From 5579971cb15c85c7d586cf61dc6062caa3eb9a40 Mon Sep 17 00:00:00 2001 From: Gilles Peskine Date: Tue, 12 Mar 2019 11:50:26 +0100 Subject: [PATCH] psa_generator_import_key (ECC): minor corrections --- include/psa/crypto.h | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/include/psa/crypto.h b/include/psa/crypto.h index fbfdbc47f2..05834b0e9d 100644 --- a/include/psa/crypto.h +++ b/include/psa/crypto.h @@ -2941,10 +2941,10 @@ psa_status_t psa_generator_read(psa_crypto_generator_t *generator, * in big-endian order. Discard it if it is not in the range * [0, *N* - 2] where *N* is the boundary of the private key domain * (the prime *p* for Diffie-Hellman, the subprime *q* for DSA, - * or the order of the curve's coordinate field for ECC). + * or the order of the curve's base point for ECC). * Add 1 to the resulting integer and use this as the private key *x*. - * This is the method described as - * "key-pair generation by testing candidates" + * This method allows compliance to NIST standards, specifically + * the methods titled "key-pair generation by testing candidates" * in NIST SP 800-56A §5.6.1.1.4 for Diffie-Hellman, * in FIPS 186-4 §B.1.2 for DSA, and * in NIST SP 800-56A §5.6.1.2.2 or