Lines Matching refs:keys
41 …API has features that are not present (yet) in PSA, notably parsing and formatting asymmetric keys.
54 * Key management: parsing, generating, deriving and formatting cryptographic keys.
55 * Data manipulation other than keys. In practice, most data formats within the scope of the legacy …
63 * Manipulating data formats, other than keys, where the PSA API is lacking.
75 …do not provide the same functionality. A typical example is parsing and formatting asymmetric keys.
78 …e-mixing-happens)”, we focus the gap analysis on two topics: metadata and keys. This chapter explo…
92 Hashes do not involve keys, and involves no nontrivial data format. Therefore the only gap is with …
118 …keys can also be further classified according to their curve. The legacy API also supports DHM (Di…
125 ECC keys are also involved in EC-JPAKE, but this happens internally: the EC-JPAKE interface only ne…
127 Since there is no algorithm that can be used with multiple types, and PSA keys have a policy that (…
170 …ir migration to PSA. However, this function is useful to use specific PSA keys in X.509/TLS regard…
309 …MBEDTLS_PK_RSA` for RSA keys (since pk objects don't use `MBEDTLS_PK_RSASSA_PSS` as a type), and `…
314 …ecure element), without modifying the code that consumes the key. For RSA keys, the PSA primary al…