summaryrefslogtreecommitdiff
path: root/peripheral/keystore/chaabi/libcc54/generated/crys_rsa_seprpc.h
diff options
context:
space:
mode:
Diffstat (limited to 'peripheral/keystore/chaabi/libcc54/generated/crys_rsa_seprpc.h')
-rw-r--r--peripheral/keystore/chaabi/libcc54/generated/crys_rsa_seprpc.h880
1 files changed, 880 insertions, 0 deletions
diff --git a/peripheral/keystore/chaabi/libcc54/generated/crys_rsa_seprpc.h b/peripheral/keystore/chaabi/libcc54/generated/crys_rsa_seprpc.h
new file mode 100644
index 0000000..5b881c6
--- /dev/null
+++ b/peripheral/keystore/chaabi/libcc54/generated/crys_rsa_seprpc.h
@@ -0,0 +1,880 @@
+/* Generated file - DO NOT EDIT! */
+/* Generated by utils/src/sep_rpc_gen/sep_rpc_gen.py@2451 at 2012-09-20 11:56:54.312055 */
+/*******************************************************************
+* (c) Copyright 2011-2012 Discretix Technologies Ltd. *
+* This file is licensed under the terms provided in the file *
+* libcc54/LICENSE in this directory or a parent directory *
+********************************************************************/
+
+/* \file crys_rsa_seprpc.h
+ * SeP-RPC header file for CrysRsa API */
+
+#ifndef __CRYS_RSA_SEPRPC_H__
+#define __CRYS_RSA_SEPRPC_H__
+
+#define SEPRPC_AGENT_ID_CrysRsa 2
+
+#include "crys_host_rpc_config.h"
+#include "crys_rsa_error.h"
+#include "crys_rsa_prim.h"
+#include "crys_rsa_schemes.h"
+#include "crys_rsa_build.h"
+#include "crys_rsa_kg.h"
+#include "crys_rsa_extend.h"
+#include "sep_rpc.h"
+#include "dx_pal_compiler.h"
+
+
+/************ CRYS_RSA_PRIM_Encrypt ***************/
+#define SEPRPC_FUNC_ID_CRYS_RSA_PRIM_Encrypt 1
+/*
+CRYSError_t CRYS_RSA_PRIM_Encrypt(
+ CRYS_RSAUserPubKey_t *UserPubKey_ptr,
+ CRYS_RSAPrimeData_t *PrimeData_ptr,
+ DxUint8_t Data_ptr[],
+ DxUint16_t DataSize,
+ DxUint8_t Output_ptr[])
+*/
+
+#define SEPRPC_MEMREF_NUM_CRYS_RSA_PRIM_Encrypt 0
+#if SEPRPC_MEMREF_NUM_CRYS_RSA_PRIM_Encrypt > SEP_RPC_MAX_MEMREF_PER_FUNC
+#error SEPRPC_MEMREF_NUM_CRYS_RSA_PRIM_Encrypt is more than SEP_RPC_MAX_MEMREF_PER_FUNC
+#endif
+
+typedef struct SepRpc_CRYS_RSA_PRIM_EncryptParams {
+ uint32_t num_of_memrefs; /* Number of elements in the memRef array */
+ /* Input */
+ CRYS_RSAUserPubKey_t __UserPubKey_ptr;
+ DxUint8_t __UserPubKey_ptr_null_flag;
+ DxUint32_t PrimeData_ptr_size;
+ DxUint8_t Data_ptr[4*CRYS_RSA_MAXIMUM_MOD_BUFFER_SIZE_IN_WORDS];
+ DxUint8_t Data_ptr_null_flag;
+ /*le16*/DxUint16_t DataSize;
+ /* Output */
+ DxUint8_t Output_ptr[4*CRYS_RSA_MAXIMUM_MOD_BUFFER_SIZE_IN_WORDS];
+ DxUint8_t Output_ptr_null_flag;
+ CRYSError_t _funcRetCode;
+} SepRpc_CRYS_RSA_PRIM_EncryptParams_s;
+
+
+
+/************ CRYS_RSA_PRIM_Decrypt ***************/
+#define SEPRPC_FUNC_ID_CRYS_RSA_PRIM_Decrypt 2
+/*
+CRYSError_t CRYS_RSA_PRIM_Decrypt(
+ CRYS_RSAUserPrivKey_t *UserPrivKey_ptr,
+ CRYS_RSAPrimeData_t *PrimeData_ptr,
+ DxUint8_t Data_ptr[],
+ DxUint16_t DataSize,
+ DxUint8_t Output_ptr[])
+*/
+
+#define SEPRPC_MEMREF_NUM_CRYS_RSA_PRIM_Decrypt 0
+#if SEPRPC_MEMREF_NUM_CRYS_RSA_PRIM_Decrypt > SEP_RPC_MAX_MEMREF_PER_FUNC
+#error SEPRPC_MEMREF_NUM_CRYS_RSA_PRIM_Decrypt is more than SEP_RPC_MAX_MEMREF_PER_FUNC
+#endif
+
+typedef struct SepRpc_CRYS_RSA_PRIM_DecryptParams {
+ uint32_t num_of_memrefs; /* Number of elements in the memRef array */
+ /* Input */
+ CRYS_RSAUserPrivKey_t __UserPrivKey_ptr;
+ DxUint8_t __UserPrivKey_ptr_null_flag;
+ DxUint32_t PrimeData_ptr_size;
