Searched refs:a_size (Results 1 – 6 of 6) sorted by relevance
/optee_os-3.20.0/ta/pkcs11/src/ |
A D | pkcs11_helpers.c | 554 uint32_t a_size = 0; in pkcs2tee_load_attr() local 564 &a_ptr, &a_size) || !a_ptr) { in pkcs2tee_load_attr() 570 data32 = ec_params2tee_curve(a_ptr, a_size); in pkcs2tee_load_attr() 576 data32 = (ec_params2tee_keysize(a_ptr, a_size) + 7) / 8; in pkcs2tee_load_attr() 579 &a_ptr, &a_size)) { in pkcs2tee_load_attr() 615 if (a_size != (hsize - 1) + qsize) { in pkcs2tee_load_attr() 620 if (a_size != hsize + 2 * data32) { in pkcs2tee_load_attr() 639 if (get_attribute_ptr(obj->attributes, pkcs11_id, &a_ptr, &a_size)) in pkcs2tee_load_attr() 642 TEE_InitRefAttribute(tee_ref, tee_id, a_ptr, a_size); in pkcs2tee_load_attr() 660 uint32_t a_size = 0; in pkcs2tee_load_hashed_attr() local [all …]
|
A D | processing_ec.c | 578 uint32_t a_size = 0; in generate_ec_keys() local 598 &a_ptr, &a_size) || !a_ptr) { in generate_ec_keys() 603 tee_size = ec_params2tee_keysize(a_ptr, a_size); in generate_ec_keys() 607 tee_curve = ec_params2tee_curve(a_ptr, a_size); in generate_ec_keys() 632 rc = add_attribute(priv_head, PKCS11_CKA_EC_PARAMS, a_ptr, a_size); in generate_ec_keys() 714 uint32_t a_size = 0; in generate_eddsa_keys() local 733 &a_ptr, &a_size) || !a_ptr) { in generate_eddsa_keys() 738 tee_size = ec_params2tee_keysize(a_ptr, a_size); in generate_eddsa_keys() 762 rc = add_attribute(priv_head, PKCS11_CKA_EC_PARAMS, a_ptr, a_size); in generate_eddsa_keys()
|
A D | processing.c | 127 uint32_t a_size = 0; in get_object_key_bit_size() local 139 if (get_attribute_ptr(attrs, PKCS11_CKA_VALUE, NULL, &a_size)) in get_object_key_bit_size() 142 return a_size * 8; in get_object_key_bit_size() 144 if (get_attribute_ptr(attrs, PKCS11_CKA_MODULUS, NULL, &a_size)) in get_object_key_bit_size() 147 return a_size * 8; in get_object_key_bit_size() 150 &a_ptr, &a_size) || !a_ptr) in get_object_key_bit_size() 153 return ec_params2tee_keysize(a_ptr, a_size); in get_object_key_bit_size() 156 &a_size)) in get_object_key_bit_size() 159 return a_size * 8; in get_object_key_bit_size() 370 size_t a_size = 0; in tee2pkcs_add_attribute() local [all …]
|
A D | processing_asymm.c | 879 size_t a_size = 0; in do_asymm_derivation() local 901 rc = pkcs2tee_param_ecdh(proc_params, &a_ptr, &a_size); in do_asymm_derivation() 907 a_ptr, a_size / 2); in do_asymm_derivation() 911 (char *)a_ptr + a_size / 2, in do_asymm_derivation() 912 a_size / 2); in do_asymm_derivation() 924 &a_ptr, &a_size); in do_asymm_derivation() 928 if (a_size * 8 < key_bit_size) in do_asymm_derivation()
|
A D | processing_rsa.c | 693 uint32_t a_size = 0; in generate_rsa_keys() local 704 &a_size); in generate_rsa_keys() 705 if (rc != PKCS11_CKR_OK || a_size != sizeof(uint32_t)) in generate_rsa_keys() 711 &a_size); in generate_rsa_keys() 718 a_ptr, a_size); in generate_rsa_keys()
|
A D | pkcs11_attributes.c | 865 uint32_t a_size = 0; in sanitize_symm_key_attributes() local 869 rc = get_attribute_ptr(*temp, PKCS11_CKA_VALUE, NULL, &a_size); in sanitize_symm_key_attributes() 883 if (rc || a_size == 0) in sanitize_symm_key_attributes() 891 &a_size, sizeof(uint32_t)); in sanitize_symm_key_attributes()
|
Completed in 14 milliseconds