Searched refs:ssa_data (Results 1 – 4 of 4) sorted by relevance
33 static TEE_Result emsa_pkcs1_v1_5_encode(struct drvcrypt_rsa_ssa *ssa_data, in emsa_pkcs1_v1_5_encode() argument40 hash_oid = drvcrypt_get_alg_hash_oid(ssa_data->hash_algo); in emsa_pkcs1_v1_5_encode()48 ps_size = ssa_data->key.n_size - 3; in emsa_pkcs1_v1_5_encode()49 ps_size -= ssa_data->digest_size; in emsa_pkcs1_v1_5_encode()52 CRYPTO_TRACE("PS size = %zu (n %zu)", ps_size, ssa_data->key.n_size); in emsa_pkcs1_v1_5_encode()92 *buf++ = 0x08 + hash_oid->asn1_length + ssa_data->digest_size; in emsa_pkcs1_v1_5_encode()106 *buf++ = ssa_data->digest_size; in emsa_pkcs1_v1_5_encode()109 memcpy(buf, ssa_data->message.data, ssa_data->digest_size); in emsa_pkcs1_v1_5_encode()125 emsa_pkcs1_v1_5_encode_noasn1(struct drvcrypt_rsa_ssa *ssa_data, in emsa_pkcs1_v1_5_encode_noasn1() argument135 ps_size = ssa_data->key.n_size - 3; in emsa_pkcs1_v1_5_encode_noasn1()[all …]
25 TEE_Result drvcrypt_rsassa_sign(struct drvcrypt_rsa_ssa *ssa_data);32 TEE_Result drvcrypt_rsassa_verify(struct drvcrypt_rsa_ssa *ssa_data);
840 static TEE_Result do_ssa_sign(struct drvcrypt_rsa_ssa *ssa_data) in do_ssa_sign() argument842 if (!oefid_keylen_supported(ssa_data->key.n_size * 8)) in do_ssa_sign()843 return sign_ssa_fallback(ssa_data); in do_ssa_sign()845 if (!keypair_supported(ssa_data->key.key, oefid_cipher_type())) in do_ssa_sign()846 return sign_ssa_fallback(ssa_data); in do_ssa_sign()849 switch (ssa_data->algo) { in do_ssa_sign()855 if (ssa_data->key.n_size * 8 <= 512) in do_ssa_sign()856 return sign_ssa_fallback(ssa_data); in do_ssa_sign()859 if (ssa_data->key.n_size * 8 <= 1024) in do_ssa_sign()860 return sign_ssa_fallback(ssa_data); in do_ssa_sign()[all …]
101 TEE_Result (*ssa_sign)(struct drvcrypt_rsa_ssa *ssa_data);103 TEE_Result (*ssa_verify)(struct drvcrypt_rsa_ssa *ssa_data);