+ DxUint8_t Data_ptr[CRYS_RSA_MAXIMUM_MOD_BUFFER_SIZE_IN_WORDS*4];
+ DxUint8_t Data_ptr_null_flag;
+ /*le16*/DxUint16_t DataSize;
+ /* Output */
+ DxUint8_t Output_ptr[CRYS_RSA_MAXIMUM_MOD_BUFFER_SIZE_IN_WORDS*4];
+ DxUint8_t Output_ptr_null_flag;
+ CRYSError_t _funcRetCode;
+} SepRpc_CRYS_RSA_PRIM_DecryptParams_s;
+
+
+
+/************ _DX_RSA_SCHEMES_Encrypt ***************/
+#define SEPRPC_FUNC_ID__DX_RSA_SCHEMES_Encrypt 3
+/*
+CRYSError_t _DX_RSA_SCHEMES_Encrypt(
+ CRYS_RSAUserPubKey_t *UserPubKey_ptr,
+ CRYS_RSAPrimeData_t *PrimeData_ptr,
+ CRYS_RSA_HASH_OpMode_t hashFunc,
+ DxUint8_t L[],
+ DxUint16_t Llen,
+ CRYS_PKCS1_MGF_t MGF,
+ DxUint8_t DataIn_ptr[],
+ DxUint16_t DataInSize,
+ DxUint8_t Output_ptr[],
+ CRYS_PKCS1_version PKCS1_ver)
+*/
+
+#define SEPRPC_MEMREF_NUM__DX_RSA_SCHEMES_Encrypt 0
+#if SEPRPC_MEMREF_NUM__DX_RSA_SCHEMES_Encrypt > SEP_RPC_MAX_MEMREF_PER_FUNC
+#error SEPRPC_MEMREF_NUM__DX_RSA_SCHEMES_Encrypt is more than SEP_RPC_MAX_MEMREF_PER_FUNC
+#endif
+
+typedef struct SepRpc__DX_RSA_SCHEMES_EncryptParams {
+ uint32_t num_of_memrefs; /* Number of elements in the memRef array */
+ /* Input */
+ CRYS_RSAUserPubKey_t __UserPubKey_ptr;
+ DxUint8_t __UserPubKey_ptr_null_flag;
+ DxUint32_t PrimeData_ptr_size;
+ /*le32*/CRYS_RSA_HASH_OpMode_t hashFunc;
+ DxUint8_t L[2048];
+ DxUint8_t L_null_flag;
+ /*le16*/DxUint16_t Llen;
+ /*le32*/CRYS_PKCS1_MGF_t MGF;
+ DxUint8_t DataIn_ptr[CRYS_RSA_MAXIMUM_MOD_BUFFER_SIZE_IN_WORDS*4];
+ DxUint8_t DataIn_ptr_null_flag;
+ /*le16*/DxUint16_t DataInSize;
+ /*le32*/CRYS_PKCS1_version PKCS1_ver;
+ /* Output */
+ DxUint8_t Output_ptr[4*CRYS_RSA_MAXIMUM_MOD_BUFFER_SIZE_IN_WORDS];
+ DxUint8_t Output_ptr_null_flag;
+ CRYSError_t _funcRetCode;
+} SepRpc__DX_RSA_SCHEMES_EncryptParams_s;
+
+
+
+/************ _DX_RSA_SCHEMES_Decrypt ***************/
+#define SEPRPC_FUNC_ID__DX_RSA_SCHEMES_Decrypt 4
+/*
+CRYSError_t _DX_RSA_SCHEMES_Decrypt(
+ CRYS_RSAUserPrivKey_t *UserPrivKey_ptr,
+ CRYS_RSAPrimeData_t *PrimeData_ptr,
+ CRYS_RSA_HASH_OpMode_t hashFunc,
+ DxUint8_t L[],
+ DxUint16_t Llen,
+ CRYS_PKCS1_MGF_t MGF,
+ DxUint8_t DataIn_ptr[],
+ DxUint16_t DataInSize,
+ DxUint8_t Output_ptr[],
+ DxUint16_t *OutputSize_ptr,
+ CRYS_PKCS1_version PKCS1_ver)
+*/
+
+#define SEPRPC_MEMREF_NUM__DX_RSA_SCHEMES_Decrypt 0
+#if SEPRPC_MEMREF_NUM__DX_RSA_SCHEMES_Decrypt > SEP_RPC_MAX_MEMREF_PER_FUNC
+#error SEPRPC_MEMREF_NUM__DX_RSA_SCHEMES_Decrypt is more than SEP_RPC_MAX_MEMREF_PER_FUNC
+#endif
+
+typedef struct SepRpc__DX_RSA_SCHEMES_DecryptParams {
+ uint32_t num_of_memrefs; /* Number of elements in the memRef array */
+ /* Input */
+ CRYS_RSAUserPrivKey_t __UserPrivKey_ptr;
+ DxUint8_t __UserPrivKey_ptr_null_flag;
+ DxUint32_t PrimeData_ptr_size;
+ /*le32*/CRYS_RSA_HASH_OpMode_t hashFunc;
+ DxUint8_t L[2048];
+ DxUint8_t L_null_flag;
+ /*le16*/DxUint16_t Llen;
+ /*le32*/CRYS_PKCS1_MGF_t MGF;
+ DxUint8_t DataIn_ptr[4*CRYS_RSA_MAXIMUM_MOD_BUFFER_SIZE_IN_WORDS];
+ DxUint8_t DataIn_ptr_null_flag;
+ /*le16*/DxUint16_t DataInSize;
+ /*le32*/CRYS_PKCS1_version PKCS1_ver;
+ /* Input/Output */
+ /*le16*/DxUint16_t __OutputSize_ptr;
+ DxUint8_t __OutputSize_ptr_null_flag;
+ /* Output */
+ DxUint8_t Output_ptr[CRYS_RSA_MAXIMUM_MOD_BUFFER_SIZE_IN_WORDS*4];
+ DxUint8_t Output_ptr_null_flag;
+ CRYSError_t _funcRetCode;
+} SepRpc__DX_RSA_SCHEMES_DecryptParams_s;
+
+
+
+/************ _DX_RSA_SignInit ***************/
