Donate to e Foundation | Murena handsets with /e/OS | Own a part of Murena! Learn more

Commit 6cd7c629 authored by David Drysdale's avatar David Drysdale Committed by Gerrit Code Review
Browse files

Merge "Updated the description for APPLICATION_ID and APPLICATION_DATA"

parents abb60604 5083a851
Loading
Loading
Loading
Loading
+6 −2
Original line number Diff line number Diff line
@@ -504,7 +504,9 @@ enum Tag {
     * that is necessary during all uses of the key.  In particular, calls to exportKey() and
     * getKeyCharacteristics() must provide the same value to the clientId parameter, and calls to
     * begin() must provide this tag and the same associated data as part of the inParams set.  If
     * the correct data is not provided, the method must return ErrorCode::INVALID_KEY_BLOB.
     * the correct data is not provided, the method must return ErrorCode::INVALID_KEY_BLOB.  Note
     * that a key with a zero-length APPLICATION_ID cannot have its key characteristics retrieved
     * using getKeyCharacteristics() due to a historical limitation of the API.
     *
     * The content of this tag must be bound to the key cryptographically, meaning it must not be
     * possible for an adversary who has access to all of the secure world secrets but does not have
@@ -525,7 +527,9 @@ enum Tag {
     * that is necessary during all uses of the key.  In particular, calls to begin() and
     * exportKey() must provide the same value to the appData parameter, and calls to begin must
     * provide this tag and the same associated data as part of the inParams set.  If the correct
     * data is not provided, the method must return ErrorCode::INVALID_KEY_BLOB.
     * data is not provided, the method must return ErrorCode::INVALID_KEY_BLOB.  Note that a key
     * with a zero-length APPLICATION_DATA cannot have its key characteristics retrieved using
     * getKeyCharacteristics() due to a historical limitation of the API.
     *
     * The content of this tag must be bound to the key cryptographically, meaning it must not be
     * possible for an adversary who has access to all of the secure world secrets but does not have