Home
last modified time | relevance | path

Searched refs:a_size (Results 1 – 6 of 6) sorted by relevance

/optee_os-3.20.0/ta/pkcs11/src/
A Dpkcs11_helpers.c554 uint32_t a_size = 0; in pkcs2tee_load_attr() local
564 &a_ptr, &a_size) || !a_ptr) { in pkcs2tee_load_attr()
570 data32 = ec_params2tee_curve(a_ptr, a_size); in pkcs2tee_load_attr()
576 data32 = (ec_params2tee_keysize(a_ptr, a_size) + 7) / 8; in pkcs2tee_load_attr()
579 &a_ptr, &a_size)) { in pkcs2tee_load_attr()
615 if (a_size != (hsize - 1) + qsize) { in pkcs2tee_load_attr()
620 if (a_size != hsize + 2 * data32) { in pkcs2tee_load_attr()
639 if (get_attribute_ptr(obj->attributes, pkcs11_id, &a_ptr, &a_size)) in pkcs2tee_load_attr()
642 TEE_InitRefAttribute(tee_ref, tee_id, a_ptr, a_size); in pkcs2tee_load_attr()
660 uint32_t a_size = 0; in pkcs2tee_load_hashed_attr() local
[all …]
A Dprocessing_ec.c578 uint32_t a_size = 0; in generate_ec_keys() local
598 &a_ptr, &a_size) || !a_ptr) { in generate_ec_keys()
603 tee_size = ec_params2tee_keysize(a_ptr, a_size); in generate_ec_keys()
607 tee_curve = ec_params2tee_curve(a_ptr, a_size); in generate_ec_keys()
632 rc = add_attribute(priv_head, PKCS11_CKA_EC_PARAMS, a_ptr, a_size); in generate_ec_keys()
714 uint32_t a_size = 0; in generate_eddsa_keys() local
733 &a_ptr, &a_size) || !a_ptr) { in generate_eddsa_keys()
738 tee_size = ec_params2tee_keysize(a_ptr, a_size); in generate_eddsa_keys()
762 rc = add_attribute(priv_head, PKCS11_CKA_EC_PARAMS, a_ptr, a_size); in generate_eddsa_keys()
A Dprocessing.c127 uint32_t a_size = 0; in get_object_key_bit_size() local
139 if (get_attribute_ptr(attrs, PKCS11_CKA_VALUE, NULL, &a_size)) in get_object_key_bit_size()
142 return a_size * 8; in get_object_key_bit_size()
144 if (get_attribute_ptr(attrs, PKCS11_CKA_MODULUS, NULL, &a_size)) in get_object_key_bit_size()
147 return a_size * 8; in get_object_key_bit_size()
150 &a_ptr, &a_size) || !a_ptr) in get_object_key_bit_size()
153 return ec_params2tee_keysize(a_ptr, a_size); in get_object_key_bit_size()
156 &a_size)) in get_object_key_bit_size()
159 return a_size * 8; in get_object_key_bit_size()
370 size_t a_size = 0; in tee2pkcs_add_attribute() local
[all …]
A Dprocessing_asymm.c879 size_t a_size = 0; in do_asymm_derivation() local
901 rc = pkcs2tee_param_ecdh(proc_params, &a_ptr, &a_size); in do_asymm_derivation()
907 a_ptr, a_size / 2); in do_asymm_derivation()
911 (char *)a_ptr + a_size / 2, in do_asymm_derivation()
912 a_size / 2); in do_asymm_derivation()
924 &a_ptr, &a_size); in do_asymm_derivation()
928 if (a_size * 8 < key_bit_size) in do_asymm_derivation()
A Dprocessing_rsa.c693 uint32_t a_size = 0; in generate_rsa_keys() local
704 &a_size); in generate_rsa_keys()
705 if (rc != PKCS11_CKR_OK || a_size != sizeof(uint32_t)) in generate_rsa_keys()
711 &a_size); in generate_rsa_keys()
718 a_ptr, a_size); in generate_rsa_keys()
A Dpkcs11_attributes.c865 uint32_t a_size = 0; in sanitize_symm_key_attributes() local
869 rc = get_attribute_ptr(*temp, PKCS11_CKA_VALUE, NULL, &a_size); in sanitize_symm_key_attributes()
883 if (rc || a_size == 0) in sanitize_symm_key_attributes()
891 &a_size, sizeof(uint32_t)); in sanitize_symm_key_attributes()

Completed in 14 milliseconds