+#define SEPRPC_FUNC_ID__DX_RSA_SignInit 5
+/*
+CRYSError_t _DX_RSA_SignInit(
+ CRYS_RSAPrivUserContext_t *UserContext_ptr,
+ CRYS_RSAUserPrivKey_t *UserPrivKey_ptr,
+ CRYS_RSA_HASH_OpMode_t hashFunc,
+ CRYS_PKCS1_MGF_t MGF,
+ DxUint16_t SaltLen,
+ CRYS_PKCS1_version PKCS1_ver)
+*/
+
+#define SEPRPC_MEMREF_NUM__DX_RSA_SignInit 0
+#if SEPRPC_MEMREF_NUM__DX_RSA_SignInit > SEP_RPC_MAX_MEMREF_PER_FUNC
+#error SEPRPC_MEMREF_NUM__DX_RSA_SignInit is more than SEP_RPC_MAX_MEMREF_PER_FUNC
+#endif
+
+typedef struct SepRpc__DX_RSA_SignInitParams {
+ uint32_t num_of_memrefs; /* Number of elements in the memRef array */
+ /* Input */
+ CRYS_RSAUserPrivKey_t __UserPrivKey_ptr;
+ DxUint8_t __UserPrivKey_ptr_null_flag;
+ /*le32*/CRYS_RSA_HASH_OpMode_t hashFunc;
+ /*le32*/CRYS_PKCS1_MGF_t MGF;
+ /*le16*/DxUint16_t SaltLen;
+ /*le32*/CRYS_PKCS1_version PKCS1_ver;
+ /* Input/Output */
+ CRYS_RSAPrivUserContext_t __UserContext_ptr;
+ DxUint8_t __UserContext_ptr_null_flag;
+ CRYSError_t _funcRetCode;
+} SepRpc__DX_RSA_SignInitParams_s;
+
+
+
+/************ _DX_RSA_SignFinish ***************/
+#define SEPRPC_FUNC_ID__DX_RSA_SignFinish 6
+/*
+CRYSError_t _DX_RSA_SignFinish(
+ CRYS_RSAPrivUserContext_t *UserContext_ptr,
+ DxUint8_t Output_ptr[],
+ DxUint16_t *OutputSize_ptr)
+*/
+
+#define SEPRPC_MEMREF_NUM__DX_RSA_SignFinish 0
+#if SEPRPC_MEMREF_NUM__DX_RSA_SignFinish > SEP_RPC_MAX_MEMREF_PER_FUNC
+#error SEPRPC_MEMREF_NUM__DX_RSA_SignFinish is more than SEP_RPC_MAX_MEMREF_PER_FUNC
+#endif
+
+typedef struct SepRpc__DX_RSA_SignFinishParams {
+ uint32_t num_of_memrefs; /* Number of elements in the memRef array */
+ /* Input/Output */
+ CRYS_RSAPrivUserContext_t __UserContext_ptr;
+ DxUint8_t __UserContext_ptr_null_flag;
+ /*le16*/DxUint16_t __OutputSize_ptr;
+ DxUint8_t __OutputSize_ptr_null_flag;
+ /* Output */
+ DxUint8_t Output_ptr[CRYS_RSA_MAXIMUM_MOD_BUFFER_SIZE_IN_WORDS*4];
+ DxUint8_t Output_ptr_null_flag;
+ CRYSError_t _funcRetCode;
+} SepRpc__DX_RSA_SignFinishParams_s;
+
+
+
+/************ _DX_RSA_SignUpdate ***************/
+#define SEPRPC_FUNC_ID__DX_RSA_SignUpdate 7
+/*
+CRYSError_t _DX_RSA_SignUpdate(
+ CRYS_RSAPrivUserContext_t *UserContext_ptr,
+ DxUint8_t *DataIn_ptr,
+ DxUint32_t DataInSize)
+*/
+
+#define SEPRPC_MEMREF_NUM__DX_RSA_SignUpdate 1
+#if SEPRPC_MEMREF_NUM__DX_RSA_SignUpdate > SEP_RPC_MAX_MEMREF_PER_FUNC
+#error SEPRPC_MEMREF_NUM__DX_RSA_SignUpdate is more than SEP_RPC_MAX_MEMREF_PER_FUNC
+#endif
+#define SEPRPC_MEMREF_IDX_DataIn_ptr 0
+
+typedef struct SepRpc__DX_RSA_SignUpdateParams {
+ uint32_t num_of_memrefs; /* Number of elements in the memRef array */
+ struct seprpc_memref memref[SEPRPC_MEMREF_NUM__DX_RSA_SignUpdate];
+ /* Input */
+ /*le32*/DxUint32_t DataInSize;
+ /* Input/Output */
+ CRYS_RSAPrivUserContext_t __UserContext_ptr;
+ DxUint8_t __UserContext_ptr_null_flag;
+ CRYSError_t _funcRetCode;
+} SepRpc__DX_RSA_SignUpdateParams_s;
+
+
+
+/************ _DX_RSA_Sign ***************/
+#define SEPRPC_FUNC_ID__DX_RSA_Sign 8
+/*
+CRYSError_t _DX_RSA_Sign(
+ CRYS_RSAPrivUserContext_t *UserContext_ptr,
+ CRYS_RSAUserPrivKey_t *UserPrivKey_ptr,
+ CRYS_RSA_HASH_OpMode_t hashFunc,
+ CRYS_PKCS1_MGF_t MGF,
+ DxUint16_t SaltLen,
+ DxUint8_t *DataIn_ptr,
+ DxUint32_t DataInSize,
+ DxUint8_t Output_ptr[],
+ DxUint16_t *OutputSize_ptr,
+ CRYS_PKCS1_version PKCS1_ver)
+*/
+
+#define SEPRPC_MEMREF_NUM__DX_RSA_Sign 1
