mbedTLS
psa_key_usage_t
is only used within mbedTLS.
Symbol previews are coming soon...
Symbols
loading...
Files
loading (1/5)...
Summary
Syntax
Examples
References
Call Tree
Data Use
Class Tree
Override Tree
Implementations
Instances
Lifecycle
SourceVu
ESP-IDF Framework and Examples
mbedTLS
psa_key_usage_t
psa_key_usage_t
Encoding of permitted usage on a key. Values of this type are generally constructed as bitwise-ors of macros called `PSA_KEY_USAGE_xxx`.
Syntax
Show:
Summary
Declaration
from
crypto_types.h:323
typedef
uint32_t
psa_key_usage_t
;
Examples
References
from
examples
Code
Location
Scope
Referrer
typedef
uint32_t
psa_key_usage_t
;
crypto_types.h:323
psa_key_usage_t
usage_flags
)
;
crypto.h:232
psa_set_key_usage_flags()
psa_set_key_usage_flags()::usage_flags
static
psa_key_usage_t
psa_get_key_usage_flags
(
crypto.h:244
psa_get_key_usage_flags()
psa_key_usage_t
MBEDTLS_PRIVATE
(
usage
)
;
crypto_struct.h:269
psa_key_policy_s
static
inline
void
psa_extend_key_usage_flags
(
psa_key_usage_t
*
usage_flags
)
crypto_struct.h:383
psa_extend_key_usage_flags()
psa_extend_key_usage_flags()::usage_flags
if
(
*
usage_flags
&
PSA_KEY_USAGE_SIGN_HASH
)
{
crypto_struct.h:385
psa_extend_key_usage_flags()
*
usage_flags
|=
PSA_KEY_USAGE_SIGN_MESSAGE
;
crypto_struct.h:386
psa_extend_key_usage_flags()
if
(
*
usage_flags
&
PSA_KEY_USAGE_VERIFY_HASH
)
{
crypto_struct.h:389
psa_extend_key_usage_flags()
*
usage_flags
|=
PSA_KEY_USAGE_VERIFY_MESSAGE
;
crypto_struct.h:390
psa_extend_key_usage_flags()
psa_key_usage_t
usage_flags
)
crypto_struct.h:395
psa_set_key_usage_flags()
static
inline
psa_key_usage_t
psa_get_key_usage_flags
(
crypto_struct.h:401
psa_get_key_usage_flags()
psa_key_usage_t
usage
,
pk.c:405
mbedtls_pk_get_psa_attributes()
mbedtls_pk_get_psa_attributes()::usage
psa_key_usage_t
more_usage
=
usage
;
pk.c:410
mbedtls_pk_get_psa_attributes()
if
(
usage
==
PSA_KEY_USAGE_SIGN_MESSAGE
)
{
pk.c:411
mbedtls_pk_get_psa_attributes()
more_usage
|=
PSA_KEY_USAGE_VERIFY_MESSAGE
;
pk.c:412
mbedtls_pk_get_psa_attributes()
}
else
if
(
usage
==
PSA_KEY_USAGE_SIGN_HASH
)
{
pk.c:413
mbedtls_pk_get_psa_attributes()
more_usage
|=
PSA_KEY_USAGE_VERIFY_HASH
;
pk.c:414
mbedtls_pk_get_psa_attributes()
}
else
if
(
usage
==
PSA_KEY_USAGE_DECRYPT
)
{
pk.c:415
mbedtls_pk_get_psa_attributes()
more_usage
|=
PSA_KEY_USAGE_ENCRYPT
;
pk.c:416
mbedtls_pk_get_psa_attributes()
more_usage
|=
PSA_KEY_USAGE_EXPORT
|
PSA_KEY_USAGE_COPY
;
pk.c:418
mbedtls_pk_get_psa_attributes()
int
want_private
=
!
