summaryrefslogtreecommitdiff
path: root/board/cr50/tpm2/rsa.c
diff options
context:
space:
mode:
Diffstat (limited to 'board/cr50/tpm2/rsa.c')
-rw-r--r--board/cr50/tpm2/rsa.c26
1 files changed, 13 insertions, 13 deletions
diff --git a/board/cr50/tpm2/rsa.c b/board/cr50/tpm2/rsa.c
index 97797d440a..9fc7f3b085 100644
--- a/board/cr50/tpm2/rsa.c
+++ b/board/cr50/tpm2/rsa.c
@@ -94,7 +94,7 @@ CRYPT_RESULT _cpri__EncryptRSA(uint32_t *out_len, uint8_t *out,
struct RSA rsa;
enum padding_mode padding;
enum hashing_mode hashing;
- int result;
+ enum dcrypto_result result;
if (!check_key(key))
return CRYPT_FAIL;
@@ -113,7 +113,7 @@ CRYPT_RESULT _cpri__EncryptRSA(uint32_t *out_len, uint8_t *out,
reverse_tpm2b(key->publicKey);
- if (result)
+ if (result == DCRYPTO_OK)
return CRYPT_SUCCESS;
else
return CRYPT_FAIL;
@@ -127,7 +127,7 @@ CRYPT_RESULT _cpri__DecryptRSA(uint32_t *out_len, uint8_t *out,
struct RSA rsa;
enum padding_mode padding;
enum hashing_mode hashing;
- int result;
+ enum dcrypto_result result;
if (!check_key(key))
return CRYPT_FAIL;
@@ -149,7 +149,7 @@ CRYPT_RESULT _cpri__DecryptRSA(uint32_t *out_len, uint8_t *out,
reverse_tpm2b(key->publicKey);
reverse_tpm2b(key->privateKey);
- if (result)
+ if (result == DCRYPTO_OK)
return CRYPT_SUCCESS;
else
return CRYPT_FAIL;
@@ -162,7 +162,7 @@ CRYPT_RESULT _cpri__SignRSA(uint32_t *out_len, uint8_t *out,
struct RSA rsa;
enum padding_mode padding;
enum hashing_mode hashing;
- int result;
+ enum dcrypto_result result;
if (!check_key(key))
return CRYPT_FAIL;
@@ -186,7 +186,7 @@ CRYPT_RESULT _cpri__SignRSA(uint32_t *out_len, uint8_t *out,
reverse_tpm2b(key->publicKey);
reverse_tpm2b(key->privateKey);
- if (result)
+ if (result == DCRYPTO_OK)
return CRYPT_SUCCESS;
else
return CRYPT_FAIL;
@@ -200,7 +200,7 @@ CRYPT_RESULT _cpri__ValidateSignatureRSA(
struct RSA rsa;
enum padding_mode padding;
enum hashing_mode hashing;
- int result;
+ enum dcrypto_result result;
if (!check_key(key))
return CRYPT_FAIL;
@@ -220,7 +220,7 @@ CRYPT_RESULT _cpri__ValidateSignatureRSA(
reverse_tpm2b(key->publicKey);
- if (result)
+ if (result == DCRYPTO_OK)
return CRYPT_SUCCESS;
else
return CRYPT_FAIL;
@@ -233,7 +233,7 @@ CRYPT_RESULT _cpri__TestKeyRSA(TPM2B *d_buf, uint32_t e,
struct LITE_BIGNUM p;
struct LITE_BIGNUM q;
struct LITE_BIGNUM d;
- int result;
+ enum dcrypto_result result;
if (!p_buf)
return CRYPT_PARAMETER;
@@ -262,7 +262,7 @@ CRYPT_RESULT _cpri__TestKeyRSA(TPM2B *d_buf, uint32_t e,
if (q_buf)
reverse_tpm2b(q_buf);
- if (result) {
+ if (result == DCRYPTO_OK) {
d_buf->size = N_buf->size;
reverse_tpm2b(d_buf);
return CRYPT_SUCCESS;
@@ -290,7 +290,7 @@ static int generate_prime(struct LITE_BIGNUM *b, TPM_ALG_ID hashing,
bn_bits(b), (uint8_t *) b->d, NULL, FALSE);
(*counter)++; /* Mark as used. */
- if (DCRYPTO_bn_generate_prime(b))
+ if (DCRYPTO_bn_generate_prime(b) == DCRYPTO_OK)
return 1;
}
@@ -1132,7 +1132,7 @@ static void rsa_command_handler(void *cmd_body,
}
DCRYPTO_bn_wrap(&bn, bn_buf, in_len);
memcpy(bn_buf, in, in_len);
- if (DCRYPTO_bn_generate_prime(&bn)) {
+ if (DCRYPTO_bn_generate_prime(&bn) == DCRYPTO_OK) {
memcpy(out, bn.d, bn_size(&bn));
*response_size = bn_size(&bn);
} else {
@@ -1160,7 +1160,7 @@ static void rsa_command_handler(void *cmd_body,
sizeof(RSA_2048_CERT), &rsa);
reverse_tpm2b(key.publicKey);
- if (!result) {
+ if (result != DCRYPTO_OK) {
*response_size = 0;
return;
}