+#if SEPRPC_MEMREF_NUM__DX_RSA_Sign > SEP_RPC_MAX_MEMREF_PER_FUNC
+#error SEPRPC_MEMREF_NUM__DX_RSA_Sign is more than SEP_RPC_MAX_MEMREF_PER_FUNC
+#endif
+#define SEPRPC_MEMREF_IDX_DataIn_ptr 0
+
+typedef struct SepRpc__DX_RSA_SignParams {
+ uint32_t num_of_memrefs; /* Number of elements in the memRef array */
+ struct seprpc_memref memref[SEPRPC_MEMREF_NUM__DX_RSA_Sign];
+ /* Input */
+ DxUint32_t UserContext_ptr_size;
+ CRYS_RSAUserPrivKey_t __UserPrivKey_ptr;
+ DxUint8_t __UserPrivKey_ptr_null_flag;
+ /*le32*/CRYS_RSA_HASH_OpMode_t hashFunc;
+ /*le32*/CRYS_PKCS1_MGF_t MGF;
+ /*le16*/DxUint16_t SaltLen;
+ /*le32*/DxUint32_t DataInSize;
+ /*le32*/CRYS_PKCS1_version PKCS1_ver;
+ /* Input/Output */
+ /*le16*/DxUint16_t __OutputSize_ptr;
+ DxUint8_t __OutputSize_ptr_null_flag;
+ /* Output */
+ DxUint8_t Output_ptr[CRYS_RSA_MAXIMUM_MOD_BUFFER_SIZE_IN_WORDS*4];
+ DxUint8_t Output_ptr_null_flag;
+ CRYSError_t _funcRetCode;
+} SepRpc__DX_RSA_SignParams_s;
+
+
+
+/************ _DX_RSA_VerifyInit ***************/
+#define SEPRPC_FUNC_ID__DX_RSA_VerifyInit 9
+/*
+CRYSError_t _DX_RSA_VerifyInit(
+ CRYS_RSAPubUserContext_t *UserContext_ptr,
+ CRYS_RSAUserPubKey_t *UserPubKey_ptr,
+ CRYS_RSA_HASH_OpMode_t hashFunc,
+ CRYS_PKCS1_MGF_t MGF,
+ DxUint16_t SaltLen,
+ CRYS_PKCS1_version PKCS1_ver)
+*/
+
+#define SEPRPC_MEMREF_NUM__DX_RSA_VerifyInit 0
+#if SEPRPC_MEMREF_NUM__DX_RSA_VerifyInit > SEP_RPC_MAX_MEMREF_PER_FUNC
+#error SEPRPC_MEMREF_NUM__DX_RSA_VerifyInit is more than SEP_RPC_MAX_MEMREF_PER_FUNC
+#endif
+
+typedef struct SepRpc__DX_RSA_VerifyInitParams {
+ uint32_t num_of_memrefs; /* Number of elements in the memRef array */
+ /* Input */
+ CRYS_RSAUserPubKey_t __UserPubKey_ptr;
+ DxUint8_t __UserPubKey_ptr_null_flag;
+ /*le32*/CRYS_RSA_HASH_OpMode_t hashFunc;
+ /*le32*/CRYS_PKCS1_MGF_t MGF;
+ /*le16*/DxUint16_t SaltLen;
+ /*le32*/CRYS_PKCS1_version PKCS1_ver;
+ /* Output */
+ CRYS_RSAPubUserContext_t __UserContext_ptr;
+ DxUint8_t __UserContext_ptr_null_flag;
+ CRYSError_t _funcRetCode;
+} SepRpc__DX_RSA_VerifyInitParams_s;
+
+
+
+/************ _DX_RSA_VerifyUpdate ***************/
+#define SEPRPC_FUNC_ID__DX_RSA_VerifyUpdate 10
+/*
+CRYSError_t _DX_RSA_VerifyUpdate(
+ CRYS_RSAPubUserContext_t *UserContext_ptr,
+ DxUint8_t *DataIn_ptr,
+ DxUint32_t DataInSize)
+*/
+
+#define SEPRPC_MEMREF_NUM__DX_RSA_VerifyUpdate 1
+#if SEPRPC_MEMREF_NUM__DX_RSA_VerifyUpdate > SEP_RPC_MAX_MEMREF_PER_FUNC
+#error SEPRPC_MEMREF_NUM__DX_RSA_VerifyUpdate is more than SEP_RPC_MAX_MEMREF_PER_FUNC
+#endif
+#define SEPRPC_MEMREF_IDX_DataIn_ptr 0
+
+typedef struct SepRpc__DX_RSA_VerifyUpdateParams {
+ uint32_t num_of_memrefs; /* Number of elements in the memRef array */
+ struct seprpc_memref memref[SEPRPC_MEMREF_NUM__DX_RSA_VerifyUpdate];
+ /* Input */
+ /*le32*/DxUint32_t DataInSize;
+ /* Input/Output */
+ CRYS_RSAPubUserContext_t __UserContext_ptr;
+ DxUint8_t __UserContext_ptr_null_flag;
+ CRYSError_t _funcRetCode;
+} SepRpc__DX_RSA_VerifyUpdateParams_s;
+
+
+
+/************ _DX_RSA_VerifyFinish ***************/
+#define SEPRPC_FUNC_ID__DX_RSA_VerifyFinish 11
+/*
+CRYSError_t _DX_RSA_VerifyFinish(
+ CRYS_RSAPubUserContext_t *UserContext_ptr,
+ DxUint8_t Sig_ptr[])
+*/
+
+#define SEPRPC_MEMREF_NUM__DX_RSA_VerifyFinish 0
+#if SEPRPC_MEMREF_NUM__DX_RSA_VerifyFinish > SEP_RPC_MAX_MEMREF_PER_FUNC
+#error SEPRPC_MEMREF_NUM__DX_RSA_VerifyFinish is more than SEP_RPC_MAX_MEMREF_PER_FUNC
