/mbedtls-3.6.0/library/ |
D | psa_crypto_se.c | 49 psa_drv_se_context_t context; member 84 return &driver->u.context; in psa_get_se_driver_context() 96 *p_drv_context = (driver ? &driver->u.context : NULL); in psa_get_se_driver() 210 status = p_validate_slot_number(&driver->u.context, in psa_find_se_slot_for_key() 226 status = p_allocate(&driver->u.context, in psa_find_se_slot_for_key() 252 &driver->u.context, in psa_destroy_se_key() 270 &driver->u.context, in psa_init_all_se_drivers()
|
/mbedtls-3.6.0/docs/architecture/ |
D | alternative-implementations.md | 38 * Create a header file `xxx_alt.h` that defines the context type(s) used by the module. For example… 43 ### Constraints on context types 45 …context types to any C type except incomplete and array types (although they would normally be `st… 47 Where a context type needs to have a certain field, the field must have the same type and semantics… 54 …context object in memory (except during the execution of a library function that takes this contex… 64 In practice, this means that a pointer to a context or to a part of a context does not remain valid… 78 … you must use the same layout for context objects as the built-in implementation. If you want to u…
|
D | tls13-support.md | 418 fields of the SSL context or based on the reading of the type of the next 422 reading to not modify the SSL context as this stage may be repeated if the 432 * pre-processing stage: prepare the SSL context for the message parsing. This 439 update of the SSL context. The idea of the pre-processing/parsing/post-processing 444 context to prepare for the next incoming and outgoing messages. This stage is 456 optional. The check is based on the value of some fields of the SSL context. 463 of the SSL context. The idea of the preparation/writing/finalization 468 context to prepare for the next incoming and outgoing messages. This stage is 509 where ssl is the SSL context to use, data_to_write the address of the data 511 not be completed, not even started for the SSL context ssl when the function is [all …]
|
/mbedtls-3.6.0/tests/suites/ |
D | test_suite_psa_crypto_se_driver_hal.function | 131 psa_drv_se_context_t *context, 137 (void) context; 153 static psa_status_t counter_allocate(psa_drv_se_context_t *context, 162 if (context->persistent_data_size != sizeof(psa_key_slot_number_t)) { 176 static psa_status_t null_import(psa_drv_se_context_t *context, 183 (void) context; 196 static psa_status_t null_generate(psa_drv_se_context_t *context, 203 (void) context; 218 static psa_status_t null_destroy(psa_drv_se_context_t *context, 222 (void) context; [all …]
|
D | test_suite_psa_crypto_se_driver_hal_mocks.function | 165 psa_status_t mock_export(psa_drv_se_context_t *context, 171 (void) context; 182 psa_status_t mock_export_public(psa_drv_se_context_t *context, 188 (void) context; 199 psa_status_t mock_sign(psa_drv_se_context_t *context, 208 (void) context; 222 psa_status_t mock_verify(psa_drv_se_context_t *context, 230 (void) context; 261 psa_status_t mock_destroy(psa_drv_se_context_t *context, 265 (void) context;
|
D | test_suite_pk.function | 291 /* test that freeing the context does not destroy the key */ 419 /* In informational functions, we accept NULL where a context pointer 951 /* init pk-rsa context */ 968 /* init pk-rsa context */ 1023 /* init pk-rsa context */ 1078 /* init pk-rsa context */ 1094 /* Turn PK context into an opaque one. */ 1194 * An rsa_alt context can only do private operations (decrypt, sign). 1196 * corresponding rsa context. 1217 /* Initialize PK RSA context with random key */ [all …]
|
D | test_suite_aes.function | 4 /* Test AES with a copied context. 6 * master, enc and dec must be AES context objects. They don't need to 21 // Set key and encrypt with original context 29 // Set key for decryption with original context 35 // Wipe the original context to make sure nothing from it is used 38 // Encrypt with copied context 44 // Decrypt with copied context 529 /* We test context copying multiple times, with different alignments
|
D | test_suite_entropy.function | 8 DUMMY_CONSTANT_LENGTH, /* Output context->length bytes */ 28 entropy_dummy_context *context = arg; 29 ++context->calls; 31 switch (context->instruction) { 33 *olen = context->length;
|
D | test_suite_aes.ecb.data | 280 AES-128-ECB Copy context 283 AES-192-ECB Copy context 287 AES-256-ECB Copy context
|
D | test_suite_cipher.function | 96 * it, and instead start with a fresh context. 527 /* Initialise context */ 580 /* Initialise context */ 798 /* Prepare context */ 906 * Prepare context for decryption 973 /* prepare context for encryption */ 1053 /* Prepare context */ 1092 /* Prepare context */ 1154 /* build a fake context just for getting access to get_padding */
|
D | test_suite_chacha20.function | 54 /* Don't free/init the context nor set the key again,
|
D | test_suite_poly1305.function | 46 /* Don't free/init the context, in order to test that starts() does the
|
D | test_suite_random.data | 23 # because CTR_DRBG crashes when given an unseeded context. This is arguably
|
D | test_suite_dhm.function | 23 * DHM context by the caller). */ 54 * against the context. */
