More renaming: method -> production parameters
Signed-off-by: Gilles Peskine <Gilles.Peskine@arm.com>
This commit is contained in:
parent
092ce51c47
commit
23605d19d9
3 changed files with 11 additions and 10 deletions
|
@ -3782,7 +3782,8 @@ psa_status_t psa_key_derivation_output_key(
|
||||||
* this function is equivalent to
|
* this function is equivalent to
|
||||||
* psa_key_derivation_output_key().
|
* psa_key_derivation_output_key().
|
||||||
* Mbed TLS currently only supports the default
|
* Mbed TLS currently only supports the default
|
||||||
* method, i.e. #PSA_KEY_PRODUCTION_PARAMETERS_INIT,
|
* production parameters, i.e.
|
||||||
|
* #PSA_KEY_PRODUCTION_PARAMETERS_INIT,
|
||||||
* for all key types.
|
* for all key types.
|
||||||
* \param params_data_length
|
* \param params_data_length
|
||||||
* Length of `params->data` in bytes.
|
* Length of `params->data` in bytes.
|
||||||
|
|
|
@ -455,11 +455,11 @@ typedef uint64_t psa_key_slot_number_t;
|
||||||
*/
|
*/
|
||||||
typedef uint16_t psa_key_derivation_step_t;
|
typedef uint16_t psa_key_derivation_step_t;
|
||||||
|
|
||||||
/** \brief Custom method for key generation or key derivation.
|
/** \brief Custom parameters for key generation or key derivation.
|
||||||
*
|
*
|
||||||
* This is a structure type with at least the following fields:
|
* This is a structure type with at least the following fields:
|
||||||
*
|
*
|
||||||
* - \c flags: an unsigned integer type. 0 for the default method.
|
* - \c flags: an unsigned integer type. 0 for the default production parameters.
|
||||||
* - \c data: a flexible array of bytes.
|
* - \c data: a flexible array of bytes.
|
||||||
*
|
*
|
||||||
* The interpretation of this structure depend on the type of the
|
* The interpretation of this structure depend on the type of the
|
||||||
|
@ -472,8 +472,8 @@ typedef uint16_t psa_key_derivation_step_t;
|
||||||
* Implementations must support 65535, should support 3 and may
|
* Implementations must support 65535, should support 3 and may
|
||||||
* support other values.
|
* support other values.
|
||||||
* When not using a driver, Mbed TLS supports values up to \c INT_MAX.
|
* When not using a driver, Mbed TLS supports values up to \c INT_MAX.
|
||||||
* If this is empty or if the custom method is omitted altogether,
|
* If this is empty or if the custom production parameters are omitted
|
||||||
* the default value 65537 is used.
|
* altogether, the default value 65537 is used.
|
||||||
* - Other key types: reserved for future use. \c flags must be 0.
|
* - Other key types: reserved for future use. \c flags must be 0.
