Searched refs:handle (Results 1 – 13 of 13) sorted by relevance
/mbedtls-3.5.0/include/psa/ |
D | crypto_compat.h | 53 static inline int psa_key_handle_is_null(psa_key_handle_t handle) in psa_key_handle_is_null() argument 55 return mbedtls_svc_key_id_is_null(handle); in psa_key_handle_is_null() 119 psa_key_handle_t *handle); 159 psa_status_t psa_close_key(psa_key_handle_t handle);
|
/mbedtls-3.5.0/library/ |
D | psa_crypto_slot_management.c | 474 psa_status_t psa_open_key(mbedtls_svc_key_id_t key, psa_key_handle_t *handle) in psa_open_key() argument 483 *handle = PSA_KEY_HANDLE_INIT; in psa_open_key() 491 *handle = key; in psa_open_key() 497 *handle = PSA_KEY_HANDLE_INIT; in psa_open_key() 502 psa_status_t psa_close_key(psa_key_handle_t handle) in psa_close_key() argument 507 if (psa_key_handle_is_null(handle)) { in psa_close_key() 511 status = psa_get_and_lock_key_slot_in_memory(handle, &slot); in psa_close_key()
|
/mbedtls-3.5.0/tests/suites/ |
D | test_suite_psa_crypto_slot_management.function | 145 psa_key_handle_t handle; 153 TEST_EQUAL(psa_open_key(key_with_invalid_owner, &handle), 206 psa_key_handle_t handle = PSA_KEY_HANDLE_INIT; 256 PSA_ASSERT(psa_open_key(id, &handle)); 257 TEST_ASSERT(!psa_key_handle_is_null(handle)); 258 PSA_ASSERT(psa_get_key_attributes(handle, &attributes)); 289 PSA_ASSERT(psa_open_key(id, &handle)); 317 PSA_ASSERT(psa_close_key(handle)); 323 * Test that the key handle and identifier are now not referring to an 326 TEST_EQUAL(psa_get_key_attributes(handle, &read_attributes), [all …]
|
D | test_suite_psa_crypto_slot_management.data | 34 Persistent slot, check after restart with live handle, id=min 99 Persistent slot, check after restart with live handle, persistence=2 205 invalid handle: 0 208 invalid handle: never opened 211 invalid handle: already closed 214 invalid handle: huge
|
D | test_suite_psa_crypto_se_driver_hal.function | 869 psa_key_handle_t handle; 925 TEST_ASSERT(psa_open_key(returned_id, &handle) == 977 TEST_EQUAL(psa_open_key(returned_id, &handle), 1004 psa_key_handle_t handle; 1068 TEST_EQUAL(psa_open_key(id, &handle), PSA_ERROR_DOES_NOT_EXIST); 1095 psa_key_handle_t handle; 1152 TEST_EQUAL(psa_open_key(id, &handle), PSA_ERROR_DOES_NOT_EXIST); 1213 psa_key_handle_t handle; 1269 TEST_EQUAL(psa_open_key(id, &handle), PSA_ERROR_DOES_NOT_EXIST); 1462 psa_key_handle_t handle; [all …]
|
D | test_suite_random.data | 37 # An external RNG is supposed to handle arbitrary request lengths. Test it
|
D | test_suite_psa_crypto_driver_wrappers.function | 875 psa_key_handle_t handle = 0; 892 PSA_ASSERT(psa_import_key(&attributes, key_in->x, key_in->len, &handle)); 911 actual_status = psa_export_public_key(handle, 916 actual_status = psa_export_key(handle, 934 psa_destroy_key(handle); 2956 /* Offset applied to output_data in order to handle cases where verify()
|
D | test_suite_psa_crypto.function | 6494 * Note: This test can currently only handle ECDSA. 6668 * Note: This test can currently only handle ECDSA. 6886 * Note: This test can currently only handle ECDSA. 6890 * non deterministic ECDSA, but this test can also handle deterministic. 7090 * Note: This test can currently only handle ECDSA. 7256 * Note: This test can currently only handle ECDSA. 7388 * Note: This test can currently only handle ECDSA. 7543 * Note: This test can currently only handle ECDSA. 7667 * Note: This test can currently only handle ECDSA.
|
/mbedtls-3.5.0/docs/architecture/testing/ |
D | driver-interface-test-strategy.md | 129 … so that a driver can reject a request at runtime and let another driver handle the request. For e…
|
/mbedtls-3.5.0/ |
D | ChangeLog | 154 subidentifiers can be valid, but Mbed TLS cannot currently handle them. 1207 rather than PSA_ERROR_DOES_NOT_EXIST for an invalid handle, bringing them 2766 * Fix the cert_write example to handle certificates signed with elliptic 4471 * Defines to handle UEFI environment under MSVC 4770 * ssl_write_certificate_request() can handle empty ca_chain 4837 * Correctly handle CertificateRequest message in client for <= TLS 1.1 4907 POLARSSL_MODE_CFB, to also handle different block size CFB modes. 4957 * ssl_write_certificate_request() can handle empty ca_chain 5005 * Correctly handle empty SSL/TLS packets (Found by James Yonan) 5389 * Correctly handle the case in padlock_xcryptcbc() when input or [all …]
|
/mbedtls-3.5.0/docs/ |
D | 3.0-migration-guide.md | 571 way to handle those extensions. 774 to handle failures in the key export callback, for example by
|
/mbedtls-3.5.0/docs/architecture/psa-migration/ |
D | md-cipher-dispatch.md | 161 …ee [“Classification of callers”](#classification-of-callers)), how do we handle a cryptographic me…
|
/mbedtls-3.5.0/docs/proposed/ |
D | psa-driver-interface.md | 611 To declare a cryptoprocessor can handle both cleartext and wrapped keys, you need to provide two dr…
|