0385c2815c
We shouldn't violate the requirement that the key identifier can be reused. In practice, a key manager may destroy a key that's in use by another process, and the privileged world containing the key manager and the crypto service should not be perturbed by an unprivileged process. With respect to blocking, again, a key manager should not be blocked indefinitely by an unprivileged application. These are desirable properties even in the short term. Signed-off-by: Janos Follath <janos.follath@arm.com> |
||
---|---|---|
.. | ||
psa-migration | ||
testing | ||
alternative-implementations.md | ||
Makefile | ||
mbed-crypto-storage-specification.md | ||
psa-crypto-implementation-structure.md | ||
psa-storage-resilience.md | ||
psa-thread-safety.md | ||
tls13-support.md |