Lines Matching +full:- +full:- +full:count

1 // SPDX-License-Identifier: BSD-2-Clause
3 * Copyright (c) 2018-2021, Linaro Limited
28 serialargs_init(&args, proc_params->data, proc_params->size); in pkcs2tee_proc_params_rsa_pss()
45 proc->extra_ctx = TEE_Malloc(sizeof(struct rsa_pss_processing_ctx), in pkcs2tee_proc_params_rsa_pss()
47 if (!proc->extra_ctx) in pkcs2tee_proc_params_rsa_pss()
50 ctx = proc->extra_ctx; in pkcs2tee_proc_params_rsa_pss()
52 ctx->hash_alg = hash; in pkcs2tee_proc_params_rsa_pss()
53 ctx->mgf_type = mgf; in pkcs2tee_proc_params_rsa_pss()
54 ctx->salt_len = salt_len; in pkcs2tee_proc_params_rsa_pss()
67 rsa_pss_ctx = proc->extra_ctx; in pkcs2tee_validate_rsa_pss()
70 switch (rsa_pss_ctx->hash_alg) { in pkcs2tee_validate_rsa_pss()
94 * The sLen field must be less than or equal to k*-2-hLen where in pkcs2tee_validate_rsa_pss()
106 if (rsa_pss_ctx->salt_len > (k - 2 - hash_size)) in pkcs2tee_validate_rsa_pss()
126 serialargs_init(&args, proc_params->data, proc_params->size); in pkcs2tee_algo_rsa_pss()
143 if (proc_params->id == PKCS11_CKM_RSA_PKCS_PSS) { in pkcs2tee_algo_rsa_pss()
212 serialargs_init(&args, proc_params->data, proc_params->size); in pkcs2tee_proc_params_rsa_oaep()
237 proc->extra_ctx = TEE_Malloc(sizeof(struct rsa_oaep_processing_ctx) + in pkcs2tee_proc_params_rsa_oaep()
240 if (!proc->extra_ctx) in pkcs2tee_proc_params_rsa_oaep()
243 ctx = proc->extra_ctx; in pkcs2tee_proc_params_rsa_oaep()
245 ctx->hash_alg = hash; in pkcs2tee_proc_params_rsa_oaep()
246 ctx->mgf_type = mgf; in pkcs2tee_proc_params_rsa_oaep()
247 ctx->source_type = source_type; in pkcs2tee_proc_params_rsa_oaep()
248 ctx->source_data_len = source_size; in pkcs2tee_proc_params_rsa_oaep()
249 TEE_MemMove(ctx->source_data, source_data, source_size); in pkcs2tee_proc_params_rsa_oaep()
268 serialargs_init(&args, proc_params->data, proc_params->size); in pkcs2tee_proc_params_rsa_aes_wrap()
297 proc->extra_ctx = in pkcs2tee_proc_params_rsa_aes_wrap()
301 if (!proc->extra_ctx) in pkcs2tee_proc_params_rsa_aes_wrap()
304 ctx = proc->extra_ctx; in pkcs2tee_proc_params_rsa_aes_wrap()
306 ctx->aes_key_bits = aes_key_bits; in pkcs2tee_proc_params_rsa_aes_wrap()
307 ctx->hash_alg = hash; in pkcs2tee_proc_params_rsa_aes_wrap()
308 ctx->mgf_type = mgf; in pkcs2tee_proc_params_rsa_aes_wrap()
309 ctx->source_type = source_type; in pkcs2tee_proc_params_rsa_aes_wrap()
310 ctx->source_data_len = source_size; in pkcs2tee_proc_params_rsa_aes_wrap()
311 TEE_MemMove(ctx->source_data, source_data, source_size); in pkcs2tee_proc_params_rsa_aes_wrap()
334 serialargs_init(&args, proc_params->data, proc_params->size); in pkcs2tee_algo_rsa_oaep()
362 switch (proc_params->id) { in pkcs2tee_algo_rsa_oaep()
403 EMSG("Unexpected mechanism %#"PRIx32"/%s", proc_params->id, in pkcs2tee_algo_rsa_oaep()
