Lines Matching refs:context

244 /** Setup the provided PK context.
251 * \param pk_type mbedtls_pk_type_t to use in the PK context.
735 /* test that freeing the context does not destroy the key */
863 /* In informational functions, we accept NULL where a context pointer
1037 /* Turn the prv PK context into an opaque one.*/
1440 /* init pk-rsa context */
1458 /* init pk-rsa context */
1517 /* init pk-rsa context */
1582 /* init pk-rsa context */
1603 /* Turn PK context into an opaque one. */
1715 * An rsa_alt context can only do private operations (decrypt, sign).
1717 * corresponding rsa context.
1738 /* Initialize PK RSA context with random key */
1741 /* Extract key to the raw rsa context */
1744 /* Initialize PK RSA_ALT context */
1827 * - create an RSA/EC opaque context;
1828 * - sign with opaque context for both EC and RSA keys;
1829 * - [EC only] verify with opaque context;
1831 * - verify with non-opaque context.
1837 /* Create the legacy EC/RSA PK context. */
1853 /* Export public key from the non-opaque PK context we just created. */
1886 /* Turn the PK context into an opaque one. */
1898 /* Sign with the opaque context. */
1910 /* Export public key from the opaque PK context. */
1928 /* Destroy the opaque PK context and the wrapped PSA key. */
1932 /* Create a new non-opaque PK context to verify the signature. */
2027 /* Create legacy RSA public/private key in PK context. */
2035 /* Export underlying public key for re-importing in a legacy context.
2045 /* Turn PK context into an opaque one. */
2072 /* verify_ext() is not supported when using an opaque context. */