@@ -317,17 +317,17 @@ int mbedtls_cipher_setkey( mbedtls_cipher_context_t *ctx,
317
317
cipher_psa -> slot_state = MBEDTLS_CIPHER_PSA_KEY_OWNED ;
318
318
319
319
/* From that point on, the responsibility for destroying the
320
- * key slot is on mbedtls_cipher_free(). This includes the case
321
- * where the policy setup or key import below fail, as
322
- * mbedtls_cipher_free() needs to be called in any case. */
320
+ * key slot is on mbedtls_cipher_free(). This includes the case
321
+ * where the policy setup or key import below fail, as
322
+ * mbedtls_cipher_free() needs to be called in any case. */
323
323
324
324
/* Setup policy for the new key slot. */
325
325
psa_key_policy_init ( & key_policy );
326
326
327
327
/* Mbed TLS' cipher layer doesn't enforce the mode of operation
328
- * (encrypt vs. decrypt): it is possible to setup a key for encryption
329
- * and use it for AEAD decryption. Until tests relying on this
330
- * are changed, allow any usage in PSA. */
328
+ * (encrypt vs. decrypt): it is possible to setup a key for encryption
329
+ * and use it for AEAD decryption. Until tests relying on this
330
+ * are changed, allow any usage in PSA. */
331
331
/* key_usage = mbedtls_psa_translate_cipher_operation( operation ); */
332
332
key_usage = PSA_KEY_USAGE_ENCRYPT | PSA_KEY_USAGE_DECRYPT ;
333
333
psa_key_policy_set_usage ( & key_policy , key_usage , cipher_psa -> alg );
0 commit comments