/mbedtls-latest/include/psa/ |
D | crypto_struct.h | 72 mbedtls_psa_client_handle_t handle; member 97 mbedtls_psa_client_handle_t handle; member 133 mbedtls_psa_client_handle_t handle; member 161 mbedtls_psa_client_handle_t handle; member 204 mbedtls_psa_client_handle_t handle; member 452 mbedtls_psa_client_handle_t handle; member 490 mbedtls_psa_client_handle_t handle; member
|
D | crypto_compat.h | 41 static inline int psa_key_handle_is_null(psa_key_handle_t handle) in psa_key_handle_is_null() argument 43 return mbedtls_svc_key_id_is_null(handle); in psa_key_handle_is_null() 107 psa_key_handle_t *handle); 147 psa_status_t psa_close_key(psa_key_handle_t handle);
|
D | crypto_extra.h | 1855 mbedtls_psa_client_handle_t handle; member
|
/mbedtls-latest/tests/suites/ |
D | test_suite_psa_crypto_slot_management.function | 230 psa_key_handle_t handle = PSA_KEY_HANDLE_INIT; 280 PSA_ASSERT(psa_open_key(id, &handle)); 281 TEST_ASSERT(!psa_key_handle_is_null(handle)); 282 PSA_ASSERT(psa_get_key_attributes(handle, &attributes)); 313 PSA_ASSERT(psa_open_key(id, &handle)); 341 PSA_ASSERT(psa_close_key(handle)); 347 * Test that the key handle and identifier are now not referring to an 350 TEST_EQUAL(psa_get_key_attributes(handle, &read_attributes), 352 TEST_EQUAL(psa_close_key(handle), PSA_ERROR_INVALID_HANDLE); 451 psa_key_handle_t handle = mbedtls_svc_key_id_make(0xdead, 0xdead); [all …]
|
D | test_suite_psa_crypto_slot_management.data | 34 Persistent slot, check after restart with live handle, id=min 99 Persistent slot, check after restart with live handle, persistence=2 216 invalid handle: 0 219 invalid handle: never opened 222 invalid handle: already closed 225 invalid handle: huge
|
D | test_suite_psa_crypto_se_driver_hal.function | 884 psa_key_handle_t handle; 940 TEST_ASSERT(psa_open_key(returned_id, &handle) == 992 TEST_EQUAL(psa_open_key(returned_id, &handle), 1019 psa_key_handle_t handle; 1083 TEST_EQUAL(psa_open_key(id, &handle), PSA_ERROR_DOES_NOT_EXIST); 1110 psa_key_handle_t handle; 1167 TEST_EQUAL(psa_open_key(id, &handle), PSA_ERROR_DOES_NOT_EXIST); 1228 psa_key_handle_t handle; 1284 TEST_EQUAL(psa_open_key(id, &handle), PSA_ERROR_DOES_NOT_EXIST); 1477 psa_key_handle_t handle; [all …]
|
D | test_suite_random.data | 37 # An external RNG is supposed to handle arbitrary request lengths. Test it
|
D | test_suite_psa_crypto_driver_wrappers.function | 892 psa_key_handle_t handle = 0; 909 PSA_ASSERT(psa_import_key(&attributes, key_in->x, key_in->len, &handle)); 929 actual_status = psa_export_public_key(handle, 934 actual_status = psa_export_key(handle, 952 psa_destroy_key(handle); 2976 /* Offset applied to output_data in order to handle cases where verify()
|
D | test_suite_psa_crypto.function | 6846 * Note: This test can currently only handle ECDSA. 7020 * Note: This test can currently only handle ECDSA. 7238 * Note: This test can currently only handle ECDSA. 7242 * non deterministic ECDSA, but this test can also handle deterministic. 7442 * Note: This test can currently only handle ECDSA. 7608 * Note: This test can currently only handle ECDSA. 7740 * Note: This test can currently only handle ECDSA. 7895 * Note: This test can currently only handle ECDSA. 8018 * Note: This test can currently only handle ECDSA.
|
D | test_suite_pk.function | 122 * same size. For simplicity, we only handle a subset of configurations, 140 * same family. For simplicity, we only handle a subset of configurations,
|
/mbedtls-latest/library/ |
D | psa_crypto_slot_management.c | 987 psa_status_t psa_open_key(mbedtls_svc_key_id_t key, psa_key_handle_t *handle) in psa_open_key() argument 996 *handle = PSA_KEY_HANDLE_INIT; in psa_open_key() 1004 *handle = key; in psa_open_key() 1010 *handle = PSA_KEY_HANDLE_INIT; in psa_open_key() 1015 psa_status_t psa_close_key(psa_key_handle_t handle) in psa_close_key() argument 1020 if (psa_key_handle_is_null(handle)) { in psa_close_key() 1031 status = psa_get_and_lock_key_slot_in_memory(handle, &slot); in psa_close_key()
|
/mbedtls-latest/docs/ |
D | tls13-early-data.md | 170 could be adapted to handle early data in the following way:
|
D | 3.0-migration-guide.md | 571 way to handle those extensions. 774 to handle failures in the key export callback, for example by
|
D | psa-transition.md | 289 … which are obsolete, are not available in the PSA API. If you need them, handle the padding in you… 1135 * `psa_key_id_t our_key`: a handle to our key pair;
|
/mbedtls-latest/3rdparty/p256-m/p256-m/ |
D | README.md | 507 case. For curve orders that don't meet this criterion, we can just handle that 517 id" parameter and handle variable-sized input/output.
|
/mbedtls-latest/docs/architecture/testing/ |
D | driver-interface-test-strategy.md | 129 … so that a driver can reject a request at runtime and let another driver handle the request. For e…
|
/mbedtls-latest/ |
D | ChangeLog | 930 subidentifiers can be valid, but Mbed TLS cannot currently handle them. 1983 rather than PSA_ERROR_DOES_NOT_EXIST for an invalid handle, bringing them 3542 * Fix the cert_write example to handle certificates signed with elliptic 5247 * Defines to handle UEFI environment under MSVC 5546 * ssl_write_certificate_request() can handle empty ca_chain 5613 * Correctly handle CertificateRequest message in client for <= TLS 1.1 5683 POLARSSL_MODE_CFB, to also handle different block size CFB modes. 5733 * ssl_write_certificate_request() can handle empty ca_chain 5781 * Correctly handle empty SSL/TLS packets (Found by James Yonan) 6165 * Correctly handle the case in padlock_xcryptcbc() when input or [all …]
|
/mbedtls-latest/docs/architecture/psa-migration/ |
D | psa-legacy-bridges.md | 168 …example, it's ok for pkwrite, because we've upgraded the pkwrite code to handle `MBEDTLS_PK_OPAQUE…
|
D | md-cipher-dispatch.md | 217 …ee [“Classification of callers”](#classification-of-callers)), how do we handle a cryptographic me…
|
/mbedtls-latest/docs/architecture/ |
D | psa-storage-resilience.md | 30 …always a version that was previously passed to `set()`. We do not try to handle the case where a f…
|
D | psa-shared-memory.md | 414 …r arguments and `mprotect` to deny or reenable access. Use a debugger to handle SIGSEGV (Gdb: set …
|
/mbedtls-latest/docs/proposed/ |
D | psa-driver-interface.md | 875 To declare a cryptoprocessor can handle both cleartext and wrapped keys, you need to provide two dr…
|