Lines Matching full:key
31 struct rsa_public_key *p = rsa_data->key.key; in do_encrypt()
35 struct versal_mbox_mem key = { }; in do_encrypt() local
44 rsa_data->key.key, in do_encrypt()
54 rsa_data->key.key, in do_encrypt()
63 return sw_crypto_acipher_rsanopad_encrypt(rsa_data->key.key, in do_encrypt()
70 assert(rsa_data->key.n_size != 128); in do_encrypt()
77 versal_mbox_alloc(RSA_MAX_MOD_LEN + RSA_MAX_PUB_EXP_LEN, NULL, &key); in do_encrypt()
78 crypto_bignum_bn2bin_pad(rsa_data->key.n_size, p->n, key.buf); in do_encrypt()
80 p->e, (uint8_t *)key.buf + RSA_MAX_MOD_LEN); in do_encrypt()
88 cmd->key_len = rsa_data->key.n_size; in do_encrypt()
90 cmd->key_addr = virt_to_phys(key.buf); in do_encrypt()
95 arg.ibuf[3].mem = key; in do_encrypt()
99 err, rsa_data->rsa_id, rsa_data->key.n_size); in do_encrypt()
108 rsa_data->cipher.length = rsa_data->key.n_size; in do_encrypt()
109 memcpy(rsa_data->cipher.data, cipher.buf, rsa_data->key.n_size); in do_encrypt()
115 free(key.buf); in do_encrypt()
123 struct rsa_keypair *p = rsa_data->key.key; in do_decrypt()
126 struct versal_mbox_mem key = { }; in do_decrypt() local
135 rsa_data->key.key, in do_decrypt()
145 rsa_data->key.key, in do_decrypt()
154 return sw_crypto_acipher_rsanopad_decrypt(rsa_data->key.key, in do_decrypt()
161 assert(rsa_data->key.n_size != 128); in do_decrypt()
168 versal_mbox_alloc(RSA_MAX_MOD_LEN + RSA_MAX_PRIV_EXP_LEN, NULL, &key); in do_decrypt()
169 crypto_bignum_bn2bin_pad(rsa_data->key.n_size, p->n, key.buf); in do_decrypt()
170 crypto_bignum_bn2bin_pad(rsa_data->key.n_size, p->d, in do_decrypt()
171 (uint8_t *)key.buf + RSA_MAX_MOD_LEN); in do_decrypt()
179 cmd->key_len = rsa_data->key.n_size; in do_decrypt()
181 cmd->key_addr = virt_to_phys(key.buf); in do_decrypt()
186 arg.ibuf[3].mem = key; in do_decrypt()
190 err, rsa_data->rsa_id, rsa_data->key.n_size); in do_decrypt()
195 rsa_data->message.length = rsa_data->key.n_size; in do_decrypt()
196 memcpy(rsa_data->message.data, msg.buf, rsa_data->key.n_size); in do_decrypt()
201 free(key.buf); in do_decrypt()
215 if (p->key.n_size != 128) { in do_ssa_sign()
220 p->key.key, in do_ssa_sign()
229 p->key.key, in do_ssa_sign()
241 p->key.key, in do_ssa_sign()
262 if (p->key.n_size != 128) { in do_ssa_verify()
267 p->key.key, in do_ssa_verify()
276 p->key.key, in do_ssa_verify()
288 p->key.key, in do_ssa_verify()
311 static TEE_Result do_alloc_publickey(struct rsa_public_key *key, size_t bits) in do_alloc_publickey() argument
313 return sw_crypto_acipher_alloc_rsa_public_key(key, bits); in do_alloc_publickey()