Home
last modified time | relevance | path

Searched refs:context (Results 1 – 25 of 34) sorted by relevance

12

/mbedtls-development/library/
A Dpsa_crypto_se.c69 psa_drv_se_context_t context; member
103 return( &driver->u.context ); in psa_get_se_driver_context()
114 *p_drv_context = ( driver ? &driver->u.context : NULL ); in psa_get_se_driver()
222 status = p_validate_slot_number( &driver->u.context, in psa_find_se_slot_for_key()
241 status = p_allocate( &driver->u.context, in psa_find_se_slot_for_key()
266 &driver->u.context, in psa_destroy_se_key()
285 &driver->u.context, in psa_init_all_se_drivers()
/mbedtls-development/tests/src/
A Dfake_external_rng_for_test.c42 mbedtls_psa_external_random_context_t *context, in mbedtls_psa_external_get_random() argument
45 (void) context; in mbedtls_psa_external_get_random()
/mbedtls-development/docs/architecture/
A Dalternative-implementations.md38 * Create a header file `xxx_alt.h` that defines the context type(s) used by the module. For example…
43 ### Constraints on context types
45context types to any C type except incomplete and array types (although they would normally be `st…
47 Where a context type needs to have a certain field, the field must have the same type and semantics…
54context object in memory (except during the execution of a library function that takes this contex…
64 In practice, this means that a pointer to a context or to a part of a context does not remain valid…
78 … you must use the same layout for context objects as the built-in implementation. If you want to u…
/mbedtls-development/tests/suites/
A Dtest_suite_psa_crypto_se_driver_hal.function131 psa_drv_se_context_t *context,
137 (void) context;
180 (void) context;
198 (void) context;
217 (void) context;
267 (void) context;
353 (void) context;
373 (void) context;
433 (void) context;
456 (void) context;
[all …]
A Dtest_suite_psa_crypto_se_driver_hal_mocks.function172 psa_status_t mock_export( psa_drv_se_context_t *context,
178 (void) context;
189 psa_status_t mock_export_public( psa_drv_se_context_t *context,
195 (void) context;
206 psa_status_t mock_sign( psa_drv_se_context_t *context,
215 (void) context;
229 psa_status_t mock_verify( psa_drv_se_context_t *context,
237 (void) context;
268 psa_status_t mock_destroy( psa_drv_se_context_t *context,
272 (void) context;
A Dtest_suite_pk.function186 /* test that freeing the context does not destroy the key */
763 /* init pk-rsa context */
871 * corresponding rsa context.
890 /* Initiliaze PK RSA context with random key */
895 /* Extract key to the raw rsa context */
898 /* Initialize PK RSA_ALT context */
968 * - generate a fresh ECP legacy PK context
969 * - wrap it in a PK context and make a signature this way
971 * - parse it to a PK context and verify the signature this way
976 /* Create legacy EC public/private key in PK context. */
[all …]
A Dtest_suite_entropy.function9 DUMMY_CONSTANT_LENGTH, /* Output context->length bytes */
30 entropy_dummy_context *context = arg;
31 ++context->calls;
33 switch( context->instruction )
36 *olen = context->length;
A Dtest_suite_cipher.function77 * it, and instead start with a fresh context.
503 /* Initialise context */
551 /* Initialise context */
736 /* Prepare context */
832 * Prepare context for decryption
902 /* prepare context for encryption */
982 /* Prepare context */
1020 /* Prepare context */
1082 /* build a fake context just for getting access to get_padding */
A Dtest_suite_chacha20.function53 /* Don't free/init the context nor set the key again,
A Dtest_suite_random.data23 # because CTR_DRBG crashes when given an unseeded context. This is arguably
A Dtest_suite_poly1305.function46 /* Don't free/init the context, in order to test that starts() does the
A Dtest_suite_ssl.function649 if( context == NULL || context->socket == NULL
650 || context->queue_output == NULL )
655 queue = context->queue_output;
656 socket = context->socket;
688 if( context == NULL || context->socket == NULL
689 || context->queue_input == NULL )
694 queue = context->queue_input;
695 socket = context->socket;
984 if( context != NULL )
986 mbedtls_message_socket_close( context );
[all …]
A Dtest_suite_dhm.function23 * DHM context by the caller). */
54 * against the context. */
A Dtest_suite_rsa.function989 /* Original MPI's with which we set up the RSA context */
1013 /* Setup RSA context */
1056 /* If we were providing enough information to setup a complete private context,
1112 /* Original MPI's with which we set up the RSA context */
1185 /* Setup RSA context */
1218 /* If we were providing enough information to setup a complete private context,
A Dtest_suite_net.function27 * \param ctx An initialized, but unopened socket context.
A Dtest_suite_nist_kw.function68 * 2. Check wrapping with two modes, on same context
A Dtest_suite_hmac_drbg.function206 /* Reset context for second run */
/mbedtls-development/docs/
A Duse-psa-crypto.md41 wrap a PSA keypair into a PK context. The key can be used for private-key
49 with a context set this way, while they would be available with a normal
50 `ECKEY` context: `mbedtls_pk_verify()`, `mbedtls_pk_check_pair()`,
53 Use in X.509 and TLS: opt-in. The application needs to construct the PK context
55 resulting context to the following existing APIs:
64 keypair as a PK context: `mbedtls_x509write_crt_set_subject_key()` and
89 There is a new API function `mbedtls_cipher_setup_psa()` to set up a context
100 possible to perform multiple one-shot operations with the same context;
A Dgetting_started.md267 /* Clean up cipher operation context */
351 /* Clean up cipher operation context */
431 /* Clean up hash operation context */
479 /* Clean up hash operation context */
545 You must first initialize and set up a key derivation context,
546 provided with a key and, optionally, other data. Then, use the key derivation context to either rea…
562 1. Set up the key derivation context using the `psa_key_derivation_setup()`
572 1. Clean up the key derivation context.
/mbedtls-development/tests/data_files/base64/
A Dsrv_def.txt1 // Server context with default MbedTLS configuration
A Dcli_def.txt1 // Client context with default MbedTLS configuration
/mbedtls-development/docs/proposed/
A Dpsa-driver-interface.md504 psa_status_t acme_init_random(acme_random_context_t *context);
507 …s this entry point once after allocating a random generation context. Initially, the context objec…
516 psa_status_t acme_add_entropy(acme_random_context_t *context,
560 psa_status_t acme_get_random(acme_random_context_t *context,
617 #### Size of a dynamically allocated key context
628 #### Size of a statically allocated key context
649 #### Key context size for a secure element with storage
655 #### Key context size for a secure element without storage
682 1. The core allocates memory for the key context.
709 1. The core saves the key context to persistent storage.
[all …]
/mbedtls-development/include/psa/
A Dcrypto_extra.h713 mbedtls_psa_external_random_context_t *context,
/mbedtls-development/tests/scripts/
A Dall.sh917 tests/context-info.sh
939 tests/context-info.sh
1060 tests/context-info.sh
2047 tests/context-info.sh
2062 tests/context-info.sh
2675 tests/context-info.sh --memcheck
/mbedtls-development/tests/
A DCMakeLists.txt254 link_to_source(context-info.sh)

Completed in 32 milliseconds

12