Pacify clang15 warnings about empty /retval
Signed-off-by: Paul Elliott <paul.elliott@arm.com>
This commit is contained in:
parent
cd70070c25
commit
24f4b73ee5
2 changed files with 22 additions and 22 deletions
|
@ -47,8 +47,8 @@
|
||||||
* \retval #PSA_ERROR_INVALID_ARGUMENT
|
* \retval #PSA_ERROR_INVALID_ARGUMENT
|
||||||
* \p key_buffer_size, \p peer_key_length, \p shared_secret_size
|
* \p key_buffer_size, \p peer_key_length, \p shared_secret_size
|
||||||
* do not match
|
* do not match
|
||||||
* \retval #PSA_ERROR_INSUFFICIENT_MEMORY
|
* \retval #PSA_ERROR_INSUFFICIENT_MEMORY \emptydescription
|
||||||
* \retval #PSA_ERROR_CORRUPTION_DETECTED
|
* \retval #PSA_ERROR_CORRUPTION_DETECTED \emptydescription
|
||||||
*/
|
*/
|
||||||
psa_status_t mbedtls_psa_key_agreement_ffdh(
|
psa_status_t mbedtls_psa_key_agreement_ffdh(
|
||||||
const psa_key_attributes_t *attributes,
|
const psa_key_attributes_t *attributes,
|
||||||
|
@ -73,9 +73,9 @@ psa_status_t mbedtls_psa_key_agreement_ffdh(
|
||||||
* \retval #PSA_SUCCESS The public key was exported successfully.
|
* \retval #PSA_SUCCESS The public key was exported successfully.
|
||||||
* \retval #PSA_ERROR_BUFFER_TOO_SMALL
|
* \retval #PSA_ERROR_BUFFER_TOO_SMALL
|
||||||
* The size of \p key_buffer is too small.
|
* The size of \p key_buffer is too small.
|
||||||
* \retval #PSA_ERROR_NOT_PERMITTED
|
* \retval #PSA_ERROR_NOT_PERMITTED \emptydescription
|
||||||
* \retval #PSA_ERROR_INSUFFICIENT_MEMORY
|
* \retval #PSA_ERROR_INSUFFICIENT_MEMORY \emptydescription
|
||||||
* \retval #PSA_ERROR_CORRUPTION_DETECTED
|
* \retval #PSA_ERROR_CORRUPTION_DETECTED \emptydescription
|
||||||
*/
|
*/
|
||||||
psa_status_t mbedtls_psa_export_ffdh_public_key(
|
psa_status_t mbedtls_psa_export_ffdh_public_key(
|
||||||
const psa_key_attributes_t *attributes,
|
const psa_key_attributes_t *attributes,
|
||||||
|
@ -103,8 +103,8 @@ psa_status_t mbedtls_psa_export_ffdh_public_key(
|
||||||
* Key size in bits is invalid.
|
* Key size in bits is invalid.
|
||||||
* \retval #PSA_ERROR_BUFFER_TOO_SMALL
|
* \retval #PSA_ERROR_BUFFER_TOO_SMALL
|
||||||
* The size of \p key_buffer is too small.
|
* The size of \p key_buffer is too small.
|
||||||
* \retval #PSA_ERROR_INSUFFICIENT_MEMORY
|
* \retval #PSA_ERROR_INSUFFICIENT_MEMORY \emptydescription
|
||||||
* \retval #PSA_ERROR_CORRUPTION_DETECTED
|
* \retval #PSA_ERROR_CORRUPTION_DETECTED \emptydescription
|
||||||
*/
|
*/
|
||||||
psa_status_t mbedtls_psa_ffdh_generate_key(
|
psa_status_t mbedtls_psa_ffdh_generate_key(
|
||||||
const psa_key_attributes_t *attributes,
|
const psa_key_attributes_t *attributes,
|
||||||
|
|
|
@ -43,8 +43,8 @@
|
||||||
* compatible with the PAKE algorithm, or the hash algorithm in
|
* compatible with the PAKE algorithm, or the hash algorithm in
|
||||||
* \p cipher_suite is not supported or not compatible with the PAKE
|
* \p cipher_suite is not supported or not compatible with the PAKE
|
||||||
* algorithm and primitive.
|
* algorithm and primitive.
|
||||||
* \retval #PSA_ERROR_INSUFFICIENT_MEMORY
|
* \retval #PSA_ERROR_INSUFFICIENT_MEMORY \emptydescription
|
||||||
* \retval #PSA_ERROR_CORRUPTION_DETECTED
|
* \retval #PSA_ERROR_CORRUPTION_DETECTED \emptydescription
|
||||||
*/
|
*/
|
||||||
psa_status_t mbedtls_psa_pake_setup(mbedtls_psa_pake_operation_t *operation,
|
psa_status_t mbedtls_psa_pake_setup(mbedtls_psa_pake_operation_t *operation,
|
||||||
const psa_crypto_driver_pake_inputs_t *inputs);
|
const psa_crypto_driver_pake_inputs_t *inputs);
|
||||||
|
@ -78,10 +78,10 @@ psa_status_t mbedtls_psa_pake_setup(mbedtls_psa_pake_operation_t *operation,
|
||||||
* Success.
|
* Success.
