crypto_internal_keystruct key;
unsigned char module_buf[512] = {0x0, };
- unsigned char pub_buf[512] = {0x0, };
unsigned char priv_buf[512] = {0x0, };
memset(&key, 0x00, sizeof(crypto_internal_keystruct));
key.rsa_modulus.size = sizeof(module_buf);
key.rsa_modulus.buffer = module_buf;
- key.rsa_public.size = sizeof(pub_buf);
- key.rsa_public.buffer = pub_buf;
key.rsa_private.size = sizeof(priv_buf);
key.rsa_private.buffer = priv_buf;
(void*)key.rsa_modulus.buffer, (size_t*)&key.rsa_modulus.size) != TEE_SUCCESS) {
CRYPTO_PANIC;
}
- if (TEE_GetObjectBufferAttribute(op->key1, TEE_ATTR_RSA_PUBLIC_EXPONENT,
- (void*)key.rsa_public.buffer, (size_t*)&key.rsa_public.size) != TEE_SUCCESS) {
- CRYPTO_PANIC;
- }
if (TEE_GetObjectBufferAttribute(op->key1, TEE_ATTR_RSA_PRIVATE_EXPONENT,
(void*)key.rsa_private.buffer, (size_t*)&key.rsa_private.size) != TEE_SUCCESS) {
CRYPTO_PANIC;
CRYPTO_PANIC;
}
#endif
- if(!key.rsa_modulus.buffer || !key.rsa_public.buffer || !key.rsa_private.buffer
- /*|| !key.rsa_prime1.buffer || !key.rsa_prime2.buffer || !key.rsa_exponent1.buffer
+ if(!key.rsa_modulus.buffer || !key.rsa_private.buffer /*|| !key.rsa_public.buffer
+ || !key.rsa_prime1.buffer || !key.rsa_prime2.buffer || !key.rsa_exponent1.buffer
|| !key.rsa_exponent2.buffer || !key.rsa_coefficient.buffer*/) {
CRYPTO_PANIC;
}