Home
last modified time | relevance | path

Searched refs:session (Results 1 – 8 of 8) sorted by relevance

/hal_espressif-latest/tools/esptool_py/espsecure/esp_hsm_sign/
D__init__.py62 session = token.open(rw=True, user_pin=config["credentials"])
64 return session
72 def get_privkey_info(session, config): argument
74 private_key = session.get_key(
86 def get_pubkey(session, config): argument
98 public_key = session.get_key(
173 def close_connection(session): argument
175 session.close()
/hal_espressif-latest/tools/esptool_py/test/
Dtest_espsecure_hsm.py72 session = token.open(rw=True, user_pin=TOKEN_PIN)
103 session.generate_keypair(
126 session.close()
/hal_espressif-latest/tools/esptool_py/espsecure/
D__init__.py546 session = hsm.establish_session(config)
548 private_key = hsm.get_privkey_info(session, config)
551 hsm.close_connection(session)
969 session = hsm.establish_session(config)
971 public_key = hsm.get_pubkey(session, config)
972 hsm.close_connection(session)
/hal_espressif-latest/components/mbedtls/
DKconfig576 expiry of TLS session tickets or session cache entries.
811 bool "TLS: Client Support for RFC 5077 SSL session tickets"
815 Client support for RFC 5077 session tickets. See mbedTLS documentation for more details.
819 bool "TLS: Server Support for RFC 5077 SSL session tickets"
823 Server support for RFC 5077 session tickets. See mbedTLS documentation for more details.
/hal_espressif-latest/tools/esptool_py/docs/en/
Dinstallation.rst76 or run them in your current terminal session for one-time activation.
/hal_espressif-latest/components/wpa_supplicant/esp_supplicant/src/crypto/
Dtls_mbedtls.c1030 …wpa_hexdump_key(MSG_MSGDUMP, "master", ssl->MBEDTLS_PRIVATE(session)->MBEDTLS_PRIVATE(master), TL… in tls_connection_prf()
/hal_espressif-latest/components/mbedtls/port/mbedtls_rom/
Dmbedtls_rom_osi.h324 void (*_rom_mbedtls_ssl_session_init)( mbedtls_ssl_session *session );
325 void (*_rom_mbedtls_ssl_session_free)( mbedtls_ssl_session *session );
/hal_espressif-latest/components/bt/porting/ext/tinycrypt/documentation/
Dtinycrypt.rst276 * Create an authenticated, replay-protected session (HMAC-SHA256 + HMAC-PRNG);