|
||||||
* \retval #PSA_ERROR_BUFFER_TOO_SMALL
|
* \retval #PSA_ERROR_BUFFER_TOO_SMALL
|
||||||
* The size of the \p output buffer is too small.
|
* The size of the \p output buffer is too small.
|
||||||
* \retval #PSA_ERROR_INSUFFICIENT_ENTROPY
|
* \retval #PSA_ERROR_INSUFFICIENT_ENTROPY \emptydescription
|
||||||
* \retval #PSA_ERROR_CORRUPTION_DETECTED
|
* \retval #PSA_ERROR_CORRUPTION_DETECTED \emptydescription
|
||||||
* \retval #PSA_ERROR_DATA_CORRUPT
|
* \retval #PSA_ERROR_DATA_CORRUPT \emptydescription
|
||||||
* \retval #PSA_ERROR_DATA_INVALID
|
* \retval #PSA_ERROR_DATA_INVALID \emptydescription
|
||||||
*/
|
*/
|
||||||
psa_status_t mbedtls_psa_pake_output(mbedtls_psa_pake_operation_t *operation,
|
psa_status_t mbedtls_psa_pake_output(mbedtls_psa_pake_operation_t *operation,
|
||||||
psa_crypto_driver_pake_step_t step,
|
psa_crypto_driver_pake_step_t step,
|
||||||
|
@ -116,10 +116,10 @@ psa_status_t mbedtls_psa_pake_output(mbedtls_psa_pake_operation_t *operation,
|
||||||
* \retval #PSA_ERROR_NOT_SUPPORTED
|
* \retval #PSA_ERROR_NOT_SUPPORTED
|
||||||
* the \p input is not supported for the \p operation's algorithm, cipher
|
* the \p input is not supported for the \p operation's algorithm, cipher
|
||||||
* suite or \p step.
|
* suite or \p step.
|
||||||
* \retval #PSA_ERROR_INSUFFICIENT_MEMORY
|
* \retval #PSA_ERROR_INSUFFICIENT_MEMORY \emptydescription
|
||||||
* \retval #PSA_ERROR_CORRUPTION_DETECTED
|
* \retval #PSA_ERROR_CORRUPTION_DETECTED \emptydescription
|
||||||
* \retval #PSA_ERROR_DATA_CORRUPT
|
* \retval #PSA_ERROR_DATA_CORRUPT \emptydescription
|
||||||
* \retval #PSA_ERROR_DATA_INVALID
|
* \retval #PSA_ERROR_DATA_INVALID \emptydescription
|
||||||
*/
|
*/
|
||||||
psa_status_t mbedtls_psa_pake_input(mbedtls_psa_pake_operation_t *operation,
|
psa_status_t mbedtls_psa_pake_input(mbedtls_psa_pake_operation_t *operation,
|
||||||
psa_crypto_driver_pake_step_t step,
|
psa_crypto_driver_pake_step_t step,
|
||||||
|
@ -143,10 +143,10 @@ psa_status_t mbedtls_psa_pake_input(mbedtls_psa_pake_operation_t *operation,
|
||||||
* \retval #PSA_ERROR_NOT_SUPPORTED
|
* \retval #PSA_ERROR_NOT_SUPPORTED
|
||||||
* Input from a PAKE is not supported by the algorithm in the \p output
|
* Input from a PAKE is not supported by the algorithm in the \p output
|
||||||
* key derivation operation.
|
* key derivation operation.
|
||||||
* \retval #PSA_ERROR_INSUFFICIENT_MEMORY
|
* \retval #PSA_ERROR_INSUFFICIENT_MEMORY \emptydescription
|
||||||
* \retval #PSA_ERROR_CORRUPTION_DETECTED
|
* \retval #PSA_ERROR_CORRUPTION_DETECTED \emptydescription
|
||||||
* \retval #PSA_ERROR_DATA_CORRUPT
|
* \retval #PSA_ERROR_DATA_CORRUPT \emptydescription
|
||||||
* \retval #PSA_ERROR_DATA_INVALID
|
* \retval #PSA_ERROR_DATA_INVALID \emptydescription
|
||||||
*/
|
*/
|
||||||
psa_status_t mbedtls_psa_pake_get_implicit_key(
|
psa_status_t mbedtls_psa_pake_get_implicit_key(
|
||||||
mbedtls_psa_pake_operation_t *operation,
|
mbedtls_psa_pake_operation_t *operation,
|
||||||
|
@ -164,7 +164,7 @@ psa_status_t mbedtls_psa_pake_get_implicit_key(
|
||||||
*
|
*
|
||||||
* \retval #PSA_SUCCESS
|
* \retval #PSA_SUCCESS
|
||||||
* Success.
|
* Success.
|
||||||
* \retval #PSA_ERROR_CORRUPTION_DETECTED
|
* \retval #PSA_ERROR_CORRUPTION_DETECTED \emptydescription
|
||||||
*/
|
*/
|
||||||
psa_status_t mbedtls_psa_pake_abort(mbedtls_psa_pake_operation_t *operation);
|
psa_status_t mbedtls_psa_pake_abort(mbedtls_psa_pake_operation_t *operation);
|
||||||
|
|
||||||
|
|
Loading…
Reference in a new issue