-
Notifications
You must be signed in to change notification settings - Fork 2.7k
PSA: support arbitrary data storage from secure element drivers #3289
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Comments
With the unified driver interface, key contexts for opaque drivers are opaque blobs. The job of the core is merely to allocate memory for this blob and store it. There is a moderately complex way for drivers to specify the size of this blob in the driver description file. The complexity is intended to support implementations that allocate memory statically. Since Mbed TLS allocates memory dynamically, this complexity is not needed. For this task, only handle drivers that provide a function
that returns the size of the context based on the key type and size. The driver glue code will define a function
that calls the correct driver for a key with the given attributes. For this task, in the library code, assume that Necessary changes in the library;
#3492 has already done a significant part of the work. |
How is #3546 related to this tasking. That one seems focused on copyright notice updates. |
Sorry, must have been a copy-paste error. I meant #3492 |
No problem. That one looks more relevant. |
Here are some of the questions I have based on the task list in the issue comments.
|
Secure element drivers may need to hand back a wrapped key to the generic code, and have the generic code generate it. In such cases there may not be a concept of slot number.
This is part of a larger redesign of the secure element interface in #3287 and should not be implemented independently of this redesign.
Goals:
The text was updated successfully, but these errors were encountered: