Searched refs:proc (Results 1 – 9 of 9) sorted by relevance
| /optee_os/ta/pkcs11/src/ |
| H A D | processing_asymm.c | 409 struct active_processing *proc = session->processing; in init_tee_operation() local 413 rc = pkcs2tee_rsa_nopad_context(proc); in init_tee_operation() 421 rc = pkcs2tee_proc_params_rsa_pss(proc, proc_params); in init_tee_operation() 425 rc = pkcs2tee_validate_rsa_pss(proc, obj); in init_tee_operation() 428 rc = pkcs2tee_proc_params_rsa_oaep(proc, proc_params); in init_tee_operation() 431 rc = pkcs2tee_proc_params_eddsa(proc, proc_params); in init_tee_operation() 434 rc = pkcs2tee_proc_params_rsa_aes_wrap(proc, proc_params); in init_tee_operation() 496 struct active_processing *proc = session->processing; in step_asymm_operation() local 534 switch (proc->mecha_type) { in step_asymm_operation() 548 rsa_pss_ctx = proc->extra_ctx; in step_asymm_operation() [all …]
|
| H A D | processing_symm.c | 657 static enum pkcs11_rc input_data_size_is_valid(struct active_processing *proc, in input_data_size_is_valid() argument 661 switch (proc->mecha_type) { in input_data_size_is_valid() 687 static enum pkcs11_rc input_sign_size_is_valid(struct active_processing *proc, in input_sign_size_is_valid() argument 692 switch (proc->mecha_type) { in input_sign_size_is_valid() 747 struct active_processing *proc = session->processing; in step_symm_operation() local 785 rc = input_data_size_is_valid(proc, function, in_size); in step_symm_operation() 793 switch (proc->mecha_type) { in step_symm_operation() 820 TEE_MACUpdate(proc->tee_op_handle, in_buf, in_size); in step_symm_operation() 845 res = TEE_CipherUpdate(proc->tee_op_handle, in step_symm_operation() 862 res = TEE_AEUpdate(proc->tee_op_handle, in step_symm_operation() [all …]
|
| H A D | processing_digest.c | 125 struct active_processing *proc = session->processing; in step_digest_operation() local 153 assert(proc->tee_op_handle != TEE_HANDLE_NULL); in step_digest_operation() 155 assert(processing_is_tee_digest(proc->mecha_type)); in step_digest_operation() 181 TEE_DigestUpdate(proc->tee_op_handle, secret_value, in step_digest_operation() 189 TEE_DigestUpdate(proc->tee_op_handle, in_buf, in_size); in step_digest_operation() 210 res = TEE_DigestDoFinal(proc->tee_op_handle, in step_digest_operation()
|
| H A D | processing_rsa.c | 18 pkcs2tee_proc_params_rsa_pss(struct active_processing *proc, in pkcs2tee_proc_params_rsa_pss() argument 45 proc->extra_ctx = TEE_Malloc(sizeof(struct rsa_pss_processing_ctx), in pkcs2tee_proc_params_rsa_pss() 47 if (!proc->extra_ctx) in pkcs2tee_proc_params_rsa_pss() 50 ctx = proc->extra_ctx; in pkcs2tee_proc_params_rsa_pss() 59 enum pkcs11_rc pkcs2tee_validate_rsa_pss(struct active_processing *proc, in pkcs2tee_validate_rsa_pss() argument 67 rsa_pss_ctx = proc->extra_ctx; in pkcs2tee_validate_rsa_pss() 200 pkcs2tee_proc_params_rsa_oaep(struct active_processing *proc, in pkcs2tee_proc_params_rsa_oaep() argument 237 proc->extra_ctx = TEE_Malloc(sizeof(struct rsa_oaep_processing_ctx) + in pkcs2tee_proc_params_rsa_oaep() 240 if (!proc->extra_ctx) in pkcs2tee_proc_params_rsa_oaep() 243 ctx = proc->extra_ctx; in pkcs2tee_proc_params_rsa_oaep() [all …]
|
| H A D | processing.h | 241 pkcs2tee_proc_params_rsa_pss(struct active_processing *proc, 244 enum pkcs11_rc pkcs2tee_validate_rsa_pss(struct active_processing *proc, 251 pkcs2tee_proc_params_rsa_oaep(struct active_processing *proc, 255 pkcs2tee_proc_params_rsa_aes_wrap(struct active_processing *proc, 259 pkcs2tee_proc_params_eddsa(struct active_processing *proc, 286 enum pkcs11_rc pkcs2tee_rsa_nopad_context(struct active_processing *proc);
|
| H A D | pkcs11_token.c | 193 struct active_processing *proc = NULL; in set_processing_state() local 224 proc = TEE_Malloc(sizeof(*proc), TEE_MALLOC_FILL_ZERO); in set_processing_state() 225 if (!proc) in set_processing_state() 229 proc->state = state; in set_processing_state() 230 proc->step = PKCS11_FUNC_STEP_INIT; in set_processing_state() 231 proc->tee_op_handle = TEE_HANDLE_NULL; in set_processing_state() 232 proc->tee_hash_algo = 0; in set_processing_state() 233 proc->tee_op_handle2 = TEE_HANDLE_NULL; in set_processing_state() 236 proc->always_authen = true; in set_processing_state() 239 proc->always_authen = true; in set_processing_state() [all …]
|
| H A D | processing_ec.c | 804 pkcs2tee_proc_params_eddsa(struct active_processing *proc, in pkcs2tee_proc_params_eddsa() argument 831 proc->extra_ctx = TEE_Malloc(sizeof(*ctx) + ctx_len, in pkcs2tee_proc_params_eddsa() 833 if (!proc->extra_ctx) in pkcs2tee_proc_params_eddsa() 836 ctx = proc->extra_ctx; in pkcs2tee_proc_params_eddsa()
|
| H A D | pkcs11_attributes.c | 1613 #define DMSG_BAD_BBOOL(attr, proc, head) \ argument 1621 id2str_attr(_attr), id2str_proc((proc)), \ 1881 uint32_t proc = 0; in parent_key_complies_allowed_processings() local 1895 TEE_MemMove(&proc, attr, sizeof(uint32_t)); in parent_key_complies_allowed_processings() 1898 if (proc == proc_id) in parent_key_complies_allowed_processings()
|
| /optee_os/core/arch/arm/dts/ |
| H A D | stm32mp151.dtsi | 130 st,proc-id = <0>;
|