mbedtls/include/psa
Gilles Peskine 05c900b576 Forbid keys of size 0
Keys of size 0 generally don't make sense: a key is supposed to be
secret. There is one edge case which is "raw data" keys, which are
useful to store non-key objects in the same storage location as keys.
However those are also problematic because they involve a zero-length
buffer. Manipulating zero-length buffers in C requires special cases
with functions like malloc() and memcpy(). Additionally, 0 as a key
size already has a meaning "unspecified", which does not always
overlap seamlessly with the meaning "0".

Therefore, forbid keys of size 0. No implementation may accept them.
2019-09-12 18:29:43 +02:00
..
crypto.h Forbid keys of size 0 2019-09-12 18:29:43 +02:00
crypto_accel_driver.h Pacify check-names.sh 2019-03-06 18:29:57 +01:00
crypto_driver_common.h Split crypto_driver.h into one for each driver type 2018-12-21 18:17:10 +01:00
crypto_entropy_driver.h Doxygen changes to match the code changes. clarifications. 2019-02-15 17:23:42 -06:00
crypto_extra.h Merge pull request #232 from Patater/psa-crypto-api-1.0b3 2019-08-29 13:50:10 +01:00
crypto_platform.h Merge pull request #139 from Patater/des-faster-and-typo-fix 2019-09-04 12:18:39 +01:00
crypto_se_driver.h Update import_key and generate_key SE methods to the current API 2019-08-09 16:43:35 +02:00
crypto_sizes.h Merge remote-tracking branch 'upstream-crypto/development' into psa-api-1.0-beta-merge_development_20190801 2019-07-31 17:47:49 +02:00
crypto_struct.h Merge pull request #232 from Patater/psa-crypto-api-1.0b3 2019-08-29 13:50:10 +01:00
crypto_types.h Clarify how key creation functions use attributes and what 0 means 2019-09-12 17:38:19 +02:00
crypto_values.h Document more error codes 2019-09-06 19:29:52 +02:00