-
Notifications
You must be signed in to change notification settings - Fork 2.6k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Expose ECJPAKE through the PSA Crypto API #4153
Comments
(Estimating it for Medium instead of small, because the PSA API probably won't be well aligned with the current public API, thus the task won't be trivial.) |
I have a question about implementation. The MbedTLS ecjpake API write the while output data at once ((ec point + key) x 2).
Second seems simpler, but for the input part, it would be much harder to implement and simpler to cat data in a buffer and run |
I would say whatever is most convenient to implement, and we can revise it later. But I'm not familiar with ecjpake. Maybe @mpg has some advice? |
Hmm, I think both approaches are reasonable* and I don't see a strong reason to prefer one over the other, so I'd also say whatever you find most convenient to implement. Note that I don't think you even need to use the same approach for inputs and outputs, so you could for example directly output from the Mbed TLS context, but cat input data in a buffer until you have enough to call *We only support P-256 with SHA-256, so all sizes are static. Looking at test data, round one in 330 bytes and round two is 168 bytes, so that's an OK size for an internal buffer. |
Make the ECJPAKE functionality available through the PSA Crypto API defined in #4000 .
The text was updated successfully, but these errors were encountered: