function7 int ok = 0;
15 ok = 1;
17 return ok;
24 int ok = 0;
34 ok = 1;
36 return ok;
Dtest_suite_pkparse.function47 int ok = 0;
59 ok = 1;
76 ok = 1;
81 return ok;
Dtest_suite_psa_crypto_se_driver_hal.function542 int ok = 0;
586 ok = 1;
595 return ok;
618 int ok = 0;
624 ok = 1;
628 return ok;
636 int ok = 0;
639 ok = 1;
642 return ok;
676 int ok = 0;
[all …]
Dtest_suite_pk.data1397 PSA import into PSA: opaque RSA, COPY (ok)
1401 PSA import into PSA: opaque RSA, EXPORT (ok)
1423 PSA import into PSA: opaque RSA, EXPORT, different usage (ok)
1427 PSA import into PSA: opaque RSA, COPY|EXPORT, different algorithm (ok)
1435 PSA import into PSA: opaque RSA, EXPORT, different algorithm (ok)
1439 PSA import into PSA: opaque RSA, implicit bits (ok)
1451 PSA import into PSA: opaque RSA to public (ok)
1455 PSA import into PSA: opaque RSA to public, implicit bits (ok)
1466 PSA import into PSA: opaque ECC, COPY (ok)
1470 PSA import into PSA: opaque ECC, EXPORT (ok)
[all …]
Dtest_suite_gcm.function17 int ok = 0;
59 ok = 1;
62 return ok;
Dtest_suite_asn1write.function32 int ok = 0;
43 ok = 1;
46 return ok;
Dtest_suite_ccm.function17 int ok = 0;
57 ok = 1;
60 return ok;
Dtest_suite_psa_crypto_driver_wrappers.function442 int ok = 0;
473 ok = 1;
482 return ok;
497 * It's ok to expand this range, but not to shrink it. That is, you
Dtest_suite_pk.function399 int ok = 0;
463 ok = 1;
466 return ok;
Dtest_suite_psa_crypto.function227 int ok = 0;
251 ok = 1;
260 return ok;
1248 int ok = 0;
1285 ok = 1;
1289 return ok;
Dtest_suite_psa_crypto.data731 PSA import AES: bits=0 ok
735 PSA import AES: bits=128 ok
743 PSA import AES: bits=256 ok
751 PSA import large key: raw, 65528 bits (ok)
6323 PSA key derivation: TLS 1.2 Mix-PSK-to-MS, output key ok #1
6328 PSA key derivation: TLS 1.2 Mix-PSK-to-MS, output key ok #2
7422 PSA generate key: raw data, 65528 bits (large key, ok if it fits)
7665 PSA concurrent key generation: raw data, 65528 bits (large key, ok if it fits)
Dtest_suite_ssl.function1459 /* It's ok if the output buffer is too small. We do insist
/mbedtls-latest/tests/scripts/
Dtcp_client.pl63 my $ok = $connection->recv($actual_data, length($expected_data));
64 if (!defined $ok) {
/mbedtls-latest/
D.pylintrc6 # We're ok with short funtion argument names.
32 # We're ok with short local or global variable names.
/mbedtls-latest/docs/architecture/
Dpsa-shared-memory.md107 …tances. It is ok to write data that is independent of the inputs (and not otherwise confidential),…
138 It is ok to skip the copy if it is known for sure that a buffer is not in shared memory. However, t…
/mbedtls-latest/docs/architecture/testing/
Dinvasive-testing.md34 In unit tests and in test programs, it's ok to include internal header files from `library/`. Do no…
/mbedtls-latest/docs/proposed/
Dpsa-driver-interface.md1345 It should be ok for driver functions to be function-like macros or function pointers.
1414 The driver is allowed to update the state at any time. Is this ok?
1418 … driver it's calling. This may require a thread-local variable in a multithreaded core. Is this ok?
1424 …rived, which practically dictates how the pseudorandom key stream is consumed. So it's probably ok.
/mbedtls-latest/docs/architecture/psa-migration/
Dpsa-legacy-bridges.md168 …. This is good enough in some scenarios, but not others. For example, it's ok for pkwrite, because…