aboutsummaryrefslogtreecommitdiff
path: root/include/psa
AgeCommit message (Expand)AuthorFilesLines
2024-06-12Move PSA headersRonald Cron23-14790/+0
2024-06-03crypto.h: fix documentation for some functionsValerio Setti1-3/+3
2024-05-29Tweak wordingGilles Peskine4-4/+4
2024-05-29Error out if *adjust* headers are included manuallyGilles Peskine4-0/+32
2024-05-29Document check-config.h and *adjust*.h as internal headersGilles Peskine3-0/+6
2024-05-17Fix crypto_adjust_config_dependencies.h documentationRonald Cron1-2/+6
2024-05-17Fix PBKDF2_AES_CMAC_PRF_128 dependenciesRonald Cron1-1/+2
2024-05-17Fix the resolution of dependencies on HMACRonald Cron1-6/+12
2024-05-16Resolve PBKDF2_AES_CMAC_PRF_128 dependenciesRonald Cron1-0/+5
2024-05-16Resolve some HMAC dependencies automaticallyRonald Cron1-0/+27
2024-03-26Fix typo in psa_key_production_parameters_t doc: 65535 should be 65537Tom Cosgrove1-1/+1
2024-03-14Document security weakness in concurrent execution of psa_destroy_keyRyan Everett1-0/+5
2024-02-28Fix code styleGilles Peskine1-4/+4
2024-02-28Get rid of flags in attributesGilles Peskine1-25/+1
2024-02-28In attributes, keep track of slot number through a dedicated fieldGilles Peskine2-4/+4
2024-02-28Get rid of psa_core_key_attributes_tGilles Peskine1-35/+5
2024-02-28Don't access psa_key_attributes_t.coreGilles Peskine2-23/+23
2024-02-28Switch key slots to psa_key_attributes_tGilles Peskine1-5/+29
2024-02-28psa_key_attributes_t: move slot_number to core structureGilles Peskine2-15/+11
2024-02-26Remove domain parameters from psa_key_attributes_tGilles Peskine1-16/+2
2024-02-26Remove domain parameters from the public APIGilles Peskine3-149/+78
2024-02-26typoGilles Peskine1-1/+1
2024-02-26Merge pull request #8815 from gilles-peskine-arm/psa_generate_key_ext-prototypeGilles Peskine3-7/+192
2024-02-21Merge remote-tracking branch 'development' into pk_import_into_psa-implement_...Gilles Peskine1-0/+2
2024-02-20More renaming: method -> production parametersGilles Peskine2-5/+6
2024-02-20Rename "key generation method" to "key production parameters"Gilles Peskine3-32/+34
2024-02-20Remove initialization function for variable-length structGilles Peskine1-7/+0
2024-02-20Fix copypastaGilles Peskine1-2/+2
2024-02-15Fix copypastaGilles Peskine1-1/+1
2024-02-15generate/derive key ext: pass method_data_length rather than method_lengthGilles Peskine2-19/+11
2024-02-15Document new functions psa_generate_key_ext, psa_key_derivation_output_key_extGilles Peskine3-7/+204
2024-02-12Merge pull request #8764 from Ryan-Everett-arm/threadsafe-key-wipingJanos Follath1-0/+2
2024-02-07Merge pull request #8717 from valeriosetti/issue8030Manuel Pégourié-Gonnard2-3/+19
2024-02-06Merge pull request #8729 from adeaarm/crypto_struct_client_viewGilles Peskine3-2/+74
2024-02-06Merge pull request #8745 from adeaarm/trail_key_id_fieldDave Rodgman1-6/+23
2024-02-05Correct the ENCODES_OWNER macro name in commentAntonio de Angelis1-1/+1
2024-02-02Add a client view layout for interruptible hash and pakeAntonio de Angelis2-0/+24
2024-02-02Add comments in psa/crypto_struct.h for id layoutAntonio de Angelis1-0/+17
2024-01-29Update psa_wipe_all_key_slots and document non-thread safetyRyan Everett1-0/+2
2024-01-24Put the id field at the end of the psa_key_attributes_s structureAntonio de Angelis1-6/+6
2024-01-24Merge remote-tracking branch 'restricted/development' into mbedtls-3.5.2rcDave Rodgman8-90/+74
2024-01-22Add warning for PKCS 1.5 decryptionJanos Follath1-0/+7
2024-01-22Update the initialization macrosAntonio de Angelis1-1/+20
2024-01-22Add a client view of the multipart contextsAntonio de Angelis2-1/+30
2024-01-18Support PSA_ERROR_SERVICE_FAILURERyan Everett1-0/+5
2024-01-17crypto_sizes: adjust PSA_VENDOR_FFDH_MAX_KEY_BITS based on the supported groupsValerio Setti1-3/+13
2024-01-17crypto_config: define feature macros for DH keysValerio Setti1-0/+6
2024-01-09Merge pull request #8668 from gilles-peskine-arm/asymmetric_key_data-secpr1Manuel Pégourié-Gonnard1-2/+17
2024-01-08Merge pull request #8632 from valeriosetti/issue8598Manuel Pégourié-Gonnard1-0/+4
2024-01-03Indicate which curves Mbed TLS supportsGilles Peskine1-1/+14