/mbedtls-development/library/ |
A D | psa_crypto_se.c | 69 psa_drv_se_context_t context; member 103 return( &driver->u.context ); in psa_get_se_driver_context() 114 *p_drv_context = ( driver ? &driver->u.context : NULL ); in psa_get_se_driver() 222 status = p_validate_slot_number( &driver->u.context, in psa_find_se_slot_for_key() 241 status = p_allocate( &driver->u.context, in psa_find_se_slot_for_key() 266 &driver->u.context, in psa_destroy_se_key() 285 &driver->u.context, in psa_init_all_se_drivers()
|
/mbedtls-development/tests/src/ |
A D | fake_external_rng_for_test.c | 42 mbedtls_psa_external_random_context_t *context, in mbedtls_psa_external_get_random() argument 45 (void) context; in mbedtls_psa_external_get_random()
|
/mbedtls-development/docs/architecture/ |
A D | alternative-implementations.md | 38 * Create a header file `xxx_alt.h` that defines the context type(s) used by the module. For example… 43 ### Constraints on context types 45 …context types to any C type except incomplete and array types (although they would normally be `st… 47 Where a context type needs to have a certain field, the field must have the same type and semantics… 54 …context object in memory (except during the execution of a library function that takes this contex… 64 In practice, this means that a pointer to a context or to a part of a context does not remain valid… 78 … you must use the same layout for context objects as the built-in implementation. If you want to u…
|
/mbedtls-development/tests/suites/ |
A D | test_suite_psa_crypto_se_driver_hal.function | 131 psa_drv_se_context_t *context, 137 (void) context; 180 (void) context; 198 (void) context; 217 (void) context; 267 (void) context; 353 (void) context; 373 (void) context; 433 (void) context; 456 (void) context; [all …]
|
A D | test_suite_psa_crypto_se_driver_hal_mocks.function | 172 psa_status_t mock_export( psa_drv_se_context_t *context, 178 (void) context; 189 psa_status_t mock_export_public( psa_drv_se_context_t *context, 195 (void) context; 206 psa_status_t mock_sign( psa_drv_se_context_t *context, 215 (void) context; 229 psa_status_t mock_verify( psa_drv_se_context_t *context, 237 (void) context; 268 psa_status_t mock_destroy( psa_drv_se_context_t *context, 272 (void) context;
|
A D | test_suite_pk.function | 186 /* test that freeing the context does not destroy the key */ 763 /* init pk-rsa context */ 871 * corresponding rsa context. 890 /* Initiliaze PK RSA context with random key */ 895 /* Extract key to the raw rsa context */ 898 /* Initialize PK RSA_ALT context */ 968 * - generate a fresh ECP legacy PK context 969 * - wrap it in a PK context and make a signature this way 971 * - parse it to a PK context and verify the signature this way 976 /* Create legacy EC public/private key in PK context. */ [all …]
|
A D | test_suite_entropy.function | 9 DUMMY_CONSTANT_LENGTH, /* Output context->length bytes */ 30 entropy_dummy_context *context = arg; 31 ++context->calls; 33 switch( context->instruction ) 36 *olen = context->length;
|
A D | test_suite_cipher.function | 77 * it, and instead start with a fresh context. 503 /* Initialise context */ 551 /* Initialise context */ 736 /* Prepare context */ 832 * Prepare context for decryption 902 /* prepare context for encryption */ 982 /* Prepare context */ 1020 /* Prepare context */ 1082 /* build a fake context just for getting access to get_padding */
|
A D | test_suite_chacha20.function | 53 /* Don't free/init the context nor set the key again,
|
A D | test_suite_random.data | 23 # because CTR_DRBG crashes when given an unseeded context. This is arguably
|
A D | test_suite_poly1305.function | 46 /* Don't free/init the context, in order to test that starts() does the
|
A D | test_suite_ssl.function | 649 if( context == NULL || context->socket == NULL 650 || context->queue_output == NULL ) 655 queue = context->queue_output; 656 socket = context->socket; 688 if( context == NULL || context->socket == NULL 689 || context->queue_input == NULL ) 694 queue = context->queue_input; 695 socket = context->socket; 984 if( context != NULL ) 986 mbedtls_message_socket_close( context ); [all …]
|
A D | test_suite_dhm.function | 23 * DHM context by the caller). */ 54 * against the context. */
|
A D | test_suite_rsa.function | 989 /* Original MPI's with which we set up the RSA context */ 1013 /* Setup RSA context */ 1056 /* If we were providing enough information to setup a complete private context, 1112 /* Original MPI's with which we set up the RSA context */ 1185 /* Setup RSA context */ 1218 /* If we were providing enough information to setup a complete private context,
|
A D | test_suite_net.function | 27 * \param ctx An initialized, but unopened socket context.
|
A D | test_suite_nist_kw.function | 68 * 2. Check wrapping with two modes, on same context
|
A D | test_suite_hmac_drbg.function | 206 /* Reset context for second run */
|
/mbedtls-development/docs/ |
A D | use-psa-crypto.md | 41 wrap a PSA keypair into a PK context. The key can be used for private-key 49 with a context set this way, while they would be available with a normal 50 `ECKEY` context: `mbedtls_pk_verify()`, `mbedtls_pk_check_pair()`, 53 Use in X.509 and TLS: opt-in. The application needs to construct the PK context 55 resulting context to the following existing APIs: 64 keypair as a PK context: `mbedtls_x509write_crt_set_subject_key()` and 89 There is a new API function `mbedtls_cipher_setup_psa()` to set up a context 100 possible to perform multiple one-shot operations with the same context;
|
A D | getting_started.md | 267 /* Clean up cipher operation context */ 351 /* Clean up cipher operation context */ 431 /* Clean up hash operation context */ 479 /* Clean up hash operation context */ 545 You must first initialize and set up a key derivation context, 546 provided with a key and, optionally, other data. Then, use the key derivation context to either rea… 562 1. Set up the key derivation context using the `psa_key_derivation_setup()` 572 1. Clean up the key derivation context.
|
/mbedtls-development/tests/data_files/base64/ |
A D | srv_def.txt | 1 // Server context with default MbedTLS configuration
|
A D | cli_def.txt | 1 // Client context with default MbedTLS configuration
|
/mbedtls-development/docs/proposed/ |
A D | psa-driver-interface.md | 504 psa_status_t acme_init_random(acme_random_context_t *context); 507 …s this entry point once after allocating a random generation context. Initially, the context objec… 516 psa_status_t acme_add_entropy(acme_random_context_t *context, 560 psa_status_t acme_get_random(acme_random_context_t *context, 617 #### Size of a dynamically allocated key context 628 #### Size of a statically allocated key context 649 #### Key context size for a secure element with storage 655 #### Key context size for a secure element without storage 682 1. The core allocates memory for the key context. 709 1. The core saves the key context to persistent storage. [all …]
|
/mbedtls-development/include/psa/ |
A D | crypto_extra.h | 713 mbedtls_psa_external_random_context_t *context,
|
/mbedtls-development/tests/scripts/ |
A D | all.sh | 917 tests/context-info.sh 939 tests/context-info.sh 1060 tests/context-info.sh 2047 tests/context-info.sh 2062 tests/context-info.sh 2675 tests/context-info.sh --memcheck
|
/mbedtls-development/tests/ |
A D | CMakeLists.txt | 254 link_to_source(context-info.sh)
|