Lines Matching defs:ret
51 int ret;
55 ret = stm32_hash_register();
56 if (ret != 0) {
57 ERROR("HASH init (%d)\n", ret);
85 int ret;
99 ret = mbedtls_asn1_get_tag(&p, end, len,
101 if (ret != 0) {
106 ret = mbedtls_asn1_get_alg(&p, end, &alg_oid, &alg_params);
107 if (ret != 0) {
108 VERBOSE("%s: mbedtls_asn1_get_alg (%d)\n", __func__, ret);
125 ret = mbedtls_asn1_get_bitstring_null(&p, end, len);
126 if (ret != 0) {
127 VERBOSE("%s: mbedtls_asn1_get_bitstring_null (%d)\n", __func__, ret);
147 int ret;
149 ret = mmap_add_dynamic_region(STM32MP_ROM_BASE, STM32MP_ROM_BASE,
151 if (ret != 0) {
152 VERBOSE("%s: mmap_add_dynamic_region (%d)\n", __func__, ret);
156 ret = auth_ops.verify_signature(hash_in, pubkey_in, signature, ecc_algo);
158 if (ret != BOOT_API_RETURN_OK) {
159 VERBOSE("%s: auth_ops.verify_sign (%d)\n", __func__, ret);
160 ret = CRYPTO_ERR_SIGNATURE;
162 ret = 0;
167 return ret;
174 int ret;
176 ret = get_plain_pk_from_asn1(full_pk_ptr, full_pk_len, hashed_pk_ptr, &len, NULL);
177 if (ret == 0) {
181 return ret;
187 int ret = -1;
194 ret = 0;
202 ret = 0;
212 if (ret < 0) {
216 ret = stm32_pka_ecdsa_verif(hash_in,
224 if (ret < 0) {
235 int ret;
241 ret = get_plain_pk_from_asn1(full_pk_ptr, full_pk_len, &plain_pk, &len, &curve_id);
242 if ((ret != 0) || (len > CRYPTO_PUBKEY_MAX_SIZE)) {
261 int ret;
272 ret = mbedtls_asn1_get_tag(&p, end, &len, MBEDTLS_ASN1_CONSTRUCTED |
274 if (ret != 0) {
275 return ret;
279 ret = mbedtls_asn1_get_alg(&p, end, &hash_oid, ¶ms);
280 if (ret != 0) {
281 return ret;
284 ret = mbedtls_oid_get_md_alg(&hash_oid, md_alg);
285 if (ret != 0) {
286 return ret;
289 ret = mbedtls_asn1_get_tag(&p, end, &len, MBEDTLS_ASN1_OCTET_STRING);
290 if (ret != 0) {
291 return ret;
313 int ret;
332 ret = mbedtls_asn1_get_alg(&p, end, &sig_oid, &sig_params);
333 if (ret != 0) {
334 VERBOSE("%s: mbedtls_asn1_get_alg (%d)\n", __func__, ret);
339 ret = mbedtls_oid_get_sig_alg(&sig_oid, &md_alg, &pk_alg);
340 if (ret != 0) {
341 VERBOSE("%s: mbedtls_oid_get_sig_alg (%d)\n", __func__, ret);
350 ret = get_plain_pk_from_asn1(pk_ptr, pk_len, &pk_ptr, &len, &curve_id);
351 if (ret != 0) {
352 VERBOSE("%s: get_plain_pk_from_asn1 (%d)\n", __func__, ret);
370 ret = mbedtls_asn1_get_bitstring_null(&p, end, &len);
371 if (ret != 0) {
372 VERBOSE("%s: mbedtls_asn1_get_bitstring_null (%d)\n", __func__, ret);
377 ret = mbedtls_asn1_get_sequence_of(&p, end, &seq, MBEDTLS_ASN1_INTEGER);
378 if (ret != 0) {
379 VERBOSE("%s: mbedtls_asn1_get_sequence_of (%d)\n", __func__, ret);
436 ret = stm32_hash_final_update((uint8_t *)data_ptr, data_len, image_hash);
437 if (ret != 0) {
438 VERBOSE("%s: stm32_hash_final_update (%d)\n", __func__, ret);
449 int ret;
456 ret = get_plain_digest_from_asn1(digest_info_ptr,
459 if ((ret != 0) || (md_alg != MBEDTLS_MD_SHA256) || (len != sizeof(calc_hash))) {
468 ret = stm32_hash_final_update(data_ptr, data_len, calc_hash);
469 if (ret != 0) {
474 ret = memcmp(calc_hash, digest_info_ptr, digest_info_len);
475 if (ret != 0) {
477 ret = CRYPTO_ERR_HASH;
480 return ret;
577 int ret;
586 ret = stm32_saes_init(&ctx, true, STM32_SAES_MODE_GCM, key_mode, key,
588 if (ret != 0) {
592 ret = stm32_saes_update_assodata(&ctx, true, NULL, 0U);
593 if (ret != 0) {
597 ret = stm32_saes_update_load(&ctx, true, data, data, data_len);
598 if (ret != 0) {
602 ret = stm32_saes_final(&ctx, tag_buf, sizeof(tag_buf));
603 if (ret != 0) {