(
usage
==
PSA_KEY_USAGE_VERIFY_MESSAGE
||
pk.c:420
mbedtls_pk_get_psa_attributes()
usage
==
PSA_KEY_USAGE_VERIFY_HASH
||
pk.c:421
mbedtls_pk_get_psa_attributes()
usage
==
PSA_KEY_USAGE_ENCRYPT
)
;
pk.c:422
mbedtls_pk_get_psa_attributes()
case
PSA_KEY_USAGE_SIGN_MESSAGE
:
pk.c:430
mbedtls_pk_get_psa_attributes()
case
PSA_KEY_USAGE_SIGN_HASH
:
pk.c:431
mbedtls_pk_get_psa_attributes()
case
PSA_KEY_USAGE_VERIFY_MESSAGE
:
pk.c:432
mbedtls_pk_get_psa_attributes()
case
PSA_KEY_USAGE_VERIFY_HASH
:
pk.c:433
mbedtls_pk_get_psa_attributes()
case
PSA_KEY_USAGE_DECRYPT
:
pk.c:436
mbedtls_pk_get_psa_attributes()
case
PSA_KEY_USAGE_ENCRYPT
:
pk.c:437
mbedtls_pk_get_psa_attributes()
case
PSA_KEY_USAGE_SIGN_MESSAGE
:
pk.c:483
mbedtls_pk_get_psa_attributes()
case
PSA_KEY_USAGE_SIGN_HASH
:
pk.c:484
mbedtls_pk_get_psa_attributes()
case
PSA_KEY_USAGE_VERIFY_MESSAGE
:
pk.c:485
mbedtls_pk_get_psa_attributes()
case
PSA_KEY_USAGE_VERIFY_HASH
:
pk.c:486
mbedtls_pk_get_psa_attributes()
case
PSA_KEY_USAGE_DERIVE
:
pk.c:496
mbedtls_pk_get_psa_attributes()
psa_key_usage_t
usage
,
pk.h:601
mbedtls_pk_get_psa_attributes()
mbedtls_pk_get_psa_attributes()::usage
psa_key_usage_t
usage
,
psa_crypto.c:1094
psa_get_and_lock_key_slot_with_policy()
psa_get_and_lock_key_slot_with_policy()::usage
usage
&=
~
PSA_KEY_USAGE_EXPORT
;
psa_crypto.c:1111
psa_get_and_lock_key_slot_with_policy()
psa_key_usage_t
usage
,
psa_crypto.c:1160
psa_get_and_lock_transparent_key_slot_with_policy()
psa_get_and_lock_transparent_key_slot_with_policy()::usage
PSA_KEY_USAGE_EXPORT
,
0
)
;
psa_crypto.c:1519
psa_export_key()
if
(
(
policy
->
usage
&
~
(
PSA_KEY_USAGE_EXPORT
|
psa_crypto.c:1662
psa_validate_key_policy()
PSA_KEY_USAGE_COPY
|
psa_crypto.c:1663
psa_validate_key_policy()
PSA_KEY_USAGE_ENCRYPT
|
psa_crypto.c:1664
psa_validate_key_policy()
PSA_KEY_USAGE_DECRYPT
|
psa_crypto.c:1665
psa_validate_key_policy()
PSA_KEY_USAGE_SIGN_MESSAGE
|
psa_crypto.c:1666
psa_validate_key_policy()
PSA_KEY_USAGE_VERIFY_MESSAGE
|
psa_crypto.c:1667
psa_validate_key_policy()
PSA_KEY_USAGE_SIGN_HASH
|
psa_crypto.c:1668
psa_validate_key_policy()
PSA_KEY_USAGE_VERIFY_HASH
|
psa_crypto.c:1669
psa_validate_key_policy()
PSA_KEY_USAGE_VERIFY_DERIVATION
|
psa_crypto.c:1670
psa_validate_key_policy()
PSA_KEY_USAGE_DERIVE
)
)
!=
0
)
{
psa_crypto.c:1671
psa_validate_key_policy()
source_key
,
&
source_slot
,
PSA_KEY_USAGE_COPY
,
0
)
;
psa_crypto.c:2213
psa_copy_key()
is_sign
?
PSA_KEY_USAGE_SIGN_MESSAGE
:
PSA_KEY_USAGE_VERIFY_MESSAGE
,
psa_crypto.c:2634
psa_mac_setup()
is_sign
?
PSA_KEY_USAGE_SIGN_MESSAGE
:
PSA_KEY_USAGE_VERIFY_MESSAGE
,
psa_crypto.c:2830
psa_mac_compute_internal()
input_is_message
?
PSA_KEY_USAGE_SIGN_MESSAGE
:
psa_crypto.c:2997
psa_sign_internal()
PSA_KEY_USAGE_SIGN_HASH
,
psa_crypto.c:2998
psa_sign_internal()
input_is_message
?
