@@ -880,12 +880,18 @@ psa_status_t cracen_import_key(const psa_key_attributes_t *attributes, const uin
880
880
MBEDTLS_SVC_KEY_ID_GET_KEY_ID (psa_get_key_id (attributes )));
881
881
psa_key_attributes_t stored_attributes ;
882
882
883
- if (key_buffer_size < cracen_get_opaque_size (attributes )) {
884
- return PSA_ERROR_BUFFER_TOO_SMALL ;
883
+ size_t opaque_key_size ;
884
+ psa_status_t status = cracen_get_opaque_size (attributes , & opaque_key_size );
885
+
886
+ if (status != PSA_SUCCESS ) {
887
+ return status ;
885
888
}
886
889
887
- psa_status_t status = cracen_kmu_provision (attributes , slot_id , data , data_length );
890
+ if (key_buffer_size < opaque_key_size ) {
891
+ return PSA_ERROR_BUFFER_TOO_SMALL ;
892
+ }
888
893
894
+ status = cracen_kmu_provision (attributes , slot_id , data , data_length );
889
895
if (status != PSA_SUCCESS ) {
890
896
return status ;
891
897
}
@@ -1182,6 +1188,9 @@ psa_status_t cracen_get_builtin_key(psa_drv_slot_number_t slot_number,
1182
1188
psa_key_attributes_t * attributes , uint8_t * key_buffer ,
1183
1189
size_t key_buffer_size , size_t * key_buffer_length )
1184
1190
{
1191
+ size_t opaque_key_size ;
1192
+ psa_status_t status = PSA_ERROR_INVALID_ARGUMENT ;
1193
+
1185
1194
/* According to the PSA Crypto Driver specification, the PSA core will set the `id`
1186
1195
* and the `lifetime` field of the attribute struct. We will fill all the other
1187
1196
* attributes, and update the `lifetime` field to be more specific.
@@ -1199,12 +1208,17 @@ psa_status_t cracen_get_builtin_key(psa_drv_slot_number_t slot_number,
1199
1208
PSA_KEY_USAGE_VERIFY_HASH |
1200
1209
PSA_KEY_USAGE_VERIFY_MESSAGE );
1201
1210
1211
+ status = cracen_get_opaque_size (attributes , & opaque_key_size );
1212
+ if (status != PSA_SUCCESS ) {
1213
+ return status ;
1214
+ }
1215
+
1202
1216
/* According to the PSA Crypto Driver interface proposed document the driver
1203
1217
* should fill the attributes even if the buffer of the key is too small. So
1204
1218
* we check the buffer here and not earlier in the function.
1205
1219
*/
1206
- if (key_buffer_size >= cracen_get_opaque_size ( attributes ) ) {
1207
- * key_buffer_length = cracen_get_opaque_size ( attributes ) ;
1220
+ if (key_buffer_size >= opaque_key_size ) {
1221
+ * key_buffer_length = opaque_key_size ;
1208
1222
* ((ikg_opaque_key * )key_buffer ) =
1209
1223
(ikg_opaque_key ){.slot_number = slot_number ,
1210
1224
.owner_id = MBEDTLS_SVC_KEY_ID_GET_OWNER_ID (
@@ -1226,11 +1240,15 @@ psa_status_t cracen_get_builtin_key(psa_drv_slot_number_t slot_number,
1226
1240
psa_set_key_usage_flags (attributes ,
1227
1241
PSA_KEY_USAGE_DERIVE | PSA_KEY_USAGE_VERIFY_DERIVATION );
1228
1242
1243
+ status = cracen_get_opaque_size (attributes , & opaque_key_size );
1244
+ if (status != PSA_SUCCESS ) {
1245
+ return status ;
1246
+ }
1229
1247
/* See comment about the placement of this check in the previous switch
1230
1248
* case.
1231
1249
*/
1232
- if (key_buffer_size >= cracen_get_opaque_size ( attributes ) ) {
1233
- * key_buffer_length = cracen_get_opaque_size ( attributes ) ;
1250
+ if (key_buffer_size >= opaque_key_size ) {
1251
+ * key_buffer_length = opaque_key_size ;
1234
1252
* ((ikg_opaque_key * )key_buffer ) =
1235
1253
(ikg_opaque_key ){.slot_number = slot_number ,
1236
1254
.owner_id = MBEDTLS_SVC_KEY_ID_GET_OWNER_ID (
0 commit comments