Document RSA keypair issue on OP-TEE 64-bit

Merge from Widevine repo of http://go/wvgerrit/169069
Merged from https://widevine-internal-review.googlesource.com/167604

Bug: 275264353
Test: luci tests
Change-Id: Ib77b2f7d3855779dd6d97696d6066ad361e6e416
This commit is contained in:
Matt Feddersen
2023-03-27 19:41:34 -07:00
committed by Fred Gylys-Colwell
parent 64521717d8
commit 803617b783

View File

@@ -102,7 +102,11 @@ OEMCrypto_BuildInformation(), the `WTPI_BUILD_INFO` macro is no longer required.
expected keysize. Fixed to include leading zeroes if needed.
- Bugfix: WPTI_GenerateRandomCertificateKeyPair() was implemented incorrectly.
It did not return the correct minimum size, used the wrong mbedtls key type,
and did not free allocated resources. Fixed all three issues.
and did not free allocated resources. Fixed all three issues. Please note
that on 64-bit targets, WPTI_GenerateRandomCertificateKeyPair() will exhaust
the default memory pool that OP-TEE uses for mbedtls. We suggest increasing
MPI_MEMPOOL_SIZE from 12k to 14k in optee_os/lib/libutee/tee_api_arith_mpi.c
to avoid this.
### Trusty port changes