|
||||||
*
|
*
|
||||||
*/
|
*/
|
||||||
|
|
|
@ -6870,15 +6870,15 @@ PSA key derivation: PBKDF2-AES-CMAC-PRF-128-> AES-256
|
||||||
depends_on:PSA_WANT_ALG_PBKDF2_AES_CMAC_PRF_128:PSA_WANT_ALG_CMAC:PSA_WANT_KEY_TYPE_AES:!MBEDTLS_AES_ONLY_128_BIT_KEY_LENGTH
|
depends_on:PSA_WANT_ALG_PBKDF2_AES_CMAC_PRF_128:PSA_WANT_ALG_CMAC:PSA_WANT_KEY_TYPE_AES:!MBEDTLS_AES_ONLY_128_BIT_KEY_LENGTH
|
||||||
derive_key_type:PSA_ALG_PBKDF2_AES_CMAC_PRF_128:"706173737764":"01":"73616c74":PSA_KEY_TYPE_AES:256:"28e288c6345bb5ecf7ca70274208a3ba0f1148b5868537d5e09d3ee6813b1f52"
|
derive_key_type:PSA_ALG_PBKDF2_AES_CMAC_PRF_128:"706173737764":"01":"73616c74":PSA_KEY_TYPE_AES:256:"28e288c6345bb5ecf7ca70274208a3ba0f1148b5868537d5e09d3ee6813b1f52"
|
||||||
|
|
||||||
PSA key derivation: default method -> AES-128
|
PSA key derivation: default params -> AES-128
|
||||||
depends_on:PSA_WANT_ALG_HKDF:PSA_WANT_ALG_SHA_256:PSA_WANT_KEY_TYPE_AES
|
depends_on:PSA_WANT_ALG_HKDF:PSA_WANT_ALG_SHA_256:PSA_WANT_KEY_TYPE_AES
|
||||||
derive_key_ext:PSA_ALG_HKDF(PSA_ALG_SHA_256):"0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b":"000102030405060708090a0b0c":"f0f1f2f3f4f5f6f7f8f9":PSA_KEY_TYPE_AES:128:0:"":PSA_SUCCESS:"3cb25f25faacd57a90434f64d0362f2a"
|
derive_key_ext:PSA_ALG_HKDF(PSA_ALG_SHA_256):"0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b":"000102030405060708090a0b0c":"f0f1f2f3f4f5f6f7f8f9":PSA_KEY_TYPE_AES:128:0:"":PSA_SUCCESS:"3cb25f25faacd57a90434f64d0362f2a"
|
||||||
|
|
||||||
PSA key derivation: method.flags=1 -> AES-128
|
PSA key derivation: params.flags=1 -> AES-128
|
||||||
depends_on:PSA_WANT_ALG_HKDF:PSA_WANT_ALG_SHA_256:PSA_WANT_KEY_TYPE_AES
|
depends_on:PSA_WANT_ALG_HKDF:PSA_WANT_ALG_SHA_256:PSA_WANT_KEY_TYPE_AES
|
||||||
derive_key_ext:PSA_ALG_HKDF(PSA_ALG_SHA_256):"0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b":"000102030405060708090a0b0c":"f0f1f2f3f4f5f6f7f8f9":PSA_KEY_TYPE_AES:128:1:"":PSA_ERROR_INVALID_ARGUMENT:""
|
derive_key_ext:PSA_ALG_HKDF(PSA_ALG_SHA_256):"0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b":"000102030405060708090a0b0c":"f0f1f2f3f4f5f6f7f8f9":PSA_KEY_TYPE_AES:128:1:"":PSA_ERROR_INVALID_ARGUMENT:""
|
||||||
|
|
||||||
PSA key derivation: method.data non-empty -> AES-128
|
PSA key derivation: params.data non-empty -> AES-128
|
||||||
depends_on:PSA_WANT_ALG_HKDF:PSA_WANT_ALG_SHA_256:PSA_WANT_KEY_TYPE_AES
|
depends_on:PSA_WANT_ALG_HKDF:PSA_WANT_ALG_SHA_256:PSA_WANT_KEY_TYPE_AES
|
||||||
derive_key_ext:PSA_ALG_HKDF(PSA_ALG_SHA_256):"0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b":"000102030405060708090a0b0c":"f0f1f2f3f4f5f6f7f8f9":PSA_KEY_TYPE_AES:128:0:"2a":PSA_ERROR_INVALID_ARGUMENT:""
