psa_key_derivation_verify_key() is only used within mbedTLS.
 
Symbols
loading...
Files
loading...
SummarySyntaxArgumentsRelatedReferences

Return value

#PSA_SUCCESS \emptydescription #PSA_ERROR_INVALID_SIGNATURE The output was read successfully, but if differs from the expected output. #PSA_ERROR_INVALID_HANDLE The key passed as the expected value does not exist. #PSA_ERROR_INVALID_ARGUMENT The key passed as the expected value has an invalid type. #PSA_ERROR_NOT_PERMITTED The key passed as the expected value does not allow this usage or this algorithm; or one of the inputs was a key whose policy didn't allow #PSA_KEY_USAGE_VERIFY_DERIVATION. #PSA_ERROR_INSUFFICIENT_DATA The operation's capacity was less than the length of the expected value. In this case, the operation's capacity is set to 0, thus subsequent calls to this function will not succeed, even with a smaller expected output. #PSA_ERROR_INSUFFICIENT_MEMORY \emptydescription #PSA_ERROR_COMMUNICATION_FAILURE \emptydescription #PSA_ERROR_HARDWARE_FAILURE \emptydescription #PSA_ERROR_CORRUPTION_DETECTED \emptydescription #PSA_ERROR_STORAGE_FAILURE \emptydescription #PSA_ERROR_BAD_STATE The operation state is not valid (it must be active and completed all required input steps), or the library has not been previously initialized by psa_crypto_init(). It is implementation-dependent whether a failure to initialize results in this error code.

References

from examples