Home
last modified time | relevance | path

Searched refs:handle (Results 1 – 15 of 15) sorted by relevance

/mbedtls-3.6.0/include/psa/
Dcrypto_compat.h41 static inline int psa_key_handle_is_null(psa_key_handle_t handle) in psa_key_handle_is_null() argument
43 return mbedtls_svc_key_id_is_null(handle); in psa_key_handle_is_null()
107 psa_key_handle_t *handle);
147 psa_status_t psa_close_key(psa_key_handle_t handle);
/mbedtls-3.6.0/library/
Dpsa_crypto_slot_management.c454 psa_status_t psa_open_key(mbedtls_svc_key_id_t key, psa_key_handle_t *handle) in psa_open_key() argument
463 *handle = PSA_KEY_HANDLE_INIT; in psa_open_key()
471 *handle = key; in psa_open_key()
477 *handle = PSA_KEY_HANDLE_INIT; in psa_open_key()
482 psa_status_t psa_close_key(psa_key_handle_t handle) in psa_close_key() argument
487 if (psa_key_handle_is_null(handle)) { in psa_close_key()
491 status = psa_get_and_lock_key_slot_in_memory(handle, &slot); in psa_close_key()
/mbedtls-3.6.0/tests/suites/
Dtest_suite_psa_crypto_slot_management.function145 psa_key_handle_t handle;
153 TEST_EQUAL(psa_open_key(key_with_invalid_owner, &handle),
206 psa_key_handle_t handle = PSA_KEY_HANDLE_INIT;
256 PSA_ASSERT(psa_open_key(id, &handle));
257 TEST_ASSERT(!psa_key_handle_is_null(handle));
258 PSA_ASSERT(psa_get_key_attributes(handle, &attributes));
289 PSA_ASSERT(psa_open_key(id, &handle));
317 PSA_ASSERT(psa_close_key(handle));
323 * Test that the key handle and identifier are now not referring to an
326 TEST_EQUAL(psa_get_key_attributes(handle, &read_attributes),
[all …]
Dtest_suite_psa_crypto_slot_management.data34 Persistent slot, check after restart with live handle, id=min
99 Persistent slot, check after restart with live handle, persistence=2
205 invalid handle: 0
208 invalid handle: never opened
211 invalid handle: already closed
214 invalid handle: huge
Dtest_suite_psa_crypto_se_driver_hal.function869 psa_key_handle_t handle;
925 TEST_ASSERT(psa_open_key(returned_id, &handle) ==
977 TEST_EQUAL(psa_open_key(returned_id, &handle),
1004 psa_key_handle_t handle;
1068 TEST_EQUAL(psa_open_key(id, &handle), PSA_ERROR_DOES_NOT_EXIST);
1095 psa_key_handle_t handle;
1152 TEST_EQUAL(psa_open_key(id, &handle), PSA_ERROR_DOES_NOT_EXIST);
1213 psa_key_handle_t handle;
1269 TEST_EQUAL(psa_open_key(id, &handle), PSA_ERROR_DOES_NOT_EXIST);
1462 psa_key_handle_t handle;
[all …]
Dtest_suite_random.data37 # An external RNG is supposed to handle arbitrary request lengths. Test it
Dtest_suite_psa_crypto_driver_wrappers.function876 psa_key_handle_t handle = 0;
893 PSA_ASSERT(psa_import_key(&attributes, key_in->x, key_in->len, &handle));
912 actual_status = psa_export_public_key(handle,
917 actual_status = psa_export_key(handle,
935 psa_destroy_key(handle);
2965 /* Offset applied to output_data in order to handle cases where verify()
Dtest_suite_psa_crypto.function6521 * Note: This test can currently only handle ECDSA.
6695 * Note: This test can currently only handle ECDSA.
6913 * Note: This test can currently only handle ECDSA.
6917 * non deterministic ECDSA, but this test can also handle deterministic.
7117 * Note: This test can currently only handle ECDSA.
7283 * Note: This test can currently only handle ECDSA.
7415 * Note: This test can currently only handle ECDSA.
7570 * Note: This test can currently only handle ECDSA.
7694 * Note: This test can currently only handle ECDSA.
/mbedtls-3.6.0/docs/architecture/testing/
Ddriver-interface-test-strategy.md129 … so that a driver can reject a request at runtime and let another driver handle the request. For e…
/mbedtls-3.6.0/3rdparty/p256-m/p256-m/
DREADME.md507 case. For curve orders that don't meet this criterion, we can just handle that
517 id" parameter and handle variable-sized input/output.
/mbedtls-3.6.0/
DChangeLog475 subidentifiers can be valid, but Mbed TLS cannot currently handle them.
1528 rather than PSA_ERROR_DOES_NOT_EXIST for an invalid handle, bringing them
3087 * Fix the cert_write example to handle certificates signed with elliptic
4792 * Defines to handle UEFI environment under MSVC
5091 * ssl_write_certificate_request() can handle empty ca_chain
5158 * Correctly handle CertificateRequest message in client for <= TLS 1.1
5228 POLARSSL_MODE_CFB, to also handle different block size CFB modes.
5278 * ssl_write_certificate_request() can handle empty ca_chain
5326 * Correctly handle empty SSL/TLS packets (Found by James Yonan)
5710 * Correctly handle the case in padlock_xcryptcbc() when input or
[all …]
/mbedtls-3.6.0/docs/
D3.0-migration-guide.md571 way to handle those extensions.
774 to handle failures in the key export callback, for example by
/mbedtls-3.6.0/docs/architecture/psa-migration/
Dmd-cipher-dispatch.md161 …ee [“Classification of callers”](#classification-of-callers)), how do we handle a cryptographic me…
/mbedtls-3.6.0/docs/architecture/
Dpsa-storage-resilience.md30 …always a version that was previously passed to `set()`. We do not try to handle the case where a f…
/mbedtls-3.6.0/docs/proposed/
Dpsa-driver-interface.md875 To declare a cryptoprocessor can handle both cleartext and wrapped keys, you need to provide two dr…