/**
* @brief Unwraps one key with another and stores it inside key manager.
*
- * @since_tizen 6.5
+ * @since_tizen 6.0
*
* @remarks The wrapping key must be either symmetric (#CKMC_KEY_AES) or private RSA
* (#CKMC_KEY_RSA_PRIVATE).
/**
* @brief Wraps one key with another and returns it to the client.
*
- * @since_tizen 6.5
+ * @since_tizen 6.0
*
* @remarks The wrapping key must be either symmetric (#CKMC_KEY_AES) or public RSA
* (#CKMC_KEY_RSA_PUBLIC).
/**
* @brief Derives a secret or key from another key/secret and stores it inside key manager.
*
- * @since_tizen 6.5
+ * @since_tizen 6.0
*
* @remarks In case of #CKMC_ALGO_KBKDF algorithm, the secret pointed to by @a secret_alias must be
* a binary data or a symmetric key (#CKMC_KEY_AES). The derived key pointed to by
/**
* @brief Sets up a symmetric encryption or decryption context with given key and parameters.
*
- * @since_tizen 6.5
+ * @since_tizen 6.0
*
* @remarks The newly created @a context must be destroyed using ckmc_cipher_free() when it's no
* longer needed.
* @brief Performs symmetric encryption or decryption of the input and places the result in the
* output.
*
- * @since_tizen 6.5
+ * @since_tizen 6.0
*
* @remarks The function may be called multiple times to encrypt succcessive blocks of data.
* @remarks The newly created @a ppout must be destroyed using ckmc_buffer_free() when it's no
/**
* @brief Finalizes symmetric encryption or decryption and returns remaining output if any.
*
- * @since_tizen 6.5
+ * @since_tizen 6.0
*
* @remarks After the call to this function the ckmc_cipher_update() can be called no more.
* @remarks The newly created @a ppout must be destroyed using ckmc_buffer_free() when it's no
/**
* @brief Destroys the encryption/decryption context and releases all its resources.
*
- * @since_tizen 6.5
+ * @since_tizen 6.0
*
* @param[in] context Encryption/decryption context created with ckmc_cipher_initialize()
*
/**
* @brief Retrieves backend information.
*
- * @since_tizen 6.5
+ * @since_tizen 6.0
*
* @remarks The newly created @a ppinfo must be destroyed using ckmc_backend_info_free() when it's
* no longer needed.
CKMC_PARAM_ED_LABEL, /**< buffer - RSA OAEP label (not supported at the moment) */
CKMC_PARAM_KDF_PRF = 401, /**< integer - pseudo-random function number (see #ckmc_kdf_prf_e)
- (Since 6.5) */
+ (Since 6.0) */
CKMC_PARAM_KDF_LEN, /**< integer - length of the derived key in bytes. The value must be one of
- {16, 24, 32} (Since 6.5) */
+ {16, 24, 32} (Since 6.0) */
- CKMC_PARAM_KBKDF_MODE, /**< integer - KDF mode number (see #ckmc_kbkdf_mode_e) (Since 6.5) */
+ CKMC_PARAM_KBKDF_MODE, /**< integer - KDF mode number (see #ckmc_kbkdf_mode_e) (Since 6.0) */
CKMC_PARAM_KBKDF_LABEL, /**< buffer - the purpose for the derived key. Conflicts with
- #CKMC_PARAM_KBKDF_FIXED_INPUT (Since 6.5) */
+ #CKMC_PARAM_KBKDF_FIXED_INPUT (Since 6.0) */
CKMC_PARAM_KBKDF_CONTEXT, /**< buffer - information related to the derived key. Conflicts with
- #CKMC_PARAM_KBKDF_FIXED_INPUT (Since 6.5) */
+ #CKMC_PARAM_KBKDF_FIXED_INPUT (Since 6.0) */
CKMC_PARAM_KBKDF_FIXED_INPUT, /**< buffer - KBKDF fixed input replacing context and label
- (Since 6.5). Conflicts with:
+ (Since 6.0). Conflicts with:
- #CKMC_PARAM_KBKDF_LABEL,
- #CKMC_PARAM_KBKDF_CONTEXT,
- #CKMC_PARAM_KBKDF_LLEN,