PSA_KEY_USAGE_VERIFY_MESSAGE
:
psa_crypto.c:3052
psa_verify_internal()
PSA_KEY_USAGE_VERIFY_HASH
,
psa_crypto.c:3053
psa_verify_internal()
key
,
&
slot
,
PSA_KEY_USAGE_ENCRYPT
,
alg
)
;
psa_crypto.c:3374
psa_asymmetric_encrypt()
key
,
&
slot
,
PSA_KEY_USAGE_DECRYPT
,
alg
)
;
psa_crypto.c:3433
psa_asymmetric_decrypt()
PSA_KEY_USAGE_SIGN_HASH
,
psa_crypto.c:3536
psa_sign_hash_start()
PSA_KEY_USAGE_VERIFY_HASH
,
psa_crypto.c:3696
psa_verify_hash_start()
psa_key_usage_t
usage
=
(
cipher_operation
==
MBEDTLS_ENCRYPT
?
psa_crypto.c:4288
psa_cipher_setup()
PSA_KEY_USAGE_ENCRYPT
:
psa_crypto.c:4289
psa_cipher_setup()
PSA_KEY_USAGE_DECRYPT
)
;
psa_crypto.c:4290
psa_cipher_setup()
PSA_KEY_USAGE_ENCRYPT
,
psa_crypto.c:4580
psa_cipher_encrypt()
PSA_KEY_USAGE_DECRYPT
,
psa_crypto.c:4655
psa_cipher_decrypt()
key
,
&
slot
,
PSA_KEY_USAGE_ENCRYPT
,
alg
)
;
psa_crypto.c:4782
psa_aead_encrypt()
key
,
&
slot
,
PSA_KEY_USAGE_DECRYPT
,
alg
)
;
psa_crypto.c:4848
psa_aead_decrypt()
psa_key_usage_t
key_usage
=
0
;
psa_crypto.c:4935
psa_aead_setup()
key_usage
=
PSA_KEY_USAGE_ENCRYPT
;
psa_crypto.c:4954
psa_aead_setup()
key_usage
=
PSA_KEY_USAGE_DECRYPT
;
psa_crypto.c:4956
psa_aead_setup()
psa_set_key_usage_flags
(
&
attributes
,
PSA_KEY_USAGE_SIGN_HASH
)
;
psa_crypto.c:5483
psa_key_derivation_start_hmac()
key
,
&
slot
,
PSA_KEY_USAGE_DERIVE
,
operation
->
alg
)
;
psa_crypto.c:7478
psa_key_derivation_input_key()
private_key
,
&
slot
,
PSA_KEY_USAGE_DERIVE
,
operation
->
alg
)
;
psa_crypto.c:7633
psa_key_derivation_key_agreement()
private_key
,
&
slot
,
PSA_KEY_USAGE_DERIVE
,
alg
)
;
psa_crypto.c:7683
psa_raw_key_agreement()
PSA_KEY_USAGE_DERIVE
,
psa_crypto.c:8526
psa_pake_set_password_key()
Call Tree
from
examples
All items filtered out
All items filtered out
Data Use
from
examples
All items filtered out
All items filtered out
Class Tree
from
examples
All items filtered out
All items filtered out
Override Tree
from
examples
All items filtered out
All items filtered out
Implementations
from
examples
All items filtered out
All items filtered out
Instances
from
examples
Instance
Scope
Location
Project
mbedtls_pk_get_psa_attributes()::usage
mbedtls_pk_get_psa_attributes()
pk.h:601
psa_set_key_usage_flags()::usage_flags
psa_set_key_usage_flags()
crypto.h:232
return
psa_get_key_usage_flags()
crypto.h:244
psa_key_policy_s::usage
psa_key_policy_s
crypto_struct.h:269
psa_extend_key_usage_flags()::usage_flags
psa_extend_key_usage_flags()
crypto_struct.h:383
return
psa_get_key_usage_flags()
crypto_struct.h:401
mbedtls_pk_get_psa_attributes()::usage
mbedtls_pk_get_psa_attributes()
pk.c:405
psa_get_and_lock_key_slot_with_policy()::usage
psa_get_and_lock_key_slot_with_policy()
psa_crypto.c:1094
psa_get_and_lock_transparent_key_slot_with_policy()::usage
psa_get_and_lock_transparent_key_slot_with_policy()
psa_crypto.c:1160
Lifecycle
from
examples
All items filtered out
All items filtered out