Just to follow up on this set of observations and issues. Now that we are looking at making some changes to the PAKE API as part of supporting SPAKE2+, we should consider what can be done to improve the API design.
I have replicated these issues in the PSA Certified API repository, for further discussion and implementation:
Deriving multiple keys: https://github.com/ARM-software/psa-api/issues/86 Consolidated setup function: https://github.com/ARM-software/psa-api/issues/89 Out of band setup: https://github.com/ARM-software/psa-api/issues/87 Need Hash in SIZE macros: https://github.com/ARM-software/psa-api/issues/88
* Andrew
I have no idea why the list has dethreaded this reply from the original conversion. See https://lists.trustedfirmware.org/archives/list/psa-crypto@lists.trustedfirm... ________________________________ From: Andrew Thoelke Sent: Friday, August 4, 2023 16:05 To: psa-crypto@lists.trustedfirmware.org psa-crypto@lists.trustedfirmware.org Subject: Re: [psa-crypto] Re: Issues with PSA Cryptography API 1.1 PAKE Extension
Just to follow up on this set of observations and issues. Now that we are looking at making some changes to the PAKE API as part of supporting SPAKE2+, we should consider what can be done to improve the API design.
I have replicated these issues in the PSA Certified API repository, for further discussion and implementation:
Deriving multiple keys: https://github.com/ARM-software/psa-api/issues/86
Consolidated setup function: https://github.com/ARM-software/psa-api/issues/89
Out of band setup: https://github.com/ARM-software/psa-api/issues/87
Need Hash in SIZE macros: https://github.com/ARM-software/psa-api/issues/88
* Andrew
psa-crypto@lists.trustedfirmware.org