-
Notifications
You must be signed in to change notification settings - Fork 71
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Review error handling in key destruction #319
Comments
Maybe this is somewhat related with having consistency in key creation/deletion algorithms as expressed in #149 |
Just realised something, though - we shout definitely say in the |
It is actually nicely described in the PSA Crypto API, and our docs:
More generally, the PSA Crypto API says:
Which I think is what we are trying to do. I checked the flows of key creation/deletion for all of our providers. For creation what we should do is:
For deletion:
Steps 2 and 3 are inverted for Mbed Crypto and the PKCS11 provider. I will try to address that in a new PR. I don't think we need to change the documention of PsaDestroyKey as it is pretty clear currently. For DeleteClient, we can go through all keys on all providers and delete them all without checking the |
I think this should go in the issue for |
When the Parsec service reports that a key destruction is successful, all is well and we have a common outcome across the providers - the key is gone from both the backend and all Parsec caches. On the other hand, when an error occurs the exact sequence of events is somewhat inconsistent. This issue is only meant for investigating the possible paths that could be taken due to errors, and where the state of the service ends up from there. If changes are required (either to the service or to the documentation of
PsaDestroyKey
), a new issue should be created.An example of discrepancy:
The text was updated successfully, but these errors were encountered: