Home
last modified time | relevance | path

Searched refs:context (Results 1 – 25 of 53) sorted by relevance

123

/mbedtls/tests/data_files/
A Dtls13_early_data.txt1 EarlyData context: line 0 lf
2 EarlyData context: line 1 lf
3 EarlyData context: line 2 lf
4 EarlyData context: If it appears, that means early_data received.
/mbedtls/library/
A Dpsa_crypto_se.c49 psa_drv_se_context_t context; member
84 return &driver->u.context; in psa_get_se_driver_context()
96 *p_drv_context = (driver ? &driver->u.context : NULL); in psa_get_se_driver()
210 status = p_validate_slot_number(&driver->u.context, in psa_find_se_slot_for_key()
226 status = p_allocate(&driver->u.context, in psa_find_se_slot_for_key()
252 &driver->u.context, in psa_destroy_se_key()
270 &driver->u.context, in psa_init_all_se_drivers()
/mbedtls/docs/architecture/
A Dalternative-implementations.md38 * Create a header file `xxx_alt.h` that defines the context type(s) used by the module. For example…
43 ### Constraints on context types
45context types to any C type except incomplete and array types (although they would normally be `st…
47 Where a context type needs to have a certain field, the field must have the same type and semantics…
54context object in memory (except during the execution of a library function that takes this contex…
64 In practice, this means that a pointer to a context or to a part of a context does not remain valid…
78 … you must use the same layout for context objects as the built-in implementation. If you want to u…
A Dtls13-support.md379 fields of the SSL context or based on the reading of the type of the next
383 reading to not modify the SSL context as this stage may be repeated if the
393 * pre-processing stage: prepare the SSL context for the message parsing. This
400 update of the SSL context. The idea of the pre-processing/parsing/post-processing
405 context to prepare for the next incoming and outgoing messages. This stage is
417 optional. The check is based on the value of some fields of the SSL context.
424 of the SSL context. The idea of the preparation/writing/finalization
429 context to prepare for the next incoming and outgoing messages. This stage is
/mbedtls/tests/suites/
A Dtest_suite_psa_crypto_se_driver_hal.function131 psa_drv_se_context_t *context,
137 (void) context;
183 (void) context;
203 (void) context;
222 (void) context;
271 (void) context;
354 (void) context;
375 (void) context;
434 (void) context;
458 (void) context;
[all …]
A Dtest_suite_psa_crypto_se_driver_hal_mocks.function165 psa_status_t mock_export(psa_drv_se_context_t *context,
171 (void) context;
182 psa_status_t mock_export_public(psa_drv_se_context_t *context,
188 (void) context;
199 psa_status_t mock_sign(psa_drv_se_context_t *context,
208 (void) context;
222 psa_status_t mock_verify(psa_drv_se_context_t *context,
230 (void) context;
261 psa_status_t mock_destroy(psa_drv_se_context_t *context,
265 (void) context;
A Dtest_suite_pk.function1459 /* init pk-rsa context */
1477 /* init pk-rsa context */
1536 /* init pk-rsa context */
1601 /* init pk-rsa context */
1622 /* Turn PK context into an opaque one. */
1736 * corresponding rsa context.
1762 /* Extract key to the raw rsa context */
1765 /* Initialize PK RSA_ALT context */
1848 * - create an RSA/EC opaque context;
1852 * - verify with non-opaque context.
[all …]
A Dtest_suite_aes.function4 /* Test AES with a copied context.
6 * master, enc and dec must be AES context objects. They don't need to
22 // Set key and encrypt with original context
30 // Set key for decryption with original context
36 // Wipe the original context to make sure nothing from it is used
39 // Encrypt with copied context
45 // Decrypt with copied context
649 /* We test context copying multiple times, with different alignments
A Dtest_suite_block_cipher.function53 /* Now properly setup the context */
86 * did not change the state of the context.) */
A Dtest_suite_entropy.function8 DUMMY_CONSTANT_LENGTH, /* Output context->length bytes */
28 entropy_dummy_context *context = arg;
29 ++context->calls;
31 switch (context->instruction) {
33 *olen = context->length;
A Dtest_suite_aes.ecb.data280 AES-128-ECB Copy context
283 AES-192-ECB Copy context
287 AES-256-ECB Copy context
A Dtest_suite_cipher.function96 * it, and instead start with a fresh context.
531 /* Initialise context */
584 /* Initialise context */
802 /* Prepare context */
910 * Prepare context for decryption
977 /* prepare context for encryption */
1057 /* Prepare context */
1096 /* Prepare context */
1158 /* build a fake context just for getting access to get_padding */
A Dtest_suite_pkwrite.function121 /* Turn the key PK context into an opaque one.
202 /* Turn the priv_key PK context into an opaque one. */
A Dtest_suite_chacha20.function54 /* Don't free/init the context nor set the key again,
A Dtest_suite_poly1305.function46 /* Don't free/init the context, in order to test that starts() does the
/mbedtls/tests/src/
A Dfake_external_rng_for_test.c30 mbedtls_psa_external_random_context_t *context, in mbedtls_psa_external_get_random() argument
33 (void) context; in mbedtls_psa_external_get_random()
/mbedtls/docs/