+#endif
+
+typedef struct SepRpc__DX_RSA_VerifyFinishParams {
+ uint32_t num_of_memrefs; /* Number of elements in the memRef array */
+ /* Input */
+ DxUint8_t Sig_ptr[CRYS_RSA_MAXIMUM_MOD_BUFFER_SIZE_IN_WORDS*4];
+ DxUint8_t Sig_ptr_null_flag;
+ /* Input/Output */
+ CRYS_RSAPubUserContext_t __UserContext_ptr;
+ DxUint8_t __UserContext_ptr_null_flag;
+ CRYSError_t _funcRetCode;
+} SepRpc__DX_RSA_VerifyFinishParams_s;
+
+
+
+/************ _DX_RSA_Verify ***************/
+#define SEPRPC_FUNC_ID__DX_RSA_Verify 12
+/*
+CRYSError_t _DX_RSA_Verify(
+ CRYS_RSAPubUserContext_t *UserContext_ptr,
+ CRYS_RSAUserPubKey_t *UserPubKey_ptr,
+ CRYS_RSA_HASH_OpMode_t hashFunc,
+ CRYS_PKCS1_MGF_t MGF,
+ DxUint16_t SaltLen,
+ DxUint8_t *DataIn_ptr,
+ DxUint32_t DataInSize,
+ DxUint8_t Sig_ptr[],
+ CRYS_PKCS1_version PKCS1_ver)
+*/
+
+#define SEPRPC_MEMREF_NUM__DX_RSA_Verify 1
+#if SEPRPC_MEMREF_NUM__DX_RSA_Verify > SEP_RPC_MAX_MEMREF_PER_FUNC
+#error SEPRPC_MEMREF_NUM__DX_RSA_Verify is more than SEP_RPC_MAX_MEMREF_PER_FUNC
+#endif
+#define SEPRPC_MEMREF_IDX_DataIn_ptr 0
+
+typedef struct SepRpc__DX_RSA_VerifyParams {
+ uint32_t num_of_memrefs; /* Number of elements in the memRef array */
+ struct seprpc_memref memref[SEPRPC_MEMREF_NUM__DX_RSA_Verify];
+ /* Input */
+ DxUint32_t UserContext_ptr_size;
+ CRYS_RSAUserPubKey_t __UserPubKey_ptr;
+ DxUint8_t __UserPubKey_ptr_null_flag;
+ /*le32*/CRYS_RSA_HASH_OpMode_t hashFunc;
+ /*le32*/CRYS_PKCS1_MGF_t MGF;
+ /*le16*/DxUint16_t SaltLen;
+ /*le32*/DxUint32_t DataInSize;
+ DxUint8_t Sig_ptr[CRYS_RSA_MAXIMUM_MOD_BUFFER_SIZE_IN_WORDS*4];
+ DxUint8_t Sig_ptr_null_flag;
+ /*le32*/CRYS_PKCS1_version PKCS1_ver;
+ CRYSError_t _funcRetCode;
+} SepRpc__DX_RSA_VerifyParams_s;
+
+
+
+/************ CRYS_RSA_Build_PubKey ***************/
+#define SEPRPC_FUNC_ID_CRYS_RSA_Build_PubKey 13
+/*
+CRYSError_t CRYS_RSA_Build_PubKey(
+ CRYS_RSAUserPubKey_t *UserPubKey_ptr,
+ DxUint8_t Exponent_ptr[],
+ DxUint16_t ExponentSize,
+ DxUint8_t Modulus_ptr[],
+ DxUint16_t ModulusSize)
+*/
+
+#define SEPRPC_MEMREF_NUM_CRYS_RSA_Build_PubKey 0
+#if SEPRPC_MEMREF_NUM_CRYS_RSA_Build_PubKey > SEP_RPC_MAX_MEMREF_PER_FUNC
+#error SEPRPC_MEMREF_NUM_CRYS_RSA_Build_PubKey is more than SEP_RPC_MAX_MEMREF_PER_FUNC
+#endif
+
+typedef struct SepRpc_CRYS_RSA_Build_PubKeyParams {
+ uint32_t num_of_memrefs; /* Number of elements in the memRef array */
+ /* Input */
+ DxUint8_t Exponent_ptr[CRYS_RSA_MAXIMUM_MOD_BUFFER_SIZE_IN_WORDS*4];
+ DxUint8_t Exponent_ptr_null_flag;
+ /*le16*/DxUint16_t ExponentSize;
+ DxUint8_t Modulus_ptr[CRYS_RSA_MAXIMUM_MOD_BUFFER_SIZE_IN_WORDS*4];
+ DxUint8_t Modulus_ptr_null_flag;
+ /*le16*/DxUint16_t ModulusSize;
+ /* Output */
+ CRYS_RSAUserPubKey_t __UserPubKey_ptr;
+ DxUint8_t __UserPubKey_ptr_null_flag;
+ CRYSError_t _funcRetCode;
+} SepRpc_CRYS_RSA_Build_PubKeyParams_s;
+
+
+
+/************ CRYS_RSA_Build_PrivKey ***************/
+#define SEPRPC_FUNC_ID_CRYS_RSA_Build_PrivKey 14
+/*
+CRYSError_t CRYS_RSA_Build_PrivKey(
+ CRYS_RSAUserPrivKey_t *UserPrivKey_ptr,
+ DxUint8_t PrivExponent_ptr[],
+ DxUint16_t PrivExponentSize,
+ DxUint8_t PubExponent_ptr[],
+ DxUint16_t PubExponentSize,
+ DxUint8_t Modulus_ptr[],
+ DxUint16_t ModulusSize)
+*/
+
+#define SEPRPC_MEMREF_NUM_CRYS_RSA_Build_PrivKey 0
+#if SEPRPC_MEMREF_NUM_CRYS_RSA_Build_PrivKey > SEP_RPC_MAX_MEMREF_PER_FUNC
+#error SEPRPC_MEMREF_NUM_CRYS_RSA_Build_PrivKey is more than SEP_RPC_MAX_MEMREF_PER_FUNC
