/mbedtls-latest/tests/suites/ |
D | test_suite_psa_crypto_persistent_key.function | 139 PSA_ASSERT(psa_destroy_key(key_id)); 177 PSA_ASSERT(psa_destroy_key(key_id)); 192 PSA_ASSERT(psa_destroy_key(key_id)); 241 PSA_ASSERT(psa_destroy_key(key_id)); 311 PSA_ASSERT(psa_destroy_key(key_id)); 335 TEST_EQUAL(expected_status, psa_destroy_key(id));
|
D | test_suite_psa_crypto_entropy.function | 84 PSA_ASSERT(psa_destroy_key(key)); 93 psa_destroy_key(key); 127 PSA_ASSERT(psa_destroy_key(key)); 139 PSA_ASSERT(psa_destroy_key(key)); 142 psa_destroy_key(key);
|
D | test_suite_psa_crypto_op_fail.function | 111 psa_destroy_key(key_id); 157 psa_destroy_key(key_id); 205 psa_destroy_key(key_id); 280 psa_destroy_key(key_id); 327 psa_destroy_key(key_id); 404 psa_destroy_key(key_id);
|
D | test_suite_psa_crypto.function | 180 psa_destroy_key(key); 184 psa_destroy_key(key); 213 psa_destroy_key(key); 217 psa_destroy_key(key); 565 psa_destroy_key(key); 674 psa_destroy_key(key); 1420 psa_status_t status = psa_destroy_key(skc->key); 1470 PSA_ASSERT(psa_destroy_key(key)); 1482 psa_destroy_key(key); 1487 PSA_ASSERT(psa_destroy_key(key)); [all …]
|
D | test_suite_psa_crypto_slot_management.function | 57 PSA_ASSERT(psa_destroy_key(key)); 567 PSA_ASSERT(psa_destroy_key(returned_source_id)); 615 PSA_ASSERT(psa_destroy_key(returned_target_id)); 723 PSA_ASSERT(psa_destroy_key(returned_source_id)); 725 PSA_ASSERT(psa_destroy_key(returned_target_id)); 788 PSA_ASSERT(psa_destroy_key(invalid_handle)); 802 TEST_EQUAL(psa_destroy_key(invalid_handle), close_status); 943 PSA_ASSERT(psa_destroy_key(keys[key_to_destroy])); 969 PSA_ASSERT(psa_destroy_key(keys[i])); 1050 PSA_ASSERT(psa_destroy_key(key)); [all …]
|
D | test_suite_pk.function | 546 PSA_ASSERT(psa_destroy_key(pk->priv_id)); 632 psa_destroy_key(orig_key_id); 738 TEST_ASSERT(PSA_SUCCESS == psa_destroy_key(key)); 784 PSA_ASSERT(psa_destroy_key(key)); 1057 psa_destroy_key(opaque_key_id); 1623 TEST_EQUAL(PSA_SUCCESS, psa_destroy_key(key_id)); 1930 TEST_ASSERT(PSA_SUCCESS == psa_destroy_key(key_id)); 2088 TEST_EQUAL(PSA_SUCCESS, psa_destroy_key(key_id)); 2168 psa_destroy_key(new_key_id); 2216 psa_destroy_key(new_key_id); [all …]
|
D | test_suite_psa_crypto_not_supported.function | 30 psa_destroy_key(key_id); 49 psa_destroy_key(key_id);
|
D | test_suite_psa_crypto_driver_wrappers.function | 571 psa_destroy_key(key); 628 psa_destroy_key(key); 700 psa_destroy_key(key); 759 psa_destroy_key(key); 828 psa_destroy_key(key); 874 psa_destroy_key(key); 952 psa_destroy_key(handle); 1035 psa_destroy_key(our_key); 1122 psa_destroy_key(key); 1251 psa_destroy_key(key); [all …]
|
D | test_suite_psa_crypto_se_driver_hal_mocks.function | 378 PSA_ASSERT(psa_destroy_key(id)); 429 PSA_ASSERT(psa_destroy_key(id)); 493 PSA_ASSERT(psa_destroy_key(id)); 544 PSA_ASSERT(psa_destroy_key(id)); 605 PSA_ASSERT(psa_destroy_key(id)); 664 PSA_ASSERT(psa_destroy_key(id));
|
D | test_suite_psa_crypto_se_driver_hal.function | 402 psa_destroy_key(key); 487 psa_destroy_key(key); 521 psa_destroy_key(key); 695 PSA_ASSERT(psa_destroy_key(key2)); 986 PSA_ASSERT(psa_destroy_key(returned_id)); 1077 PSA_ASSERT(psa_destroy_key(id)); 1162 PSA_ASSERT(psa_destroy_key(id)); 1279 PSA_ASSERT(psa_destroy_key(id)); 1455 psa_destroy_key(id); 1456 psa_destroy_key(sw_key); [all …]
|
D | test_suite_psa_crypto_storage_format.function | 197 TEST_EQUAL(PSA_ERROR_NOT_PERMITTED, psa_destroy_key(key_id)); 200 PSA_ASSERT(psa_destroy_key(key_id)); 261 psa_destroy_key(key_id);
|
D | test_suite_pkwrite.function | 158 psa_destroy_key(opaque_id); 237 psa_destroy_key(opaque_key_id);
|
D | test_suite_psa_crypto_generate_key.function | 45 psa_destroy_key(key_id);
|
D | test_suite_psa_crypto_pake.function | 766 PSA_ASSERT(psa_destroy_key(key)); 828 psa_destroy_key(key); 893 psa_destroy_key(key); 928 psa_destroy_key(key); 1038 PSA_ASSERT(psa_destroy_key(key));
|
/mbedtls-latest/programs/psa/ |
D | key_ladder_demo.c | 202 (void) psa_destroy_key(key); in generate() 250 (void) psa_destroy_key(*master_key); in import_key_from_file() 292 PSA_CHECK(psa_destroy_key(*key)); in derive_key_ladder() 303 psa_destroy_key(*key); in derive_key_ladder() 579 (void) psa_destroy_key(derivation_key); in run() 580 (void) psa_destroy_key(wrapping_key); in run()
|
D | crypto_examples.c | 190 psa_destroy_key(key); in cipher_example_encrypt_decrypt_aes_cbc_nopad_1_block() 238 psa_destroy_key(key); in cipher_example_encrypt_decrypt_aes_cbc_pkcs7_multi() 285 psa_destroy_key(key); in cipher_example_encrypt_decrypt_aes_ctr_multi()
|
D | hmac_demo.c | 136 psa_destroy_key(key); in hmac_demo()
|
/mbedtls-latest/library/ |
D | ssl_ticket.c | 140 if ((status = psa_destroy_key(ctx->keys[ctx->active].key)) != PSA_SUCCESS) { in ssl_ticket_update_keys() 176 if ((status = psa_destroy_key(key->key)) != PSA_SUCCESS) { in mbedtls_ssl_ticket_rotate() 542 psa_destroy_key(ctx->keys[0].key); in mbedtls_ssl_ticket_free() 543 psa_destroy_key(ctx->keys[1].key); in mbedtls_ssl_ticket_free()
|
D | pk_wrap.c | 122 status = psa_destroy_key(key_id); in rsa_verify_wrap() 221 status = psa_destroy_key(key_id); in mbedtls_pk_psa_rsa_sign_ext() 337 status = psa_destroy_key(key_id); in rsa_decrypt_wrap() 419 status = psa_destroy_key(key_id); in rsa_encrypt_wrap() 594 status = psa_destroy_key(key_id); in ecdsa_verify_psa() 800 status = psa_destroy_key(key_id); in ecdsa_sign_wrap() 995 destruction_status = psa_destroy_key(key_id); in eckey_check_pair_psa()
|
D | pk_ecc.c | 124 psa_status_t destruction_status = psa_destroy_key(key_id); in mbedtls_pk_ecc_set_pubkey_from_prv() 236 (psa_destroy_key(key_id) != PSA_SUCCESS)) { in mbedtls_pk_ecc_set_pubkey()
|
