Lines Matching refs:status
46 psa_status_t status;
48 status = mbedtls_to_psa_error(
50 if (status == PSA_SUCCESS) {
52 status = PSA_ERROR_NOT_SUPPORTED;
56 return status;
63 psa_status_t status;
74 status = mbedtls_to_psa_error(mbedtls_rsa_parse_key(*p_rsa, data, data_length));
76 status = mbedtls_to_psa_error(mbedtls_rsa_parse_pubkey(*p_rsa, data, data_length));
78 if (status != PSA_SUCCESS) {
87 status = PSA_ERROR_NOT_SUPPORTED;
90 status = psa_check_rsa_key_byte_aligned(*p_rsa);
91 if (status != PSA_SUCCESS) {
96 return status;
115 psa_status_t status;
119 status = mbedtls_psa_rsa_load_representation(attributes->type,
123 if (status != PSA_SUCCESS) {
133 status = mbedtls_psa_rsa_export_key(attributes->type,
143 return status;
195 psa_status_t status = PSA_ERROR_CORRUPTION_DETECTED;
198 status = mbedtls_psa_rsa_load_representation(
200 if (status != PSA_SUCCESS) {
201 return status;
204 status = mbedtls_psa_rsa_export_key(PSA_KEY_TYPE_RSA_PUBLIC_KEY,
213 return status;
247 psa_status_t status;
253 status = psa_rsa_read_exponent(params->data, params_data_length,
255 if (status != PSA_SUCCESS) {
256 return status;
270 status = mbedtls_psa_rsa_export_key(attributes->type,
275 return status;
323 psa_status_t status = PSA_ERROR_CORRUPTION_DETECTED;
328 status = mbedtls_psa_rsa_load_representation(attributes->type,
332 if (status != PSA_SUCCESS) {
333 return status;
336 status = psa_rsa_decode_md_type(alg, hash_length, &md_alg);
337 if (status != PSA_SUCCESS) {
342 status = PSA_ERROR_BUFFER_TOO_SMALL;
377 status = PSA_ERROR_INVALID_ARGUMENT;
384 status = mbedtls_to_psa_error(ret);
390 return status;
422 psa_status_t status = PSA_ERROR_CORRUPTION_DETECTED;
427 status = mbedtls_psa_rsa_load_representation(attributes->type,
431 if (status != PSA_SUCCESS) {
435 status = psa_rsa_decode_md_type(alg, hash_length, &md_alg);
436 if (status != PSA_SUCCESS) {
441 status = PSA_ERROR_INVALID_SIGNATURE;
474 status = PSA_ERROR_INVALID_ARGUMENT;
481 status = (ret == MBEDTLS_ERR_RSA_INVALID_PADDING) ?
489 return status;
506 /* Just to get the error status right, as rsa_set_padding() doesn't
528 psa_status_t status = PSA_ERROR_CORRUPTION_DETECTED;
543 status = mbedtls_psa_rsa_load_representation(attributes->type,
547 if (status != PSA_SUCCESS) {
552 status = PSA_ERROR_BUFFER_TOO_SMALL;
559 status = mbedtls_to_psa_error(
567 status = PSA_ERROR_NOT_SUPPORTED;
572 status = mbedtls_to_psa_error(
574 if (status != PSA_SUCCESS) {
578 status = mbedtls_to_psa_error(
587 status = PSA_ERROR_NOT_SUPPORTED;
590 status = PSA_ERROR_INVALID_ARGUMENT;
595 if (status == PSA_SUCCESS) {
604 status = PSA_ERROR_NOT_SUPPORTED;
607 return status;
622 psa_status_t status = PSA_ERROR_CORRUPTION_DETECTED;
639 status = mbedtls_psa_rsa_load_representation(attributes->type,
643 if (status != PSA_SUCCESS) {
648 status = PSA_ERROR_INVALID_ARGUMENT;
656 status = mbedtls_to_psa_error(
665 status = PSA_ERROR_NOT_SUPPORTED;
670 status = mbedtls_to_psa_error(
672 if (status != PSA_SUCCESS) {
676 status = mbedtls_to_psa_error(
686 status = PSA_ERROR_NOT_SUPPORTED;
689 status = PSA_ERROR_INVALID_ARGUMENT;
700 status = PSA_ERROR_NOT_SUPPORTED;
703 return status;