Adrian L. Shaw
6725757cec
Remove errorneous insert
2019-09-04 11:30:18 +01:00
Adrian L. Shaw
484ba88a0f
Add STORAGE_FAILURE everywhere + add missing codes
2019-09-04 11:30:18 +01:00
Adrian L. Shaw
dc5bf5c8e7
Add storage failure to (encrypt/decrypt)_setup
2019-09-04 11:30:18 +01:00
Adrian L. Shaw
d9e9024885
Add storage failure to psa_mac_verify_finish
2019-09-04 11:30:18 +01:00
Adrian L. Shaw
263223689f
Add storage failure to psa_mac_sign_finish
2019-09-04 11:30:18 +01:00
Adrian L. Shaw
8d0bcf27ec
Add PSA_ERROR_INVALID_ARGUMENT to psa_hash_compare
2019-09-04 11:30:17 +01:00
Adrian L. Shaw
df3c7ac645
Remove trailing whitespace
2019-09-04 11:30:17 +01:00
Adrian L. Shaw
d789dc13da
Added a few more return codes
2019-09-04 11:30:17 +01:00
Adrian L. Shaw
3e41249417
Add PSA_ERROR_STORAGE_FAILURE to psa_aead_*_setup functions
2019-09-04 11:30:17 +01:00
Adrian L. Shaw
71b33ffcf8
Add missing error codes to psa_generate_random
2019-09-04 11:30:17 +01:00
Adrian L. Shaw
0d280b9873
Add missing error codes for psa_raw_key_agreement
2019-09-04 11:30:17 +01:00
Adrian L. Shaw
a3f6ba5843
Added PSA_ERROR_STORAGE_FAILURE to psa_cipher_(encrypt/decrypt)
2019-09-04 11:30:17 +01:00
Adrian L. Shaw
320659b54c
Added PSA_ERROR_BAD_STATE to functions with operations
...
In the case that the operation object has not been initialized
appropriately.
2019-09-04 11:30:17 +01:00
Adrian L. Shaw
e970d65273
Added extra bad state case to psa_hash_setup
2019-09-04 11:30:17 +01:00
Adrian L. Shaw
6e758c9bb8
Add missing return codes to psa_asymmetric_verify
2019-09-04 11:30:17 +01:00
Adrian L. Shaw
27c121574b
Add missing parameters to psa_asymmetric_sign
2019-09-04 11:30:17 +01:00
Adrian L. Shaw
d21c6e6566
Add missing return codes to psa_generate_key
2019-09-04 11:30:17 +01:00
Adrian L. Shaw
c207ba376e
Added missing return codes to psa_aead_decrypt
2019-09-04 11:30:17 +01:00
Adrian L. Shaw
96f31ada18
Add missing return codes to psa_asymmetric_decrypt
2019-09-04 11:30:17 +01:00
Adrian L. Shaw
f961d5c9e6
Add missing return codes to psa_asymmetric_encrypt
2019-09-04 11:30:17 +01:00
Adrian L. Shaw
53d90c5199
Only return PSA_ERROR_DOES_NOT_EXIST from psa_open_key
2019-09-04 11:30:17 +01:00
Adrian L. Shaw
9770d0e0f8
Add PSA_ERROR_STORAGE_FAILURE to psa_mac_verify_setup
2019-09-04 11:30:17 +01:00
Adrian L. Shaw
2409ba0429
Added PSA_ERROR_STORAGE_FAILURE to psa_mac_sign_setup
2019-09-04 11:30:17 +01:00
Adrian L. Shaw
7563ed17ab
Remove PSA_ERROR_DOES_NOT_EXIST from psa_mac_sign_setup
2019-09-04 11:30:17 +01:00
Adrian L. Shaw
d5ae06b1e3
Add PSA_ERROR_BUFFER_TOO_SMALL to psa_mac_compute
2019-09-04 11:30:17 +01:00
Adrian L. Shaw
dec47b6f9d
Added the possibility of PSA_ERROR_BAD_STATE to all functions
2019-09-04 11:30:17 +01:00
Adrian L. Shaw
fa591c44af
Added PSA_ERROR_STORAGE_FAILURE to psa_mac_compute
...
In case the key could not be retrieved from
storage.
2019-09-04 11:30:17 +01:00
Adrian L. Shaw
f7d852a9d5
Added PSA_ERROR_BUFFER_TOO_SMALL to psa_hash_compute
2019-09-04 11:30:17 +01:00
Adrian L. Shaw
60b0320af0
Add PSA_ERROR_STORAGE_FAILURE to psa_copy_key
2019-09-04 11:30:17 +01:00
Adrian L. Shaw
398b3c27e0
Add PSA_ERROR_STORAGE_FAILURE to psa_export_public_key
...
The same reason that it is included in psa_export_key
2019-09-04 11:30:17 +01:00
Adrian L. Shaw
e926e7370f
Removed PSA_DOES_NOT_EXIST from psa_export_public_key
...