+#endif
+
+typedef struct SepRpc_CRYS_RSA_Build_PrivKeyParams {
+ uint32_t num_of_memrefs; /* Number of elements in the memRef array */
+ /* Input */
+ DxUint8_t PrivExponent_ptr[CRYS_RSA_MAXIMUM_MOD_BUFFER_SIZE_IN_WORDS*4];
+ DxUint8_t PrivExponent_ptr_null_flag;
+ /*le16*/DxUint16_t PrivExponentSize;
+ DxUint8_t PubExponent_ptr[CRYS_RSA_MAXIMUM_MOD_BUFFER_SIZE_IN_WORDS*4];
+ DxUint8_t PubExponent_ptr_null_flag;
+ /*le16*/DxUint16_t PubExponentSize;
+ DxUint8_t Modulus_ptr[CRYS_RSA_MAXIMUM_MOD_BUFFER_SIZE_IN_WORDS*4];
+ DxUint8_t Modulus_ptr_null_flag;
+ /*le16*/DxUint16_t ModulusSize;
+ /* Output */
+ CRYS_RSAUserPrivKey_t __UserPrivKey_ptr;
+ DxUint8_t __UserPrivKey_ptr_null_flag;
+ CRYSError_t _funcRetCode;
+} SepRpc_CRYS_RSA_Build_PrivKeyParams_s;
+
+
+
+/************ CRYS_RSA_Build_PrivKeyCRT ***************/
+#define SEPRPC_FUNC_ID_CRYS_RSA_Build_PrivKeyCRT 15
+/*
+CRYSError_t CRYS_RSA_Build_PrivKeyCRT(
+ CRYS_RSAUserPrivKey_t *UserPrivKey_ptr,
+ DxUint8_t P_ptr[],
+ DxUint16_t PSize,
+ DxUint8_t Q_ptr[],
+ DxUint16_t QSize,
+ DxUint8_t dP_ptr[],
+ DxUint16_t dPSize,
+ DxUint8_t dQ_ptr[],
+ DxUint16_t dQSize,
+ DxUint8_t qInv_ptr[],
+ DxUint16_t qInvSize)
+*/
+
+#define SEPRPC_MEMREF_NUM_CRYS_RSA_Build_PrivKeyCRT 0
+#if SEPRPC_MEMREF_NUM_CRYS_RSA_Build_PrivKeyCRT > SEP_RPC_MAX_MEMREF_PER_FUNC
+#error SEPRPC_MEMREF_NUM_CRYS_RSA_Build_PrivKeyCRT is more than SEP_RPC_MAX_MEMREF_PER_FUNC
+#endif
+
+typedef struct SepRpc_CRYS_RSA_Build_PrivKeyCRTParams {
+ uint32_t num_of_memrefs; /* Number of elements in the memRef array */
+ /* Input */
+ DxUint8_t P_ptr[CRYS_RSA_MAXIMUM_MOD_BUFFER_SIZE_IN_WORDS*4];
+ DxUint8_t P_ptr_null_flag;
+ /*le16*/DxUint16_t PSize;
+ DxUint8_t Q_ptr[CRYS_RSA_MAXIMUM_MOD_BUFFER_SIZE_IN_WORDS*4];
+ DxUint8_t Q_ptr_null_flag;
+ /*le16*/DxUint16_t QSize;
+ DxUint8_t dP_ptr[CRYS_RSA_MAXIMUM_MOD_BUFFER_SIZE_IN_WORDS*4];
+ DxUint8_t dP_ptr_null_flag;
+ /*le16*/DxUint16_t dPSize;
+ DxUint8_t dQ_ptr[CRYS_RSA_MAXIMUM_MOD_BUFFER_SIZE_IN_WORDS*4];
+ DxUint8_t dQ_ptr_null_flag;
+ /*le16*/DxUint16_t dQSize;
+ DxUint8_t qInv_ptr[CRYS_RSA_MAXIMUM_MOD_BUFFER_SIZE_IN_WORDS*4];
+ DxUint8_t qInv_ptr_null_flag;
+ /*le16*/DxUint16_t qInvSize;
+ /* Output */
+ CRYS_RSAUserPrivKey_t __UserPrivKey_ptr;
+ DxUint8_t __UserPrivKey_ptr_null_flag;
+ CRYSError_t _funcRetCode;
+} SepRpc_CRYS_RSA_Build_PrivKeyCRTParams_s;
+
+
+
+/************ CRYS_RSA_KG_GenerateKeyPair ***************/
+#define SEPRPC_FUNC_ID_CRYS_RSA_KG_GenerateKeyPair 16
+/*
+CRYSError_t CRYS_RSA_KG_GenerateKeyPair(
+ DxUint8_t pubExp_ptr[],
+ DxUint16_t pubExpSizeInBytes,
+ DxUint32_t keySize,
+ CRYS_RSAUserPrivKey_t *UserPrivKey_ptr,
+ CRYS_RSAUserPubKey_t *userPubKey_ptr,
+ CRYS_RSAKGData_t *keyGenData_ptr)
+*/
+
+#define SEPRPC_MEMREF_NUM_CRYS_RSA_KG_GenerateKeyPair 0
+#if SEPRPC_MEMREF_NUM_CRYS_RSA_KG_GenerateKeyPair > SEP_RPC_MAX_MEMREF_PER_FUNC
+#error SEPRPC_MEMREF_NUM_CRYS_RSA_KG_GenerateKeyPair is more than SEP_RPC_MAX_MEMREF_PER_FUNC
+#endif
+
+typedef struct SepRpc_CRYS_RSA_KG_GenerateKeyPairParams {
+ uint32_t num_of_memrefs; /* Number of elements in the memRef array */
+ /* Input */
+ DxUint8_t pubExp_ptr[CRYS_RSA_MAXIMUM_MOD_BUFFER_SIZE_IN_WORDS*4];
+ DxUint8_t pubExp_ptr_null_flag;
+ /*le16*/DxUint16_t pubExpSizeInBytes;
+ /*le32*/DxUint32_t keySize;
+ DxUint32_t keyGenData_ptr_size;
+ /* Output */