|
D | test_suite_shax.data | 2384 SHA3-224 context reuse 2387 SHA3-256 context reuse 2390 SHA3-384 context reuse 2393 SHA3-512 context reuse 2396 # Test a subset of the 12 possible cross-size context reuse, with both 2398 SHA3-224 to SHA3-256 context reuse 2401 SHA3-256 to SHA3-512 context reuse 2404 SHA3-512 to SHA3-384 context reuse 2407 SHA3-384 to SHA3-224 context reuse
|
D | test_suite_rsa.function | 1000 /* Original MPI's with which we set up the RSA context */ 1024 /* Setup RSA context */ 1069 /* If we were providing enough information to setup a complete private context, 1124 /* Original MPI's with which we set up the RSA context */ 1191 /* Setup RSA context */ 1221 /* If we were providing enough information to setup a complete private context,
|
/mbedtls-3.6.0/tests/src/ |
D | fake_external_rng_for_test.c | 30 mbedtls_psa_external_random_context_t *context, in mbedtls_psa_external_get_random() argument 33 (void) context; in mbedtls_psa_external_get_random()
|
/mbedtls-3.6.0/docs/ |
D | use-psa-crypto.md | 73 wrap a PSA key pair into a PK context. The key can be used for private-key 82 with a context set this way, while they would be available with a normal 83 context: `mbedtls_pk_check_pair()`, `mbedtls_pk_debug()`, all public key 86 **Use in X.509 and TLS:** opt-in. The application needs to construct the PK context 88 resulting context to the following existing APIs: 124 There is a new API function `mbedtls_cipher_setup_psa()` to set up a context
|
/mbedtls-3.6.0/tests/src/test_helpers/ |
D | ssl_helpers.c | 497 mbedtls_test_message_socket_context *context = in mbedtls_test_mock_tcp_send_msg() local 500 if (context == NULL || context->socket == NULL in mbedtls_test_mock_tcp_send_msg() 501 || context->queue_output == NULL) { in mbedtls_test_mock_tcp_send_msg() 505 queue = context->queue_output; in mbedtls_test_mock_tcp_send_msg() 506 socket = context->socket; in mbedtls_test_mock_tcp_send_msg() 524 mbedtls_test_message_socket_context *context = in mbedtls_test_mock_tcp_recv_msg() local 530 if (context == NULL || context->socket == NULL in mbedtls_test_mock_tcp_recv_msg() 531 || context->queue_input == NULL) { in mbedtls_test_mock_tcp_recv_msg() 535 queue = context->queue_input; in mbedtls_test_mock_tcp_recv_msg() 536 socket = context->socket; in mbedtls_test_mock_tcp_recv_msg() [all …]
|
/mbedtls-3.6.0/docs/proposed/ |
D | psa-driver-interface.md | 189 2. `const uint8_t *key_buffer`: a key material or key context buffer. 196 …a_key_id_t *` output parameter is replaced by a sequence of parameters that convey the key context: 197 1. `uint8_t *key_buffer`: a buffer for the key material or key context. 240 …resents the operation context. The lifecycle of a driver operation context is similar to the lifec… 242 1. The core initializes operation context objects to either all-bits-zero or to logical zero (`{0}`… 243 …or this operation family. If this fails, the core destroys the operation context object without ca… 244 1. The core calls other entry points that manipulate the operation context object, respecting the c… 245 …bort` entry point for this operation family, then destroys the operation context object without ca… 246 1. If a “finish” entry point fails, the core destroys the operation context object without calling … 258 …h_operation_t"`: the type of a hash operation context. It must be possible to copy a hash operatio… [all …]
|
/mbedtls-3.6.0/tests/data_files/base64/ |
D | srv_def.txt | 1 // Server context with default MbedTLS configuration
|
D | cli_def.txt | 1 // Client context with default MbedTLS configuration
|
/mbedtls-3.6.0/docs/architecture/psa-migration/ |
D | strategy.md | 180 - Provide a new way to set up a context that causes operations on that context 183 be changed when setting up the context, but not when using it. In 185 key to be passed as a context of this layer (eg, `mbedtls_pk_context`). 187 - Downside: when the context is typically set up by the application, requires 190 This strategy is not useful when no context is used, for example with the 394 same context type for hashes and HMACs, while the PSA API (rightfully) has 395 distinct operation types. Similarly, the Cipher layer uses the same context 402 introducing new context types) would provide to users. 433 bytes in the X.509 CRT structure, and only moved to a PK context / PSA slot 468 would need a way to easily extract the PSA key ID from the PK context.
|
D | md-cipher-dispatch.md | 166 * How to perform the operation (context type, which functions to call). 330 #### Support for PSA in the MD context 332 An MD context needs to contain either a legacy module's context (or a pointer to one, as is the cas… 334 …r indirection, but this means that an MD context would always be as large as the largest supported… 356 …e availability of the accelerator when the context is set up. This choice needs to be recorded in … 387 Each function that performs some hash operation or context management needs to know whether to disp… 389 If given an established context, use its `engine` field.
|
/mbedtls-3.6.0/tests/include/test/ |
D | ssl_helpers.h | 451 mbedtls_test_message_socket_context *context);
|