404 id2str_proc(proc_params->id)); in pkcs2tee_algo_rsa_oaep()
425 serialargs_init(&args, proc_params->data, proc_params->size); in pkcs2tee_algo_rsa_aes_wrap()
457 switch (proc_params->id) { in pkcs2tee_algo_rsa_aes_wrap()
498 EMSG("Unexpected mechanism %#"PRIx32"/%s", proc_params->id, in pkcs2tee_algo_rsa_aes_wrap()
499 id2str_proc(proc_params->id)); in pkcs2tee_algo_rsa_aes_wrap()
516 size_t count = 0; in contains_all_rsa_crt_parameters() local
520 rc = get_attribute_ptr(obj->attributes, crt_attr[n], &a_ptr, in contains_all_rsa_crt_parameters()
525 count++; in contains_all_rsa_crt_parameters()
528 if (count != ARRAY_SIZE(crt_attr)) in contains_all_rsa_crt_parameters()
539 size_t count = 0; in load_tee_rsa_key_attrs() local
542 assert(get_key_type(obj->attributes) == PKCS11_CKK_RSA); in load_tee_rsa_key_attrs()
544 switch (get_class(obj->attributes)) { in load_tee_rsa_key_attrs()
551 if (pkcs2tee_load_attr(&attrs[count], TEE_ATTR_RSA_MODULUS, in load_tee_rsa_key_attrs()
553 count++; in load_tee_rsa_key_attrs()
555 if (pkcs2tee_load_attr(&attrs[count], in load_tee_rsa_key_attrs()
558 count++; in load_tee_rsa_key_attrs()
560 if (count == 2) in load_tee_rsa_key_attrs()
571 if (pkcs2tee_load_attr(&attrs[count], TEE_ATTR_RSA_MODULUS, in load_tee_rsa_key_attrs()
573 count++; in load_tee_rsa_key_attrs()
575 if (pkcs2tee_load_attr(&attrs[count], in load_tee_rsa_key_attrs()
578 count++; in load_tee_rsa_key_attrs()
580 if (pkcs2tee_load_attr(&attrs[count], in load_tee_rsa_key_attrs()
583 count++; in load_tee_rsa_key_attrs()
585 if (count != 3) in load_tee_rsa_key_attrs()
589 * If the pre-computed CRT parameters are present load them in load_tee_rsa_key_attrs()
603 if (pkcs2tee_load_attr(&attrs[count], TEE_ATTR_RSA_PRIME1, obj, in load_tee_rsa_key_attrs()
605 count++; in load_tee_rsa_key_attrs()
607 if (pkcs2tee_load_attr(&attrs[count], TEE_ATTR_RSA_PRIME2, obj, in load_tee_rsa_key_attrs()
609 count++; in load_tee_rsa_key_attrs()
611 if (pkcs2tee_load_attr(&attrs[count], TEE_ATTR_RSA_EXPONENT1, in load_tee_rsa_key_attrs()
613 count++; in load_tee_rsa_key_attrs()
615 if (pkcs2tee_load_attr(&attrs[count], TEE_ATTR_RSA_EXPONENT2, in load_tee_rsa_key_attrs()
617 count++; in load_tee_rsa_key_attrs()
619 if (pkcs2tee_load_attr(&attrs[count], TEE_ATTR_RSA_COEFFICIENT, in load_tee_rsa_key_attrs()
621 count++; in load_tee_rsa_key_attrs()
623 if (count == 8) in load_tee_rsa_key_attrs()
635 *tee_count = count; in load_tee_rsa_key_attrs()
815 * RSA no-pad (CKM_RSA_X_509) verify needs a buffer of the size in pkcs2tee_rsa_nopad_context()
818 key_size = rsa_get_input_max_byte_size(proc->tee_op_handle); in pkcs2tee_rsa_nopad_context()
822 proc->extra_ctx = TEE_Malloc(key_size, TEE_USER_MEM_HINT_NO_FILL_ZERO); in pkcs2tee_rsa_nopad_context()
823 if (!proc->extra_ctx) in pkcs2tee_rsa_nopad_context()