+ CRYS_RSAUserPrivKey_t __UserPrivKey_ptr;
+ DxUint8_t __UserPrivKey_ptr_null_flag;
+ CRYS_RSAUserPubKey_t __userPubKey_ptr;
+ DxUint8_t __userPubKey_ptr_null_flag;
+ CRYSError_t _funcRetCode;
+} SepRpc_CRYS_RSA_KG_GenerateKeyPairParams_s;
+
+
+
+/************ CRYS_RSA_KG_GenerateKeyPairCRT ***************/
+#define SEPRPC_FUNC_ID_CRYS_RSA_KG_GenerateKeyPairCRT 17
+/*
+CRYSError_t CRYS_RSA_KG_GenerateKeyPairCRT(
+ DxUint8_t pubExp_ptr[],
+ DxUint16_t pubExpSizeInBytes,
+ DxUint32_t keySize,
+ CRYS_RSAUserPrivKey_t *UserPrivKey_ptr,
+ CRYS_RSAUserPubKey_t *userPubKey_ptr,
+ CRYS_RSAKGData_t *keyGenData_ptr)
+*/
+
+#define SEPRPC_MEMREF_NUM_CRYS_RSA_KG_GenerateKeyPairCRT 0
+#if SEPRPC_MEMREF_NUM_CRYS_RSA_KG_GenerateKeyPairCRT > SEP_RPC_MAX_MEMREF_PER_FUNC
+#error SEPRPC_MEMREF_NUM_CRYS_RSA_KG_GenerateKeyPairCRT is more than SEP_RPC_MAX_MEMREF_PER_FUNC
+#endif
+
+typedef struct SepRpc_CRYS_RSA_KG_GenerateKeyPairCRTParams {
+ uint32_t num_of_memrefs; /* Number of elements in the memRef array */
+ /* Input */
+ DxUint8_t pubExp_ptr[CRYS_RSA_MAXIMUM_MOD_BUFFER_SIZE_IN_WORDS*4*2+1];
+ DxUint8_t pubExp_ptr_null_flag;
+ /*le16*/DxUint16_t pubExpSizeInBytes;
+ /*le32*/DxUint32_t keySize;
+ DxUint32_t keyGenData_ptr_size;
+ /* Output */
+ CRYS_RSAUserPrivKey_t __UserPrivKey_ptr;
+ DxUint8_t __UserPrivKey_ptr_null_flag;
+ CRYS_RSAUserPubKey_t __userPubKey_ptr;
+ DxUint8_t __userPubKey_ptr_null_flag;
+ CRYSError_t _funcRetCode;
+} SepRpc_CRYS_RSA_KG_GenerateKeyPairCRTParams_s;
+
+
+
+/************ CRYS_RSA_Get_PubKey ***************/
+#define SEPRPC_FUNC_ID_CRYS_RSA_Get_PubKey 18
+/*
+CRYSError_t CRYS_RSA_Get_PubKey(
+ CRYS_RSAUserPubKey_t *UserPubKey_ptr,
+ DxUint8_t Exponent_ptr[],
+ DxUint16_t *ExponentSize_ptr,
+ DxUint8_t Modulus_ptr[],
+ DxUint16_t *ModulusSize_ptr)
+*/
+
+#define SEPRPC_MEMREF_NUM_CRYS_RSA_Get_PubKey 0
+#if SEPRPC_MEMREF_NUM_CRYS_RSA_Get_PubKey > SEP_RPC_MAX_MEMREF_PER_FUNC
+#error SEPRPC_MEMREF_NUM_CRYS_RSA_Get_PubKey is more than SEP_RPC_MAX_MEMREF_PER_FUNC
+#endif
+
+typedef struct SepRpc_CRYS_RSA_Get_PubKeyParams {
+ uint32_t num_of_memrefs; /* Number of elements in the memRef array */
+ /* Input */
+ CRYS_RSAUserPubKey_t __UserPubKey_ptr;
+ DxUint8_t __UserPubKey_ptr_null_flag;
+ /* Input/Output */
+ /*le16*/DxUint16_t __ExponentSize_ptr;
+ DxUint8_t __ExponentSize_ptr_null_flag;
+ /*le16*/DxUint16_t __ModulusSize_ptr;
+ DxUint8_t __ModulusSize_ptr_null_flag;
+ /* Output */
+ DxUint8_t Exponent_ptr[ CRYS_RSA_MAXIMUM_MOD_BUFFER_SIZE_IN_WORDS*4-1];
+ DxUint8_t Exponent_ptr_null_flag;
+ DxUint8_t Modulus_ptr[ CRYS_RSA_MAXIMUM_MOD_BUFFER_SIZE_IN_WORDS*4-1];
+ DxUint8_t Modulus_ptr_null_flag;
+ CRYSError_t _funcRetCode;
+} SepRpc_CRYS_RSA_Get_PubKeyParams_s;
+
+
+
+/************ CRYS_RSA_Get_ModSizeFromPubKey ***************/
+#define SEPRPC_FUNC_ID_CRYS_RSA_Get_ModSizeFromPubKey 19
+/*
+CRYSError_t CRYS_RSA_Get_ModSizeFromPubKey(
+ CRYS_RSAUserPubKey_t *userPubKey_ptr,
+ DxUint16_t *ModulusSize_ptr)
+*/
+
+#define SEPRPC_MEMREF_NUM_CRYS_RSA_Get_ModSizeFromPubKey 0
+#if SEPRPC_MEMREF_NUM_CRYS_RSA_Get_ModSizeFromPubKey > SEP_RPC_MAX_MEMREF_PER_FUNC
+#error SEPRPC_MEMREF_NUM_CRYS_RSA_Get_ModSizeFromPubKey is more than SEP_RPC_MAX_MEMREF_PER_FUNC
+#endif
+
+typedef struct SepRpc_CRYS_RSA_Get_ModSizeFromPubKeyParams {
+ uint32_t num_of_memrefs; /* Number of elements in the memRef array */
+ /* Input */
+ CRYS_RSAUserPubKey_t __userPubKey_ptr;
