mirror of
				https://github.com/cuberite/polarssl.git
				synced 2025-11-03 20:22:59 -05:00 
			
		
		
		
	Clarify wording of "not covered" section
The section is about things that are not covered, but some lists are about things that are covered, which was very confusing. Signed-off-by: Manuel Pégourié-Gonnard <manuel.pegourie-gonnard@arm.com>
This commit is contained in:
		
							parent
							
								
									1e07869381
								
							
						
					
					
						commit
						d3ac4a9a8a
					
				@ -153,27 +153,33 @@ This is only a high-level overview, grouped by theme
 | 
				
			|||||||
TLS: key exchanges / asymmetric crypto
 | 
					TLS: key exchanges / asymmetric crypto
 | 
				
			||||||
--------------------------------------
 | 
					--------------------------------------
 | 
				
			||||||
 | 
					
 | 
				
			||||||
- RSA: not covered
 | 
					The following key exchanges are not covered at all:
 | 
				
			||||||
- DHE-RSA: not covered
 | 
					
 | 
				
			||||||
- ECDHE-RSA: ECDHE computation client-side only
 | 
					- RSA
 | 
				
			||||||
- ECDHE-ECDSA:
 | 
					- DHE-RSA
 | 
				
			||||||
  - ECDHE computation client-side
 | 
					- DHE-PSK
 | 
				
			||||||
  - ECDSA verification both sides
 | 
					- RSA-PSK
 | 
				
			||||||
  - ECDSA signature (if using `mbedtls_pk_setup_opaque()`)
 | 
					- ECDHE-PSK
 | 
				
			||||||
- PSK: PSA-held keys using `mbedtls_ssl_conf_psk_opaque()`
 | 
					- ECDH-RSA
 | 
				
			||||||
- DHE-PSK: not covered
 | 
					- ECDH-ECDSA
 | 
				
			||||||
- RSA-PSK: not covered
 | 
					- ECJPAKE
 | 
				
			||||||
- ECDHE-PSK: not covered
 | 
					
 | 
				
			||||||
- ECDH-RSA: not covered
 | 
					The following key exchanges are only partially covered:
 | 
				
			||||||
- ECDH-ECDSA: not covered
 | 
					
 | 
				
			||||||
- ECJPAKE: not covered
 | 
					- ECDHE-RSA: RSA operations are not covered and, server-side, the ECDHE
 | 
				
			||||||
 | 
					  operation isn't either
 | 
				
			||||||
 | 
					- ECDHE-ECDSA: server-side, the ECDHE operation isn't covered. (ECDSA
 | 
				
			||||||
 | 
					  signature generation is only covered if using `mbedtls_pk_setup_opaque()`.)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					PSK if covered when the application uses `mbedtls_ssl_conf_psk_opaque()` or
 | 
				
			||||||
 | 
					`mbedtls_ssl_set_hs_psk_opaque()`.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
TLS: symmetric crypto
 | 
					TLS: symmetric crypto
 | 
				
			||||||
---------------------
 | 
					---------------------
 | 
				
			||||||
 | 
					
 | 
				
			||||||
- some ciphers not supported via PSA yet: ARIA, Camellia, ChachaPoly (silent
 | 
					- some ciphers not supported via PSA yet: ARIA, Camellia, ChachaPoly (silent
 | 
				
			||||||
  fallback to the legacy APIs)
 | 
					  fallback to the legacy APIs)
 | 
				
			||||||
- the HMAC part of the CBC and NULL ciphersuites is not covered
 | 
					- the HMAC part of the CBC and NULL ciphersuites
 | 
				
			||||||
- the HMAC computation in `ssl_cookie.c`
 | 
					- the HMAC computation in `ssl_cookie.c`
 | 
				
			||||||
 | 
					
 | 
				
			||||||
X.509
 | 
					X.509
 | 
				
			||||||
@ -181,6 +187,6 @@ X.509
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
- most hash operations are still done via the legacy API, except the few that
 | 
					- most hash operations are still done via the legacy API, except the few that
 | 
				
			||||||
  are documented above as using PSA
 | 
					  are documented above as using PSA
 | 
				
			||||||
- RSA PKCS#1 v1.5 signature generation (from PSA-held keys): not covered
 | 
					- RSA PKCS#1 v1.5 signature generation (from PSA-held keys)
 | 
				
			||||||
- RSA PKCS#1 v1.5 signature verification: not covered
 | 
					- RSA PKCS#1 v1.5 signature verification
 | 
				
			||||||
- RSA-PSS signature verification: not covered
 | 
					- RSA-PSS signature verification
 | 
				
			||||||
 | 
				
			|||||||
		Loading…
	
	
			
			x
			
			
		
	
		Reference in New Issue
	
	Block a user