The implementation should return PSA_ERROR_INVALID_HANDLE instead.
2019-09-04 11:30:17 +01:00
Adrian L. Shaw
88c51adfc0
Added PSA_ERROR_INSUFFICIENT_MEMORY to psa_export_public_key
...
For the same reasons that psa_export_key can fail with this error
2019-09-04 11:30:17 +01:00
Adrian L. Shaw
742084ea25
Removed PSA_ERROR_DOES_NOT_EXIST from psa_export_key
...
If the key doesn't exist by the time this call is made
then the handle is invalid,
which means that PSA_ERROR_INVALID_HANDLE should be
returned rather than "does not exist"
2019-09-04 11:30:17 +01:00
Adrian L. Shaw
0542d595ce
Add PSA_ERROR_INSUFFICIENT_MEMORY to psa_export_key
...
It may be possible that the implementation runs out of
memory when exporting a key from storage or a secure
element. For example, it may not be possible to directly
move the data from storage to the caller, so the implementation
will have to buffer the material temporarily (an issue if dynamic
memory allocation scheme is used). For a large key
this is more likely to return.
2019-09-04 11:30:17 +01:00
Adrian L. Shaw
89b7152ed0
Added PSA_ERROR_STORAGE_FAILURE to psa_export_key
...
It may be possible that an implementation does not
fetch key material until a command like
this is called and such an error may occur if an
off-chip secure storage dependency may have been wiped.
2019-09-04 11:30:17 +01:00
Adrian L. Shaw
29b64073af
Added missing return codes to get_key_attributes
...
Note that PSA_ERROR_NOT_PERMITTED is not included
because I can't think of a scenario where you have
a valid key handle but aren't allowed to read the
attributes
2019-09-04 11:30:17 +01:00
Jaeden Amero
21db2a94a4
Merge pull request #229 from k-stachowiak/IOTCRYPT-791-remove-legacy-psa-key-derivation
...
Remove legacy psa key derivation
2019-08-29 11:31:23 +01:00
Andrew Thoelke
8824daec6f
Editorial fixes.
2019-08-22 15:52:32 +01:00
Andrew Thoelke
07f16b78ff
Update documentation for psa_destroy_key
...
Define the affect on handles to the key and on active multipart
operations.
2019-08-22 15:52:32 +01:00
Andrew Thoelke
3daba812d7
Update documentation for psa_close_key
...
Adjust the wording to permit multiple handles to a single key - closing
a handle does not necessarily release volatile memory associated with
the key, that only occurs when the last handle is closed.
2019-08-22 15:52:32 +01:00
Andrew Thoelke
9741b11440
Update psa_open_key documentation
...
- Describe the implementation defined behavior for opening multiple
keys, and provide a reference to the relevant section.
- Describe the use of INSUFFICENT_MEMORY error to indicate additional
implementation resource constaints.
- Clarify the distinction between DOES_NOT_EXIST and INVALID_HANDLE
error conditions.
2019-08-22 15:52:32 +01:00
Andrew Thoelke
203491c65d
Remove duplicated information in psa_open_key
...
The information about implmementation keys is duplicated.
2019-08-22 15:52:31 +01:00
k-stachowiak
b9b4f09c47
Document new error type returned from the key derivation API
2019-08-15 19:01:59 +02:00
Gilles Peskine
adb1c52149
Merge pull request #157 from gilles-peskine-arm/psa-se_driver-create_key
...
Secure element key creation foundation
2019-07-26 14:39:55 +02:00
Gilles Peskine
105f67f0fa
Move the definition of psa_key_attributes_t to crypto_types.h
...
psa_key_attributes_t is used in the SE driver HAL, so it must be
defined in a common header, not in the API-only header crypto.h.
2019-07-23 18:43:28 +02:00
Andrew Thoelke
d16bdac9b5
Use stdint.h types in multipart AEAD functions
...
No implementation yet.
2019-07-15 11:14:56 +02:00
Andrew Thoelke
47629d076e
Use stdint.h types
...
Follow MISRA C 2012 rules by using exact width types from stdint.h.
2019-07-15 11:14:56 +02:00
Gilles Peskine
6a21123619
Remove obsolete mentions of PSA_ERROR_EMPTY_SLOT
...
There are no more "empty slots", so finish removing the corresponding
error.
2019-05-21 19:11:07 +02:00
Gilles Peskine
4754cdeef8
Improve description of psa_open_key()
...
Remove obsolete reference to psa_make_key_persistent().
2019-05-21 18:43:18 +02:00
Gilles Peskine
a0c0655c91
Add missing declarations to the API document
...
PSA_KEY_ATTRIBUTES_INIT and psa_key_attributes_init weren't declared
in the API document, only defined in our implementation, but they are
referenced in the API document.
2019-05-21 15:54:54 +02:00