Lines Matching refs:used
88 …_key_id_t), which is an identifier for the key. This allows the API to be used with keys that are …
219 …because it is a dependency of another configuration option, because it is used internally, or beca…
350 …ection](#cipher-mechanism-selection)”). By design, the same key cannot be used with multiple algor…
356 …ing sections to perform operations on the key. The same key object can be used in multiple operati…
357 4. To free the resources used by the key object, call [`psa_destroy_key`](https://mbed-tls.readthed…
446 The following helper functions can be used to convert between the 2 types:
538 …ection](#cipher-mechanism-selection)”). By design, the same key cannot be used with multiple algor…
544 …ing sections to perform operations on the key. The same key object can be used in multiple operati…
545 4. To free the resources used by the key object, call [`psa_destroy_key`](https://mbed-tls.readthed…
603 …tion/#group__derivation_1gab62757fb125243562c3947a752470d4a) for the salt used during the extracti…
605 …roup__derivation_1gacef8df989e09c769233f4b779acb5b7d) for the info string used during the expansio…
617 …tion/#group__derivation_1gab62757fb125243562c3947a752470d4a) for the salt used during the extracti…
663 … API. However, there are major differences in the way the two APIs can be used to create keys or t…
676 …ing sections to perform operations on the key. The same key object can be used in multiple operati…
677 4. To free the resources used by the key object, call [`psa_destroy_key`](https://mbed-tls.readthed…
681 A key's policy indicates what algorithm(s) it can be used with (usage algorithm policy) and what op…
697 …available algorithm values for each key type. Normally, a key can only be used with a single algor…
699 …used to sign messages with multiple different hashes. In an algorithm policy, you can use [`PSA_AL…
700 … is intended for scenarios where a key is normally used with a single algorithm, but needs to be u…
713 …__types_1ga11745b110166e927e2abeabc7d532051). A key with this type can be used both for private-ke…
729 …) where `curve` is a curve family identifier. A key with this type can be used both for private-ke…
776 A finite-field Diffie-Hellman key can be used for key agreement with the algorithm [`PSA_ALG_FFDH`]…
780 …se`, `mbedtls_ecdsa_genkey`), this directly creates an object that can be used with high-level API…
813 * `PSA_KEY_USAGE_SIGN_HASH` or `PSA_KEY_USAGE_SIGN_MESSAGE` for a key pair used for signing.
814 * `PSA_KEY_USAGE_DECRYPT` for a key pair used for decryption.
815 * `PSA_KEY_USAGE_DERIVE` for a key pair used for key agreement.
816 …* `PSA_KEY_USAGE_VERIFY_HASH` or `PSA_KEY_USAGE_VERIFY_MESSAGE` for a public key pair used for sig…
817 * `PSA_KEY_USAGE_ENCRYPT` for a key pair used for encryption.
851 // (the public key will not be used and does not need to be set)
903 The export format is the same format used for `psa_import_key`, described in “[Creating keys for as…
913 …rdless of whether the key is an RSA or ECC key. The PK object can only be used as permitted by the…
967 …es not require specifying a hash as part of the algorithm. It can only be used with `psa_sign_hash…
969 …* For `psa_sign_message` with `PSA_ALG_DETERMINISTIC_ECDSA`, the same hash algorithm is used to ha…
1009 …sh` corresponds to the `md_alg` parameter passed to the legacy API. It is used to hash the message…
1014 … largest possible salt length up to the hash length (i.e. the same that would be used for signing).
1031 This is the mechanism used by the PK functions and by `mbedtls_rsa_pkcs1_{encrypt,decrypt}` unless …
1032 This is also the mechanism used by `mbedtls_rsa_rsaes_pkcs1_v15_{encrypt,decrypt}`.
1040 This is the mechanism used by `mbedtls_rsa_rsaes_oaep_{encrypt,decrypt}`.
1044 …sk generation is MGF1, the label is empty, and the same hash algorithm is used for MGF1 and to has…
1050 …bedtls_rsa_check_pub_priv` and `mbedtls_ecp_check_pub_priv`, which can be used to check the consis…
1095 …up__crypto__types_1ga78bb81cffb87a635c247725eeb2a2682) if the key will be used as part of a key de…
1103 …ing sections to perform operations on the key. The same key object can be used in multiple operati…
1104 4. To free the resources used by the key object, call [`psa_destroy_key`](https://mbed-tls.readthed…
1136 * `psa_key_attributes_t attributes`: key attributes used in steps 2–3;;
1147 …times for a "fake ephemeral" Diffie-Hellman where the same private key is used for multiple key ex…
1151 …reement in a TLS 1.2 server. The PSA version of this workflow can also be used with other protocol…
1176 …reement in a TLS 1.2 client. The PSA version of this workflow can also be used with other protocol…
1206 …mbedtls_dhm_get_value` allow the caller to obtain metadata about the keys used for the key exchang…
1229 The bit-size used by the PSA API is the size of the private key. For most curves, the PSA bit-size,…
1241 …from_name`. There is no equivalent of Mbed TLS's lookup based on the name used for the curve in TL…
1276 …used by [`psa_import_key`](https://mbed-tls.readthedocs.io/projects/api/en/development/api/group/g…