Searched refs:object (Results 1 – 21 of 21) sorted by relevance
80 …by the calling code. For example, multipart operations store state in a multipart operation object.92 1. First create a key object with a key creation function. The two most common ones are [`psa_impor…94 3. Finally destroy the key object with [`psa_destroy_key`](https://mbed-tls.readthedocs.io/projects…98 …feeef74ac6f75bf). If you need the public key corresponding to a key pair object, call [`psa_export…341 …object contains the necessary key material. In the PSA API, an operation object contains a referen…345 Here is an overview of the lifecycle of a key object.352 ….io/projects/api/en/development/api/file/crypto__types_8h/#_CPPv412psa_key_id_t) to the key object.356 …in the following sections to perform operations on the key. The same key object can be used in mul…357 4. To free the resources used by the key object, call [`psa_destroy_key`](https://mbed-tls.readthed…367 5. Finally free the resources associated with the operation object by calling `mbedtls_cipher_free`.[all …]
44 …- An object file compiled for the target platform defining the functions required by the driver de…46 …ers/test_driver.h). As Mbed TLS tests are built from source, there is no object file for the test …
147 …ey pair or public key (`mbedtls_pk_context`) and needs to create a PSA key object (`psa_key_id_t`).149 Reasons for first creating a legacy key object, where it's impossible or impractical to directly cr…151 * A very common case where the input is a legacy key object is parsing. PSA does not (yet) have an …153 * The pk object may be created by a part of the application (or a third-party library) that hasn't …155 Reasons for needing a PSA key object:160 Gap: a way to create a PSA key object from an `mbedtls_pk_context`. This partially exists in the fo…164 … needs to use it through an interface that wants an `mbedtls_pk_context` object. Typically, there …169 …object to the PSA key, which is error-prone: if the PSA key is destroyed but the PK object isn't, …174 …ks for any PSA key but is limited by the key's lifetime and creates a PK object with limited funct…175 …ction. This requires an exportable key but creates a fully independent, fully functional PK object.[all …]
466 `mbedtls_pk_context` object, which would probably change to a `psa_key_id_t`.
57 * An object file compiled for the target platform defining the entry point functions specified by t…59 How to provide the driver description file, the C header files and the object code is implementatio…65 In addition to the properties described here, any JSON object may have a property called `"_comment…75 A driver description is a JSON object containing the following properties:92 A capability is a JSON object containing the following properties:98 …object). A mapping from entry point names described by the `"entry_points"` property, to the name …243 …operation family. If this fails, the core destroys the operation context object without calling an…244 1. The core calls other entry points that manipulate the operation context object, respecting the c…245 …try point for this operation family, then destroys the operation context object without calling an…246 1. If a “finish” entry point fails, the core destroys the operation context object without calling …[all …]
17 …ild. The driver code can either be provided in binary form as additional object file to link, or i…
34 * An object file compiled for the target platform defining the functions required by the driver des…
19 object files and coverage statistics files.
24 JSONSchema = NewType('JSONSchema', object)
40 not limited to compiled object code, generated documentation,349 under Section 2) in object code or executable form under the terms of366 received the program in object code or executable form with such380 If distribution of executable or object code is made by offering384 compelled to copy the source along with the object code.
2047 those always built an mpi object with at least one limb.2087 mbedtls_mpi_read_string() now construct an mbedtls_mpi object with 0 limbs2615 tests/src are compiled and the resulting object linked into each test2763 * Key derivation inputs in the PSA API can now either come from a key object4459 the same mbedtls_ssl_config object and memory allocation fails. Found by
131 * in the key object and this could perturb the test. */
175 * test the resulting state of the operation object. */207 * test the resulting state of the operation object. */2107 /* Test each valid way of initializing the object, except for `= {0}`, as2916 /* Test each valid way of initializing the object, except for `= {0}`, as2971 * test the resulting state of the operation object. */2976 /* Now the operation object should be reusable. */3436 /* Test each valid way of initializing the object, except for `= {0}`, as3487 /* The operation object should be reusable. */3861 /* Test each valid way of initializing the object, except for `= {0}`, as3918 /* The operation object should be reusable. */[all …]
13 /* Check the validity of the sign bit in an MPI object. Reject representations
828 /* Randomly pass a reader object back and forth between lower and
249 * \param pk The PK object to fill. It must have been initialized
1601 Hash operation object initializers zero properly1739 MAC operation object initializers zero properly2194 Cipher operation object initializers zero properly5222 Crypto derivation operation object initializers zero properly
8 … key identifier (key ID for short). Applications must first create a key object, which allocates s…18 A key slot has the type `psa_key_slot_t`. The key store is a global object which is private inside …24 * **Creating** a key object, through means such as import, random generation, deterministic derivat…
54 It must be possible to move a context object in memory (except during the execution of a library fu…
106 typing.Callable[[bytes], object]]]) \ argument
63 > * Concurrent calls must not use the same operation object.225 …nctions follow the above pattern. The key is copied into the `operation` object, and the thread un…331 Concurrent access to the same operation object can compromise the crypto service. For example, if t…