D | ssl_tls12_server.c | 310 psa_destroy_key(ssl->handshake->psa_pake_password); in ssl_parse_ecjpake_kkpp() 1957 psa_destroy_key(ssl->handshake->psa_pake_password); in ssl_write_ecjpake_kkpp_ext() 2864 psa_destroy_key(ssl->handshake->psa_pake_password); in ssl_prepare_server_key_exchange() 3068 (void) psa_destroy_key(handshake->xxdh_psa_privkey); in ssl_prepare_server_key_exchange() 3781 (void) psa_destroy_key(handshake->xxdh_psa_privkey); in ssl_parse_client_key_exchange() 3788 status = psa_destroy_key(handshake->xxdh_psa_privkey); in ssl_parse_client_key_exchange() 3932 psa_destroy_key(handshake->xxdh_psa_privkey); in ssl_parse_client_key_exchange() 3939 psa_destroy_key(handshake->xxdh_psa_privkey); in ssl_parse_client_key_exchange() 3946 psa_destroy_key(handshake->xxdh_psa_privkey); in ssl_parse_client_key_exchange() 3957 psa_destroy_key(handshake->xxdh_psa_privkey); in ssl_parse_client_key_exchange() [all …]
|
D | ssl_tls12_client.c | 172 psa_destroy_key(ssl->handshake->psa_pake_password); in ssl_write_ecjpake_kkpp_ext() 883 psa_destroy_key(ssl->handshake->psa_pake_password); in ssl_parse_ecjpake_kkpp() 2264 psa_destroy_key(ssl->handshake->psa_pake_password); in ssl_parse_server_key_exchange() 2805 psa_destroy_key(handshake->xxdh_psa_privkey); in ssl_write_client_key_exchange() 2824 destruction_status = psa_destroy_key(handshake->xxdh_psa_privkey); in ssl_write_client_key_exchange() 2977 psa_destroy_key(handshake->xxdh_psa_privkey); in ssl_write_client_key_exchange() 3007 destruction_status = psa_destroy_key(handshake->xxdh_psa_privkey); in ssl_write_client_key_exchange() 3166 psa_destroy_key(ssl->handshake->psa_pake_password); in ssl_write_client_key_exchange()
|
D | block_cipher.c | 60 psa_destroy_key(ctx->psa_key_id); in mbedtls_block_cipher_free()
|
/mbedtls-latest/tests/include/spe/ |
D | crypto_spe.h | 58 #define psa_destroy_key \ macro 59 PSA_FUNCTION_NAME(psa_destroy_key)
|
/mbedtls-latest/docs/architecture/psa-thread-safety/ |
D | psa-thread-safety.md | 59 > * A call to `psa_destroy_key()` must not overlap with a concurrent call to any of the following f… 90 Much like all other API calls, `psa_destroy_key` does not block indefinitely, and when `psa_destroy… 95 When `psa_destroy_key` is called on a key that is in use, guarantee 2 may be violated. This is cons… 225 … again). The copy of the key will not be destroyed during a call to `psa_destroy_key`, the thread … 229 …n `library/psa_crypto.c`. The destroying thread (the thread calling `psa_destroy_key`) does not al… 244 * `psa_destroy_key` - The linearization point for a successful destruction is the mutex unlock, the… 302 … be recovered. In the long term, it would be good to guarantee that `psa_destroy_key` wipes all co… 306 `psa_destroy_key` does not block indefinitely, and when `psa_destroy_key` returns: 318 …* When a thread calls `psa_destroy_key`, they continue as normal until the `psa_unregister_read` c…
|