Lines Matching refs:state

1199      * an unexpected state.
1206 switch (slot->state) {
1208 /* In this state psa_wipe_key_slot() must only be called if the
1211 /* In this state psa_wipe_key_slot() must only be called if the
1219 /* In this state registered_readers must be 0. */
1227 MBEDTLS_TEST_HOOK_TEST_ASSERT(slot->state != PSA_SLOT_EMPTY);
1231 /* The slot's state is invalid. */
1243 * This memset also sets the slot's state to PSA_SLOT_EMPTY. */
1274 /* We cannot unlock between setting the state to PENDING_DELETION
1281 if (slot->state == PSA_SLOT_PENDING_DELETION) {
1292 /* Set the key slot containing the key description's state to
1336 * state after a reset?
1734 * On success, the key slot's state is PSA_SLOT_FILLING.
1735 * It is the responsibility of the caller to change the slot's state to
1746 * \return If this function fails, the key slot is an invalid state.
1813 * secure element driver updates its persistent state, but we do not yet
1814 * save the driver's persistent state, so that if the power fails,
1815 * we can roll back to a state where the key doesn't exist. */
1857 * If the finalization succeeds, the function sets the key slot's state to
1876 * \return If this function fails, the key slot is an invalid state.
1965 * of this function. Sets the slot's state to PSA_SLOT_EMPTY.
3607 /* Likewise, failure state. */
3744 /* Likewise, failure state. */
5589 if (hkdf->state < HKDF_STATE_KEYED ||
5597 hkdf->state = HKDF_STATE_OUTPUT;
5798 switch (tls12_prf->state) {
5800 tls12_prf->state = PSA_TLS12_PRF_STATE_OUTPUT;
5962 switch (pbkdf2->state) {
5966 pbkdf2->state = PSA_PBKDF2_STATE_OUTPUT;
6079 /* Preserve the algorithm upon errors, but clear all sensitive state.
6735 if (hkdf->state != HKDF_STATE_INIT) {
6744 hkdf->state = HKDF_STATE_STARTED;
6750 /* We shouldn't be in different state as HKDF_EXPAND only allows
6752 * the state. It could happen only if the hkdf
6754 if (hkdf->state != HKDF_STATE_INIT) {
6769 if (hkdf->state == HKDF_STATE_INIT) {
6781 hkdf->state = HKDF_STATE_STARTED;
6783 if (hkdf->state != HKDF_STATE_STARTED) {
6800 hkdf->state = HKDF_STATE_KEYED;
6824 hkdf->state == HKDF_STATE_INIT) {
6828 if (hkdf->state == HKDF_STATE_OUTPUT) {
6856 if (prf->state != PSA_TLS12_PRF_STATE_INIT) {
6870 prf->state = PSA_TLS12_PRF_STATE_SEED_SET;
6879 if (prf->state != PSA_TLS12_PRF_STATE_SEED_SET &&
6880 prf->state != PSA_TLS12_PRF_STATE_OTHER_KEY_SET) {
6894 prf->state = PSA_TLS12_PRF_STATE_KEY_SET;
6903 if (prf->state != PSA_TLS12_PRF_STATE_KEY_SET) {
6917 prf->state = PSA_TLS12_PRF_STATE_LABEL_SET;
6948 const size_t pms_len = (prf->state == PSA_TLS12_PRF_STATE_OTHER_KEY_SET ?
6980 if (prf->state == PSA_TLS12_PRF_STATE_OTHER_KEY_SET) {
7011 if (prf->state != PSA_TLS12_PRF_STATE_SEED_SET) {
7027 prf->state = PSA_TLS12_PRF_STATE_OTHER_KEY_SET;
7090 if (pbkdf2->state != PSA_PBKDF2_STATE_INIT) {
7103 pbkdf2->state = PSA_PBKDF2_STATE_INPUT_COST_SET;
7112 if (pbkdf2->state == PSA_PBKDF2_STATE_INPUT_COST_SET) {
7113 pbkdf2->state = PSA_PBKDF2_STATE_SALT_SET;
7114 } else if (pbkdf2->state == PSA_PBKDF2_STATE_SALT_SET) {
7115 /* Appending to existing salt. No state change. */
7198 if (pbkdf2->state != PSA_PBKDF2_STATE_SALT_SET) {
7221 pbkdf2->state = PSA_PBKDF2_STATE_PASSWORD_SET;
8113 * We don't know what state the storage is in. Give up. */