Home
last modified time | relevance | path

Searched refs:destroy (Results 1 – 12 of 12) sorted by relevance

/openthread-latest/third_party/mbedtls/repo/tests/suites/
Dtest_suite_psa_crypto_persistent_key.data44 Persistent key destroy
48 Persistent key destroy after restart
Dtest_suite_psa_crypto_slot_management.function44 * close it, destroy it, or do nothing;
159 * volatile key shouldn't invalidate/destroy it.
268 * Do something that wipes key data in volatile memory or destroy the
897 * that they have the expected value and destroy them. In that process,
982 * expected value. Then, destroy it.
Dtest_suite_psa_crypto_se_driver_hal_mocks.function86 * MAX_KEY_ID_FOR_TEST. In addition, run the destroy function on key id
Dtest_suite_psa_crypto_se_driver_hal.function217 /* Null destroy: do nothing, but pretend it worked. */
1521 /* This time, destroy the key. */
Dtest_suite_pk.function570 /* Create a copy of a PSA key with same usage and algorithm policy and destroy
749 /* test that freeing the context does not destroy the key */
Dtest_suite_psa_crypto.function1348 * threads attempt to load/destroy the key, exactly one thread succeeds. */
1829 goto destroy;
1865 destroy:
1995 /* Test that when multiple threads use and destroy a key no corruption
10079 /* Split threads to generate key then destroy key. */
/openthread-latest/third_party/mbedtls/repo/docs/architecture/
Dpsa-storage-resilience.md77 …ever possible to revert this commitment by giving the secure element the order to destroy the key.)
157 * Minimize the information processing: [always destroy the key](#exploring-the-always-destroy-strat…
158 …ement, this has the advantage of maximizing the chance that a command to destroy key material is e…
192 #### Exploring the always-destroy strategy
217 #### Always-destroy strategy with a simpler transaction file
219 We can modify the [always-destroy strategy](#exploring-the-always-destroy-strategy) to make the tra…
243 Compared with the basic always-destroy strategy:
254 This gives an advantage to the “always destroy” strategy. Under this strategy, if the key might be …
324 …* It is correct to destroy the key in the secure element (treating a `DOES_NOT_EXIST` error as a s…
338 * If the file `id` does not exist, then destroy the key in the secure element (treating a `DOES_NOT…
[all …]
/openthread-latest/tests/scripts/thread-cert/
Dthread_cert.py134 node.destroy()
302 node.destroy()
Dnode.py78 self.destroy()
209 def destroy(self): member in OtbrDocker
762 def destroy(self): member in OtCli
/openthread-latest/third_party/mbedtls/repo/docs/proposed/
Dpsa-driver-interface.md561 4. Call the `"destroy_key"` entry point to destroy the key containing the key object.
1123 To destroy a key, the core simply destroys the wrapped key material, without invoking driver code.
1157 To destroy a key, the core calls the driver's `"destroy_key"` entry point.
1266 The core will pass authorized requests to destroy a built-in key to the [`"destroy_key"`](#key-mana…
1296 …e key is stored and which application and system actions will create and destroy it. The lifetime …
/openthread-latest/third_party/mbedtls/repo/docs/architecture/psa-migration/
Dstrategy.md100 management functions (destroy etc)) in configurations that don't have
/openthread-latest/third_party/mbedtls/repo/docs/
Dpsa-transition.md94 3. Finally destroy the key object with [`psa_destroy_key`](https://mbed-tls.readthedocs.io/projects…
1084 …an, you need to create a key object, then perform the key exchange, then destroy the key. There is…