- #CKMC_PARAM_KBKDF_NO_SEPARATOR */
CKMC_PARAM_KBKDF_COUNTER_LOCATION, /**< integer - specifies location of the counter in KBKDF
- (see #ckmc_kbkdf_counter_location_e) (Since 6.5) */
+ (see #ckmc_kbkdf_counter_location_e) (Since 6.0) */
CKMC_PARAM_KBKDF_RLEN, /**< integer - specifies the length of the counter representation in bits
in KBKDF. The value must be one of {8, 16, 24, 32}. If not set, the
- default value = 32 will be used. (Since 6.5) */
+ default value = 32 will be used. (Since 6.0) */
CKMC_PARAM_KBKDF_LLEN, /**< integer - specifies the length of the length suffix representation
in bits in KBKDF. The value must be one of {0, 8, 16, 24, 32}. If set to
0 the length suffix will be skipped. If not set, the default value = 32
will be used. The length suffix is skipped if
#CKMC_PARAM_KBKDF_FIXED_INPUT is passed and this parameter conflicts
- with it. (Since 6.5) */
+ with it. (Since 6.0) */
CKMC_PARAM_KBKDF_NO_SEPARATOR, /**< integer - presence of this parameter will skip the zero
octet separator between label and context in KBKDF.
All values are allowed. This parameter conflicts with
- #CKMC_PARAM_KBKDF_FIXED_INPUT. (Since 6.5) */
+ #CKMC_PARAM_KBKDF_FIXED_INPUT. (Since 6.0) */
- CKMC_PARAM_ECDH_PUBKEY, /**< buffer - EC public key in DER form (see #ckmc_key_s) (Since 6.5) */
+ CKMC_PARAM_ECDH_PUBKEY, /**< buffer - EC public key in DER form (see #ckmc_key_s) (Since 6.0) */
} ckmc_param_name_e;
/**
* @brief Enumeration for key derivation function pseudo-random function parameter.
- * @since_tizen 6.5
+ * @since_tizen 6.0
*
* @see ckmc_key_derive()
* @see #ckmc_param_name_e
/**
* @brief Enumeration for key based key derivation function mode.
- * @since_tizen 6.5
+ * @since_tizen 6.0
*
* @see ckmc_key_derive()
* @see #ckmc_param_name_e
/**
* @brief Enumeration for KBKDF counter location relative to fixed input.
- * @since_tizen 6.5
+ * @since_tizen 6.0
*
* @see ckmc_key_derive()
* @see #ckmc_param_name_e
/**
* @brief Enumeration for backend identifiers.
- * @since_tizen 6.5
+ * @since_tizen 6.0
* @see ckmc_get_backend_info()
* @see ckmc_alias_info_get_backend()
*/
/**
* @brief Backend information handle.
- * @since_tizen 6.5
+ * @since_tizen 6.0
* @see ckmc_alias_info_get_backend()
* @see ckmc_get_backend_info()
* @see ckmc_backend_get_max_chunk_size()
/**
* @brief Encryption/decryption context handle.
- * @since_tizen 6.5
+ * @since_tizen 6.0
* @see ckmc_cipher_initialize()
* @see ckmc_cipher_update()
* @see ckmc_cipher_finalize()
/**
* @brief Gets the backend identifier from #ckmc_alias_info_s structure.
- * @since_tizen 6.5
+ * @since_tizen 6.0
* @param[in] info The pointer to the #ckmc_alias_info_s structure
* @param[out] backend The pointer to the backend identifier
* @return #CKMC_ERROR_NONE on success, otherwise a negative error value
* @brief Retrieves maximum data chunk size that can be passed to given backend. This is the maximum
* size of data passed for encryption/decryption.
*
- * @since_tizen 6.5
+ * @since_tizen 6.0
*
* @param[in] info Backend info handle
* @param[out] size Maximum chunk size
/**
* @brief Destroys the backend information handle and releases all its resources.
*
- * @since_tizen 6.5
+ * @since_tizen 6.0
*
* @param[in] info Backend information handle created with ckmc_get_backend_info()
*