A Dtls13-early-data.md33 where ssl is the SSL context to use, data_to_write the address of the data
35 not be completed, not even started for the SSL context ssl when the function is
73 specifically by the user of write_early_data(). A fresh SSL context (typically
159 context to use:
A Duse-psa-crypto.md73 wrap a PSA key pair into a PK context. The key can be used for private-key
82 with a context set this way, while they would be available with a normal
83 context: `mbedtls_pk_check_pair()`, `mbedtls_pk_debug()`, all public key
86 **Use in X.509 and TLS:** opt-in. The application needs to construct the PK context
88 resulting context to the following existing APIs:
124 There is a new API function `mbedtls_cipher_setup_psa()` to set up a context
/mbedtls/docs/proposed/
A Dpsa-driver-interface.md403context and `*key_buffer_size` to the size of the key context in bytes. The key context buffer rem…
941 psa_status_t acme_init_random(acme_random_context_t *context);
944 …s this entry point once after allocating a random generation context. Initially, the context objec…
953 psa_status_t acme_add_entropy(acme_random_context_t *context,
997 psa_status_t acme_get_random(acme_random_context_t *context,
1054 #### Size of a dynamically allocated key context
1065 #### Size of a statically allocated key context
1086 #### Key context size for a secure element with storage
1092 #### Key context size for a secure element without storage
1119 1. The core allocates memory for the key context.
[all …]
/mbedtls/tests/src/test_helpers/
A Dssl_helpers.c487 mbedtls_test_message_socket_context *context = in mbedtls_test_mock_tcp_send_msg() local
490 if (context == NULL || context->socket == NULL in mbedtls_test_mock_tcp_send_msg()
491 || context->queue_output == NULL) { in mbedtls_test_mock_tcp_send_msg()
495 queue = context->queue_output; in mbedtls_test_mock_tcp_send_msg()
496 socket = context->socket; in mbedtls_test_mock_tcp_send_msg()
514 mbedtls_test_message_socket_context *context = in mbedtls_test_mock_tcp_recv_msg() local
520 if (context == NULL || context->socket == NULL in mbedtls_test_mock_tcp_recv_msg()
521 || context->queue_input == NULL) { in mbedtls_test_mock_tcp_recv_msg()
525 queue = context->queue_input; in mbedtls_test_mock_tcp_recv_msg()
526 socket = context->socket; in mbedtls_test_mock_tcp_recv_msg()
[all …]
/mbedtls/docs/architecture/psa-migration/
A Dpsa-legacy-bridges.md160 …re detailed in “[API to create a PSA key from a PK context](#api-to-create-a-psa-key-from-a-pk-con…
162 #### Using a PSA key as a PK context
177 Gap: a way to copy a PSA key into a PK context. This can only be expected to work if the PSA key is…
247 #### API to create a PSA key from a PK context
251context has incomplete algorithm information. For example, there is no way to distinguish between …
276 * `mbedtls_pk_get_psa_attributes` sets the type and size based on what's in the pk context.
277 …ey pair if the context contains a private key and the indicated usage is a private-key usage. The …
295 #### API to copy a PSA key to a PK context
297 Based on the [gap analysis](#using-a-psa-key-as-a-pk-context):
311 …_verify`, `mbedtls_pk_encrypt`, `mbedtls_pk_decrypt` on the resulting pk context will perform an a…
[all …]
A Dstrategy.md180 - Provide a new way to set up a context that causes operations on that context
183 be changed when setting up the context, but not when using it. In
185 key to be passed as a context of this layer (eg, `mbedtls_pk_context`).
187 - Downside: when the context is typically set up by the application, requires
190 This strategy is not useful when no context is used, for example with the
394 same context type for hashes and HMACs, while the PSA API (rightfully) has
395 distinct operation types. Similarly, the Cipher layer uses the same context
402 introducing new context types) would provide to users.
433 bytes in the X.509 CRT structure, and only moved to a PK context / PSA slot
468 would need a way to easily extract the PSA key ID from the PK context.
A Dmd-cipher-dispatch.md222 * How to perform the operation (context type, which functions to call).
376 - We carry over questionable implementation decisions, like dynamic allocation of context.
446 #### Support for PSA in the MD context
448 An MD context needs to contain either a legacy module's context (or a pointer to one, as is the cas…
450 …r indirection, but this means that an MD context would always be as large as the largest supported…
472 …e availability of the accelerator when the context is set up. This choice needs to be recorded in …
503 Each function that performs some hash operation or context management needs to know whether to disp…
505 If given an established context, use its `engine` field.
601 A block cipher context contains either a legacy module's context (AES, ARIA, Camellia) or a PSA key…
603 …e availability of the accelerator when the context is set up. This choice needs to be recorded in …
[all …]
/mbedtls/tests/data_files/base64/
A Dsrv_def.txt1 // Server context with default MbedTLS configuration
A Dcli_def.txt1 // Client context with default MbedTLS configuration

Completed in 44 milliseconds

123