|
derive_key_ext:PSA_ALG_HKDF(PSA_ALG_SHA_256):"0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b":"000102030405060708090a0b0c":"f0f1f2f3f4f5f6f7f8f9":PSA_KEY_TYPE_AES:128:0:"2a":PSA_ERROR_INVALID_ARGUMENT:""
|
||||||
|
|
||||||
|
@ -7473,7 +7473,7 @@ PSA generate key: FFDH, 1024 bits, invalid bits
|
||||||
depends_on:PSA_WANT_ALG_FFDH:PSA_WANT_KEY_TYPE_DH_KEY_PAIR_GENERATE
|
depends_on:PSA_WANT_ALG_FFDH:PSA_WANT_KEY_TYPE_DH_KEY_PAIR_GENERATE
|
||||||
generate_key:PSA_KEY_TYPE_DH_KEY_PAIR(PSA_DH_FAMILY_RFC7919):1024:PSA_KEY_USAGE_EXPORT:PSA_ALG_FFDH:PSA_ERROR_NOT_SUPPORTED:0
|
generate_key:PSA_KEY_TYPE_DH_KEY_PAIR(PSA_DH_FAMILY_RFC7919):1024:PSA_KEY_USAGE_EXPORT:PSA_ALG_FFDH:PSA_ERROR_NOT_SUPPORTED:0
|
||||||
|
|
||||||
PSA generate key ext: RSA, method.flags=1
|
PSA generate key ext: RSA, params.flags=1
|
||||||
depends_on:PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_GENERATE
|
depends_on:PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_GENERATE
|
||||||
generate_key_ext:PSA_KEY_TYPE_RSA_KEY_PAIR:PSA_VENDOR_RSA_GENERATE_MIN_KEY_BITS:PSA_KEY_USAGE_ENCRYPT | PSA_KEY_USAGE_DECRYPT:0:1:"":PSA_ERROR_INVALID_ARGUMENT
|
generate_key_ext:PSA_KEY_TYPE_RSA_KEY_PAIR:PSA_VENDOR_RSA_GENERATE_MIN_KEY_BITS:PSA_KEY_USAGE_ENCRYPT | PSA_KEY_USAGE_DECRYPT:0:1:"":PSA_ERROR_INVALID_ARGUMENT
|
||||||
|
|
||||||
|
@ -7546,7 +7546,7 @@ PSA generate key ext: ECC, flags=1
|
||||||
depends_on:PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_GENERATE:PSA_WANT_ECC_SECP_R1_256:PSA_WANT_ALG_ECDH
|
depends_on:PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_GENERATE:PSA_WANT_ECC_SECP_R1_256:PSA_WANT_ALG_ECDH
|
||||||
generate_key_ext:PSA_KEY_TYPE_ECC_KEY_PAIR(PSA_ECC_FAMILY_SECP_R1):256:PSA_KEY_USAGE_DERIVE:PSA_ALG_ECDH:1:"":PSA_ERROR_INVALID_ARGUMENT
|
generate_key_ext:PSA_KEY_TYPE_ECC_KEY_PAIR(PSA_ECC_FAMILY_SECP_R1):256:PSA_KEY_USAGE_DERIVE:PSA_ALG_ECDH:1:"":PSA_ERROR_INVALID_ARGUMENT
|
||||||
|
|
||||||
PSA generate key ext: ECC, method.data non-empty
|
PSA generate key ext: ECC, params.data non-empty
|
||||||
depends_on:PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_GENERATE:PSA_WANT_ECC_SECP_R1_256:PSA_WANT_ALG_ECDH
|
depends_on:PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_GENERATE:PSA_WANT_ECC_SECP_R1_256:PSA_WANT_ALG_ECDH
|
||||||
generate_key_ext:PSA_KEY_TYPE_ECC_KEY_PAIR(PSA_ECC_FAMILY_SECP_R1):256:PSA_KEY_USAGE_DERIVE:PSA_ALG_ECDH:0:"2a":PSA_ERROR_INVALID_ARGUMENT
|
generate_key_ext:PSA_KEY_TYPE_ECC_KEY_PAIR(PSA_ECC_FAMILY_SECP_R1):256:PSA_KEY_USAGE_DERIVE:PSA_ALG_ECDH:0:"2a":PSA_ERROR_INVALID_ARGUMENT
|
||||||
|
|
||||||
|
|
Loading…
Reference in a new issue