Lines Matching +full:- +full:e

4  * SPDX-License-Identifier:	GPL-2.0+
27 const BIGNUM **n, const BIGNUM **e, const BIGNUM **d) in RSA_get0_key() argument
30 *n = r->n; in RSA_get0_key()
31 if (e != NULL) in RSA_get0_key()
32 *e = r->e; in RSA_get0_key()
34 *d = r->d; in RSA_get0_key()
46 return -1; in rsa_err()
50 * rsa_pem_get_pub_key() - read a public key from a .crt file
55 * @return 0 if ok, -ve on error (in which case *rsap will be set to NULL)
72 return -EACCES; in rsa_pem_get_pub_key()
79 ret = -EINVAL; in rsa_pem_get_pub_key()
87 ret = -EINVAL; in rsa_pem_get_pub_key()
95 ret = -EINVAL; in rsa_pem_get_pub_key()
115 * rsa_engine_get_pub_key() - read a public key from given engine
121 * @return 0 if ok, -ve on error (in which case *rsap will be set to NULL)
147 return -ENOTSUP; in rsa_engine_get_pub_key()
158 ret = -EINVAL; in rsa_engine_get_pub_key()
173 * rsa_get_pub_key() - read a public key
179 * @return 0 if ok, -ve on error (in which case *rsap will be set to NULL)
190 * rsa_pem_get_priv_key() - read a private key from a .key file
195 * @return 0 if ok, -ve on error (in which case *rsap will be set to NULL)
210 return -ENOENT; in rsa_pem_get_priv_key()
217 return -EPROTO; in rsa_pem_get_priv_key()
226 * rsa_engine_get_priv_key() - read a private key from given engine
232 * @return 0 if ok, -ve on error (in which case *rsap will be set to NULL)
258 return -ENOTSUP; in rsa_engine_get_priv_key()
269 ret = -EINVAL; in rsa_engine_get_priv_key()
284 * rsa_get_priv_key() - read a private key
290 * @return 0 if ok, -ve on error (in which case *rsap will be set to NULL)
311 return -1; in rsa_init()
326 ENGINE *e; in rsa_engine_init() local
331 e = ENGINE_by_id(engine_id); in rsa_engine_init()
332 if (!e) { in rsa_engine_init()
334 ret = -1; in rsa_engine_init()
338 if (!ENGINE_init(e)) { in rsa_engine_init()
340 ret = -1; in rsa_engine_init()
344 if (!ENGINE_set_default_RSA(e)) { in rsa_engine_init()
346 ret = -1; in rsa_engine_init()
350 *pe = e; in rsa_engine_init()
355 ENGINE_finish(e); in rsa_engine_init()
357 ENGINE_free(e); in rsa_engine_init()
379 static void rsa_engine_remove(ENGINE *e) in rsa_engine_remove() argument
381 if (e) { in rsa_engine_remove()
382 ENGINE_finish(e); in rsa_engine_remove()
383 ENGINE_free(e); in rsa_engine_remove()
388 * With this data2sign.bin, we can provide it to who real holds the RAS-private
402 return -ENOENT; in gen_data2sign()
440 ret = -ENOMEM; in rsa_sign_with_key()
458 checksum_algo->calculate_sign(), in rsa_sign_with_key()
465 if (padding_algo && !strcmp(padding_algo->name, "pss")) { in rsa_sign_with_key()
519 ENGINE *e = NULL; in rsa_sign() local
526 if (info->engine_id) { in rsa_sign()
527 ret = rsa_engine_init(info->engine_id, &e); in rsa_sign()
532 ret = rsa_get_priv_key(info->keydir, info->keyname, e, &rsa); in rsa_sign()
535 ret = rsa_sign_with_key(rsa, info->padding, info->checksum, region, in rsa_sign()
541 if (info->engine_id) in rsa_sign()
542 rsa_engine_remove(e); in rsa_sign()
550 if (info->engine_id) in rsa_sign()
551 rsa_engine_remove(e); in rsa_sign()
558 * rsa_get_exponent(): - Get the public exponent from an RSA key
560 static int rsa_get_exponent(RSA *key, uint64_t *e) in rsa_get_exponent() argument
567 ret = -EINVAL; in rsa_get_exponent()
570 if (!e) in rsa_get_exponent()
577 *e = BN_get_word(key_e); in rsa_get_exponent()
