You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: doc/crypto/api/keys/policy.rst
+6-2Lines changed: 6 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -204,7 +204,9 @@ The usage flags are encoded in a bitmask, which has the type `psa_key_usage_t`.
204
204
.. summary::
205
205
Permission to sign a message hash with the key.
206
206
207
-
This flag is required to use the key to sign a message hash in an asymmetric signature operation. The flag must be present on keys used when calling `psa_sign_hash()`.
207
+
This flag is required to use the key to sign a pre-computed message hash in an asymmetric signature operation. The flag must be present on keys used with the following APIs:
208
+
209
+
* `psa_sign_hash()`
208
210
209
211
This flag automatically sets `PSA_KEY_USAGE_SIGN_MESSAGE`: if an application sets the flag `PSA_KEY_USAGE_SIGN_HASH` when creating a key, then the key always has the permissions conveyed by `PSA_KEY_USAGE_SIGN_MESSAGE`, and the flag `PSA_KEY_USAGE_SIGN_MESSAGE` will also be present when the application queries the usage flags of the key.
210
212
@@ -216,7 +218,9 @@ The usage flags are encoded in a bitmask, which has the type `psa_key_usage_t`.
216
218
.. summary::
217
219
Permission to verify a message hash with the key.
218
220
219
-
This flag is required to use the key to verify a message hash in an asymmetric signature verification operation. The flag must be present on keys used when calling `psa_verify_hash()`.
221
+
This flag is required to use the key to verify a pre-computed message hash in an asymmetric signature verification operation. The flag must be present on keys used with the following APIs:
222
+
223
+
* `psa_verify_hash()`
220
224
221
225
This flag automatically sets `PSA_KEY_USAGE_VERIFY_MESSAGE`: if an application sets the flag `PSA_KEY_USAGE_VERIFY_HASH` when creating a key, then the key always has the permissions conveyed by `PSA_KEY_USAGE_VERIFY_MESSAGE`, and the flag `PSA_KEY_USAGE_VERIFY_MESSAGE` will also be present when the application queries the usage flags of the key.
Copy file name to clipboardExpand all lines: doc/crypto/api/ops/algorithms.rst
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -20,7 +20,7 @@ The specific algorithm identifiers are described alongside the cryptographic ope
20
20
* :secref:`cipher-algorithms`
21
21
* :secref:`aead-algorithms`
22
22
* :secref:`key-derivation-algorithms`
23
-
* :secref:`sign-algorithms`
23
+
* :secref:`sign`
24
24
* :secref:`asymmetric-encryption-algorithms`
25
25
* :secref:`key-agreement-algorithms`
26
26
* :secref:`pake`
@@ -150,7 +150,7 @@ Algorithm categories
150
150
.. return::
151
151
``1`` if ``alg`` is an asymmetric signature algorithm, ``0`` otherwise. This macro can return either ``0`` or ``1`` if ``alg`` is not a supported algorithm identifier.
152
152
153
-
See :secref:`sign-algorithms` for a list of defined signature algorithms.
153
+
See :secref:`sign` for a list of defined signature algorithms.
0 commit comments