You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The location of the key used for ECDHE during the TLS 1.3 Handshake (handshake->xxdh_psa_privkey) is currently hardcoded to PSA_KEY_LOCATION_LOCAL_STORAGE because it uses the default lifetime PSA_KEY_LIFETIME_VOLATILE:
This prevents using an opaque crypto driver for the generation step and subsequent computation of the public key. Using a transparent driver here is typically not an option with an actual HSM since they usually don't support exporting a generated private key.
One might consider performing only the public key computation part with the opaque driver, but this is not a general solution because some HSMs require both the private and public part in order to import an ECC key.
The text was updated successfully, but these errors were encountered:
Suggested enhancement
The location of the key used for ECDHE during the TLS 1.3 Handshake (
handshake->xxdh_psa_privkey
) is currently hardcoded toPSA_KEY_LOCATION_LOCAL_STORAGE
because it uses the default lifetimePSA_KEY_LIFETIME_VOLATILE
:mbedtls/library/ssl_tls13_generic.c
Lines 1570 to 1578 in 6986829
mbedtls/tf-psa-crypto/include/psa/crypto_struct.h
Lines 295 to 305 in 6986829
This prevents using an opaque crypto driver for the generation step and subsequent computation of the public key. Using a transparent driver here is typically not an option with an actual HSM since they usually don't support exporting a generated private key.
One might consider performing only the public key computation part with the opaque driver, but this is not a general solution because some HSMs require both the private and public part in order to import an ECC key.
The text was updated successfully, but these errors were encountered: