/mbedtls-development/library/ |
A D | psa_crypto_slot_management.c | 107 psa_key_slot_t *slot = NULL; in psa_get_and_lock_key_slot_in_memory() local 143 *p_slot = slot; in psa_get_and_lock_key_slot_in_memory() 165 slot->lock_count = 1; in psa_wipe_all_key_slots() 333 slot->key.data, slot->key.bytes, &key_buffer_length ); in psa_load_builtin_key_into_slot() 406 if( slot == NULL ) in psa_unlock_key_slot() 409 if( slot->lock_count > 0 ) in psa_unlock_key_slot() 411 slot->lock_count--; in psa_unlock_key_slot() 485 psa_key_slot_t *slot; in psa_open_key() local 511 psa_key_slot_t *slot; in psa_close_key() local 524 if( slot->lock_count <= 1 ) in psa_close_key() [all …]
|
A D | psa_crypto_core.h | 106 return( slot->attr.type != 0 ); in psa_is_key_slot_occupied() 119 return( slot->lock_count > 0 ); in psa_is_key_slot_locked() 133 return( slot->attr.flags & mask ); in psa_key_slot_get_flags() 142 static inline void psa_key_slot_set_flags( psa_key_slot_t *slot, in psa_key_slot_set_flags() argument 146 slot->attr.flags = ( ( ~mask & slot->attr.flags ) | in psa_key_slot_set_flags() 158 slot->attr.flags |= mask; in psa_key_slot_set_bits_in_flags() 169 slot->attr.flags &= ~mask; in psa_key_slot_clear_bits() 180 const psa_key_slot_t *slot ) in psa_key_slot_get_slot_number() argument 182 return( *( (psa_key_slot_number_t *)( slot->key.data ) ) ); in psa_key_slot_get_slot_number() 197 psa_status_t psa_wipe_key_slot( psa_key_slot_t *slot ); [all …]
|
A D | psa_crypto.c | 1013 memset( slot, 0, sizeof( *slot ) ); in psa_wipe_key_slot() 1333 slot->key.data, slot->key.bytes, in psa_export_key() 1439 &attributes, slot->key.data, slot->key.bytes, in psa_export_public_key() 2562 slot->key.data, slot->key.bytes, in psa_mac_compute_internal() 2710 &attributes, slot->key.data, slot->key.bytes, in psa_sign_internal() 2718 &attributes, slot->key.data, slot->key.bytes, in psa_sign_internal() 3561 &attributes, slot->key.data, slot->key.bytes, in psa_cipher_encrypt() 3610 &attributes, slot->key.data, slot->key.bytes, in psa_cipher_decrypt() 3704 &attributes, slot->key.data, slot->key.bytes, in psa_aead_encrypt() 3754 &attributes, slot->key.data, slot->key.bytes, in psa_aead_decrypt() [all …]
|
A D | psa_crypto_slot_management.h | 140 static inline psa_status_t psa_lock_key_slot( psa_key_slot_t *slot ) in psa_lock_key_slot() argument 142 if( slot->lock_count >= SIZE_MAX ) in psa_lock_key_slot() 145 slot->lock_count++; in psa_lock_key_slot() 166 psa_status_t psa_unlock_key_slot( psa_key_slot_t *slot );
|
A D | cipher_wrap.h | 133 psa_key_id_t slot; member
|
A D | psa_crypto_storage.h | 302 psa_key_slot_number_t slot; member
|
A D | cipher.c | 186 (void) psa_destroy_key( cipher_psa->slot ); in mbedtls_cipher_free() 321 &cipher_psa->slot ); in mbedtls_cipher_setkey() 1285 cipher_psa->slot, in mbedtls_cipher_crypt() 1291 cipher_psa->slot, in mbedtls_cipher_crypt() 1377 status = psa_aead_encrypt( cipher_psa->slot, in mbedtls_cipher_aead_encrypt() 1457 status = psa_aead_decrypt( cipher_psa->slot, in mbedtls_cipher_aead_decrypt()
|
A D | ssl_msg.c | 158 uint8_t slot ); 5598 uint8_t slot ) in ssl_buffering_free_slot() argument 5601 mbedtls_ssl_hs_buffer * const hs_buf = &hs->buffering.hs[slot]; in ssl_buffering_free_slot() 5603 if( slot >= MBEDTLS_SSL_MAX_BUFFERED_HS ) in ssl_buffering_free_slot()
|
/mbedtls-development/tests/suites/ |
A D | test_suite_psa_crypto_slot_management.data | 1 Transient slot, check after closing 4 Transient slot, check after closing and restarting 7 Transient slot, check after destroying 16 Persistent slot, check after closing, id=min 22 Persistent slot, check after destroying, id=min 28 Persistent slot, check after purging, id=min 37 Persistent slot, check after closing, id=max 40 Persistent slot, check after destroying, id=max 43 Persistent slot, check after purging, id=max 46 Persistent slot, check after restart, id=max [all …]
|
A D | test_suite_psa_crypto_se_driver_hal.data | 30 SE key import-export persistent (p_allocate allows 1 slot) 33 SE key import-export persistent, check after restart (slot 0) 36 SE key import-export persistent, check after restart (slot 3) 42 SE key import-export volatile (p_allocate allows 1 slot) 45 SE key import-export volatile, check after restart (slot 0) 48 SE key import-export volatile, check after restart (slot 3) 51 Key creation in a specific slot (0) 54 Key creation in a specific slot (max) 57 Key creation in a specific slot (0, restart) 60 Key creation in a specific slot (max, restart) [all …]
|
A D | test_suite_psa_crypto_attributes.function | 97 /* Initially, there is no slot number. */ 101 /* Test setting a slot number. */ 106 /* Test changing the slot number. */ 111 /* Test clearing the slot number. */ 121 /* Test that reset clears the slot number. */
|
A D | test_suite_psa_crypto_init.data | 16 No key slot access without init 22 No key slot access after deinit
|
A D | test_suite_psa_crypto_se_driver_hal.function | 129 /* Validate a choice of slot number as directed. */ 147 /* Allocate slot numbers with a monotonic counter. */ 451 ram_slot_t *slot; 458 slot = &ram_slots[slot_number]; 462 psa_set_key_type( &attributes, slot->type ); 464 slot->content, 484 ram_slot_t *slot; 491 slot = &ram_slots[slot_number]; 495 psa_set_key_type( &attributes, slot->type ); 497 slot->content, [all …]
|
A D | test_suite_psa_crypto_slot_management.function | 385 /* Attempt to create a new key in the same slot. */ 519 /* Populate the source slot. */ 534 /* Prepare the target slot. */ 558 /* Test that the target slot has the expected content. */ 650 /* Populate the source slot. */ 663 /* Populate the target slot. */ 690 /* Test that the target slot is unaffected. */ 922 * slots when creating the last key is restored in a RAM slot to export 994 * persistent key description in a slot to be able to access it. 1019 * by the persistent key and the volatile keys and the slot containing the
|
A D | test_suite_psa_crypto_attributes.data | 26 PSA key attributes: slot number
|
A D | test_suite_psa_crypto_persistent_key.function | 175 /* Check key slot storage is removed */ 182 /* Create another key in the same slot */
|
A D | test_suite_psa_crypto.function | 251 /* Assert that a key isn't reported as having a slot number. */ 1676 /* Test that the target slot has the expected content and policy. */ 6956 /* Check key slot still contains key data */
|
/mbedtls-development/programs/ssl/ |
A D | ssl_server2.c | 848 psa_key_id_t slot; member 864 psa_key_id_t const slot = head->slot; in psk_free() local 866 if( slot != 0 ) in psk_free() 868 status = psa_destroy_key( slot ); in psk_free() 939 if( cur->slot != 0 ) in psk_callback() 1044 unsigned slot; member 1061 unsigned slot; in ssl_async_start() local 1076 for( slot = 0; slot < config_data->slots_used; slot++ ) in ssl_async_start() 1083 if( slot == config_data->slots_used ) in ssl_async_start() 1090 op_name, slot, config_data->slots[slot].delay ); in ssl_async_start() [all …]
|
A D | ssl_client2.c | 692 psa_key_id_t slot = 0; in main() local 1910 status = psa_import_key( &key_attributes, psk, psk_len, &slot ); in main() 1917 if( ( ret = mbedtls_ssl_conf_psk_opaque( &conf, slot, in main() 3035 status = psa_destroy_key( slot ); in main() 3040 (unsigned) slot, (int) status ); in main()
|
/mbedtls-development/docs/architecture/ |
A D | mbed-crypto-storage-specification.md | 26 * [Persistent transparent keys](#key-file-format-for-0.1.0) designated by a [slot number](#key-name… 206 …ferences to keys in a secure element. In such key files, the key material contains the slot number. 255 * For an opaque key (key in a secure element): slot number (8 bytes), in platform endianness. 271 * slot number (8 bytes): `psa_key_slot_number_t` value. This is the unique designation of the key f… 277 * The slot in the secure element designated by the slot number. 281 * The slot in the secure element designated by the slot number. 315 * For an opaque key (key in a secure element): slot number (8 bytes), in platform endianness.
|
A D | psa-crypto-implementation-structure.md | 62 …2. Call psa_start_key_creation() that allocates a key slot, prepares it with the specified key att… 63 …3. Generate or copy the key material into the key slot. This entails the allocation of the buffer … 66 …t step 3 or 4, psa_fail_key_creation() is called. It wipes and cleans the slot especially the key …
|
/mbedtls-development/docs/ |
A D | getting_started.md | 546 …vation context to either read derived data to a buffer or send derived data directly to a key slot. 559 **To derive a new AES-CTR 128-bit encryption key into a given key slot using HKDF 574 At this point, the derived key slot holds a new 128-bit AES-CTR encryption key
|
/mbedtls-development/docs/proposed/ |
A D | psa-driver-interface.md | 597 …idual keys. The representation of a key is an identifier such as label or slot number. The core st… 692 …ains an internal identifier for the key. This may be, for example, a unique label or a slot number. 724 …slot numbers which is stored either in the secure element or in the driver's persistent storage. T… 725 …e secure element or in the driver's persistent storage. To allocate a key slot, increment the coun… 804 …slot number**. Drivers that support built-in keys must provide a `"get_builtin_key"` entry point t…
|
/mbedtls-development/docs/architecture/testing/ |
A D | driver-interface-test-strategy.md | 69 * Check the consequence of errors detected at each stage (slot number allocation or validation, key…
|