596 *e |= te; in rsa_get_exponent()
607 * rsa_get_params(): - Get the important parameters of an RSA public key
614 BIGNUM *n, *e, *r, *r_squared, *tmp, *c_factor, *np_factor; in rsa_get_params() local
634 e = BN_new(); in rsa_get_params()
636 !r_squared || !tmp || !big2_32 || !n || !e || in rsa_get_params()
639 return -ENOMEM; in rsa_get_params()
643 ret = -1; in rsa_get_params()
646 if (!BN_copy(n, key_n) || !BN_copy(e, key_e) || in rsa_get_params()
651 ret = -1; in rsa_get_params()
655 ret = -1; in rsa_get_params()
657 /* Calculate n0_inv = -1 / n[0] mod 2^32 */ in rsa_get_params()
660 ret = -1; in rsa_get_params()
666 ret = -1; in rsa_get_params()
672 ret = -1; in rsa_get_params()
677 ret = -1; in rsa_get_params()
683 ret = -1; in rsa_get_params()
687 ret = -1; in rsa_get_params()
691 *exponent_BN = e; in rsa_get_params()
707 return -ENOMEM; in rsa_get_params()
724 dst[i] = fdt32_to_cpu(src[total_wd - 1 - i]); in rsa_convert_big_endian()
731 void *n, *e, *c, *np; in rsa_set_key_hash() local
738 int ret = -ENOSPC; in rsa_set_key_hash()
742 return -ENOSPC; in rsa_set_key_hash()
745 rsa_e = fdt_getprop(keydest, key_node, "rsa,exponent-BN", NULL); in rsa_set_key_hash()
752 e = rsa_key + CONFIG_RSA_N_SIZE; in rsa_set_key_hash()
754 rsa_convert_big_endian(e, rsa_e, key_len, CONFIG_RSA_E_SIZE); in rsa_set_key_hash()
756 /* hash@c node: n, e, c */ in rsa_set_key_hash()
772 /* hash@np node: n, e, np */ in rsa_set_key_hash()
792 return ret ? -ENOSPC : 0; in rsa_set_key_hash()
811 return -ENOMEM; in fdt_add_bignum()
816 return -ENOMEM; in fdt_add_bignum()
826 return -ENOMEM; in fdt_add_bignum()
830 for (ptr = buf + nwords - 1; ptr >= buf; ptr--) { in fdt_add_bignum()
842 return -FDT_ERR_NOSPACE; in fdt_add_bignum()
862 ENGINE *e = NULL; in rsa_add_verify_data() local
865 if (info->engine_id) { in rsa_add_verify_data()
866 ret = rsa_engine_init(info->engine_id, &e); in rsa_add_verify_data()
870 ret = rsa_get_pub_key(info->keydir, info->keyname, e, &rsa); in rsa_add_verify_data()
879 if (parent == -FDT_ERR_NOTFOUND) { in rsa_add_verify_data()
883 if (ret != -FDT_ERR_NOSPACE) { in rsa_add_verify_data()
893 snprintf(name, sizeof(name), "key-%s", info->keyname); in rsa_add_verify_data()
895 if (node == -FDT_ERR_NOTFOUND) { in rsa_add_verify_data()
899 if (ret != -FDT_ERR_NOSPACE) { in rsa_add_verify_data()
911 ret = fdt_setprop_string(keydest, node, "key-name-hint", in rsa_add_verify_data()
912 info->keyname); in rsa_add_verify_data()
915 ret = fdt_setprop_u32(keydest, node, "rsa,num-bits", bits); in rsa_add_verify_data()
917 ret = fdt_setprop_u32(keydest, node, "rsa,n0-inverse", n0_inv); in rsa_add_verify_data()
922 ret = fdt_add_bignum(keydest, node, "rsa,exponent-BN", in rsa_add_verify_data()
930 ret = fdt_add_bignum(keydest, node, "rsa,r-squared", r_squared, in rsa_add_verify_data()
943 info->name); in rsa_add_verify_data()
945 if (!ret && info->require_keys) { in rsa_add_verify_data()
947 info->require_keys); in rsa_add_verify_data()
950 ret = rsa_set_key_hash(keydest, node, info->crypto->key_len, in rsa_add_verify_data()
951 info->checksum->name); in rsa_add_verify_data()
957 ret = ret == -FDT_ERR_NOSPACE ? -ENOSPC : -EIO; in rsa_add_verify_data()
961 if (info->engine_id) in rsa_add_verify_data()
962 rsa_engine_remove(e); in rsa_add_verify_data()