| /optee_os/ta/pkcs11/src/ |
| H A D | processing.c | 226 struct pkcs11_attribute_head *proc_params = NULL; in entry_generate_secret() local 242 rc = serialargs_alloc_get_one_attribute(&ctrlargs, &proc_params); in entry_generate_secret() 261 rc = check_mechanism_against_processing(session, proc_params->id, in entry_generate_secret() 265 DMSG("Invalid mechanism %#"PRIx32": %#x", proc_params->id, rc); in entry_generate_secret() 275 proc_params->id, in entry_generate_secret() 287 rc = check_created_attrs_against_processing(proc_params->id, head); in entry_generate_secret() 300 switch (proc_params->id) { in entry_generate_secret() 314 TEE_Free(proc_params); in entry_generate_secret() 315 proc_params = NULL; in entry_generate_secret() 339 TEE_Free(proc_params); in entry_generate_secret() [all …]
|
| H A D | processing.h | 131 struct pkcs11_attribute_head *proc_params, 154 struct pkcs11_attribute_head *proc_params, 163 void *proc_params, size_t params_size); 188 void *proc_params, size_t params_size); 197 struct pkcs11_attribute_head *proc_params); 220 struct pkcs11_attribute_head *proc_params, 223 enum pkcs11_rc generate_ec_keys(struct pkcs11_attribute_head *proc_params, 227 enum pkcs11_rc generate_eddsa_keys(struct pkcs11_attribute_head *proc_params, 242 struct pkcs11_attribute_head *proc_params); 252 struct pkcs11_attribute_head *proc_params); [all …]
|
| H A D | processing_rsa.c | 19 struct pkcs11_attribute_head *proc_params) in pkcs2tee_proc_params_rsa_pss() argument 28 serialargs_init(&args, proc_params->data, proc_params->size); in pkcs2tee_proc_params_rsa_pss() 118 struct pkcs11_attribute_head *proc_params) in pkcs2tee_algo_rsa_pss() argument 126 serialargs_init(&args, proc_params->data, proc_params->size); in pkcs2tee_algo_rsa_pss() 143 if (proc_params->id == PKCS11_CKM_RSA_PKCS_PSS) { in pkcs2tee_algo_rsa_pss() 201 struct pkcs11_attribute_head *proc_params) in pkcs2tee_proc_params_rsa_oaep() argument 212 serialargs_init(&args, proc_params->data, proc_params->size); in pkcs2tee_proc_params_rsa_oaep() 256 struct pkcs11_attribute_head *proc_params) in pkcs2tee_proc_params_rsa_aes_wrap() argument 268 serialargs_init(&args, proc_params->data, proc_params->size); in pkcs2tee_proc_params_rsa_aes_wrap() 324 struct pkcs11_attribute_head *proc_params) in pkcs2tee_algo_rsa_oaep() argument [all …]
|
| H A D | processing_symm.c | 61 pkcs2tee_algorithm(uint32_t *tee_id, struct pkcs11_attribute_head *proc_params) in pkcs2tee_algorithm() argument 94 if (proc_params->id == pkcs2tee_algo[n].mech_id) { in pkcs2tee_algorithm() 324 struct pkcs11_attribute_head *proc_params) in load_tee_key() argument 344 switch (proc_params->id) { in load_tee_key() 365 proc_params->id); in load_tee_key() 372 mechanism_supported_key_sizes_bytes(proc_params->id, in load_tee_key() 377 rc = hash_secret_helper(proc_params->id, obj, &tee_attr, in load_tee_key() 438 struct pkcs11_attribute_head *proc_params) in tee_init_derive_symm() argument 445 if (!proc_params) in tee_init_derive_symm() 452 serialargs_init(&args, proc_params->data, proc_params->size); in tee_init_derive_symm() [all …]
|
| H A D | processing_digest.c | 40 pkcs2tee_algorithm(uint32_t *tee_id, struct pkcs11_attribute_head *proc_params) in pkcs2tee_algorithm() argument 56 if (proc_params->id == pkcs2tee_algo[n].mech_id) { in pkcs2tee_algorithm() 89 struct pkcs11_attribute_head *proc_params) in init_digest_operation() argument 93 assert(processing_is_tee_digest(proc_params->id)); in init_digest_operation() 95 rc = allocate_tee_operation(session, proc_params); in init_digest_operation() 97 session->processing->mecha_type = proc_params->id; in init_digest_operation()
|
| H A D | processing_ec.c | 437 struct pkcs11_attribute_head *proc_params, in pkcs2tee_algo_ecdsa() argument 440 switch (proc_params->id) { in pkcs2tee_algo_ecdsa() 589 enum pkcs11_rc generate_ec_keys(struct pkcs11_attribute_head *proc_params, in generate_ec_keys() argument 602 if (!proc_params || !*pub_head || !*priv_head) in generate_ec_keys() 725 enum pkcs11_rc generate_eddsa_keys(struct pkcs11_attribute_head *proc_params, in generate_eddsa_keys() argument 736 if (!proc_params || !*pub_head || !*priv_head) in generate_eddsa_keys() 805 struct pkcs11_attribute_head *proc_params) in pkcs2tee_proc_params_eddsa() argument 814 serialargs_init(&args, proc_params->data, proc_params->size); in pkcs2tee_proc_params_eddsa() 867 enum pkcs11_rc pkcs2tee_param_ecdh(struct pkcs11_attribute_head *proc_params, in pkcs2tee_param_ecdh() argument 875 serialargs_init(&args, proc_params->data, proc_params->size); in pkcs2tee_param_ecdh() [all …]
|
| H A D | processing_asymm.c | 58 struct pkcs11_attribute_head *proc_params, in pkcs2tee_algorithm() argument 108 if (pkcs2tee_algo[n].mech_id == proc_params->id) { in pkcs2tee_algorithm() 118 switch (proc_params->id) { in pkcs2tee_algorithm() 125 rc = pkcs2tee_algo_rsa_pss(tee_id, proc_params); in pkcs2tee_algorithm() 128 rc = pkcs2tee_algo_rsa_oaep(tee_id, tee_hash_id, proc_params); in pkcs2tee_algorithm() 132 proc_params); in pkcs2tee_algorithm() 140 rc = pkcs2tee_algo_ecdsa(tee_id, proc_params, obj); in pkcs2tee_algorithm() 143 rc = pkcs2tee_algo_ecdh(tee_id, proc_params, obj); in pkcs2tee_algorithm() 405 struct pkcs11_attribute_head *proc_params, in init_tee_operation() argument 411 switch (proc_params->id) { in init_tee_operation() [all …]
|
| H A D | processing_aes.c | 418 void *proc_params, size_t params_size) in tee_init_ctr_operation() argument 426 if (!proc_params) in tee_init_ctr_operation() 429 serialargs_init(&args, proc_params, params_size); in tee_init_ctr_operation() 455 void *proc_params, size_t params_size) in tee_init_gcm_operation() argument 470 if (!proc_params) in tee_init_gcm_operation() 473 serialargs_init(&args, proc_params, params_size); in tee_init_gcm_operation()
|