Skip to content

Commit 8436408

Browse files
SebastianBoenordicjm
authored andcommitted
cracen: platform_keys: Improve comment about AES keys
Improve comment about AES keys. Signed-off-by: Sebastian Bøe <[email protected]>
1 parent f90a54f commit 8436408

File tree

1 file changed

+9
-4
lines changed
  • subsys/nrf_security/src/drivers/cracen/cracenpsa/src/platform_keys

1 file changed

+9
-4
lines changed

subsys/nrf_security/src/drivers/cracen/cracenpsa/src/platform_keys/platform_keys.c

Lines changed: 9 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -343,10 +343,15 @@ psa_status_t cracen_platform_get_builtin_key(psa_drv_slot_number_t slot_number,
343343
psa_set_key_algorithm(attributes, PSA_ALG_PURE_EDDSA);
344344
psa_set_key_usage_flags(attributes, PSA_KEY_USAGE_VERIFY_MESSAGE);
345345
} else if (key.sicr.type == PSA_KEY_TYPE_AES) {
346-
/* Currently AES-KW is not supported, so the key stored in SICR
347-
* is directly used to decrypt the firmware (using AES-GCM).
348-
* When AES-KW is supported, this will possibly need to be extended
349-
* so that both AES-KW and direct decryption can be supported.
346+
/*
347+
* Currently AES-KW is not supported, so the key stored
348+
* encrypted in SICR is always used as the content
349+
* encryption key to decrypt the firmware (using
350+
* AES-GCM). When AES-KW is supported, this will possibly
351+
* need to be extended so that both AES-KW (encrypted key
352+
* stored in SICR used as KEK) and direct decryption
353+
* (encrypted key stored in SICR used as CEK) can be
354+
* supported.
350355
*/
351356
psa_set_key_algorithm(attributes, PSA_ALG_GCM);
352357
psa_set_key_usage_flags(attributes, PSA_KEY_USAGE_DECRYPT);

0 commit comments

Comments
 (0)