+ DxUint8_t __userPubKey_ptr_null_flag;
+ /* Output */
+ /*le16*/DxUint16_t __ModulusSize_ptr;
+ DxUint8_t __ModulusSize_ptr_null_flag;
+ CRYSError_t _funcRetCode;
+} SepRpc_CRYS_RSA_Get_ModSizeFromPubKeyParams_s;
+
+
+
+/************ CRYS_RSA_PRIM_DecryptExactSize ***************/
+#define SEPRPC_FUNC_ID_CRYS_RSA_PRIM_DecryptExactSize 20
+/*
+CRYSError_t CRYS_RSA_PRIM_DecryptExactSize(
+ CRYS_RSAUserPrivKey_t *UserPrivKey_ptr,
+ CRYS_RSAPrimeData_t *PrimeData_ptr,
+ DxUint8_t DataIn_ptr[],
+ DxUint8_t Output_ptr[],
+ DxUint16_t DataOutSize)
+*/
+
+#define SEPRPC_MEMREF_NUM_CRYS_RSA_PRIM_DecryptExactSize 0
+#if SEPRPC_MEMREF_NUM_CRYS_RSA_PRIM_DecryptExactSize > SEP_RPC_MAX_MEMREF_PER_FUNC
+#error SEPRPC_MEMREF_NUM_CRYS_RSA_PRIM_DecryptExactSize is more than SEP_RPC_MAX_MEMREF_PER_FUNC
+#endif
+
+typedef struct SepRpc_CRYS_RSA_PRIM_DecryptExactSizeParams {
+ uint32_t num_of_memrefs; /* Number of elements in the memRef array */
+ /* Input */
+ CRYS_RSAUserPrivKey_t __UserPrivKey_ptr;
+ DxUint8_t __UserPrivKey_ptr_null_flag;
+ DxUint32_t PrimeData_ptr_size;
+ DxUint8_t DataIn_ptr[CRYS_RSA_MAXIMUM_MOD_BUFFER_SIZE_IN_WORDS*4];
+ DxUint8_t DataIn_ptr_null_flag;
+ /*le16*/DxUint16_t DataOutSize;
+ /* Output */
+ DxUint8_t Output_ptr[4*CRYS_RSA_MAXIMUM_MOD_BUFFER_SIZE_IN_WORDS];
+ DxUint8_t Output_ptr_null_flag;
+ CRYSError_t _funcRetCode;
+} SepRpc_CRYS_RSA_PRIM_DecryptExactSizeParams_s;
+
+
+
+/************ CRYS_RSA_InvModWord ***************/
+#define SEPRPC_FUNC_ID_CRYS_RSA_InvModWord 21
+/*
+CRYSError_t CRYS_RSA_InvModWord(
+ DxUint32_t aVal,
+ DxUint32_t modVal,
+ DxUint32_t *invMod_ptr)
+*/
+
+#define SEPRPC_MEMREF_NUM_CRYS_RSA_InvModWord 0
+#if SEPRPC_MEMREF_NUM_CRYS_RSA_InvModWord > SEP_RPC_MAX_MEMREF_PER_FUNC
+#error SEPRPC_MEMREF_NUM_CRYS_RSA_InvModWord is more than SEP_RPC_MAX_MEMREF_PER_FUNC
+#endif
+
+typedef struct SepRpc_CRYS_RSA_InvModWordParams {
+ uint32_t num_of_memrefs; /* Number of elements in the memRef array */
+ /* Input */
+ /*le32*/DxUint32_t aVal;
+ /*le32*/DxUint32_t modVal;
+ /* Output */
+ /*le32*/DxUint32_t __invMod_ptr;
+ DxUint8_t __invMod_ptr_null_flag;
+ CRYSError_t _funcRetCode;
+} SepRpc_CRYS_RSA_InvModWordParams_s;
+
+
+
+/************ CRYS_RSA_KG_GeneratePQprimes ***************/
+#define SEPRPC_FUNC_ID_CRYS_RSA_KG_GeneratePQprimes 22
+/*
+CRYSError_t CRYS_RSA_KG_GeneratePQprimes(
+ DxUint8_t pubExp_ptr[],
+ DxUint16_t pubExpSizeInBytes,
+ DxUint32_t primeSizeInBits,
+ DxUint32_t testsCount,
+ DxUint32_t p_ptr[],
+ DxUint32_t q_ptr[],
+ CRYS_RSAKGData_t *keyGenData_ptr)
+*/
+
+#define SEPRPC_MEMREF_NUM_CRYS_RSA_KG_GeneratePQprimes 0
+#if SEPRPC_MEMREF_NUM_CRYS_RSA_KG_GeneratePQprimes > SEP_RPC_MAX_MEMREF_PER_FUNC
+#error SEPRPC_MEMREF_NUM_CRYS_RSA_KG_GeneratePQprimes is more than SEP_RPC_MAX_MEMREF_PER_FUNC
+#endif
+
+typedef struct SepRpc_CRYS_RSA_KG_GeneratePQprimesParams {
+ uint32_t num_of_memrefs; /* Number of elements in the memRef array */
+ /* Input */
+ DxUint8_t pubExp_ptr[CRYS_RSA_MAXIMUM_MOD_BUFFER_SIZE_IN_WORDS*4*2+1];
+ DxUint8_t pubExp_ptr_null_flag;
+ /*le16*/DxUint16_t pubExpSizeInBytes;
+ /*le32*/DxUint32_t primeSizeInBits;
+ /*le32*/DxUint32_t testsCount;
+ CRYS_RSAKGData_t __keyGenData_ptr;
+ DxUint8_t __keyGenData_ptr_null_flag;
+ /* Output */
+ /*le32*/DxUint32_t p_ptr[(CRYS_PKA_MAX_KEY_GENERATION_SIZE_BITS/32)/2];
+ DxUint8_t p_ptr_null_flag;
+ /*le32*/DxUint32_t q_ptr[(CRYS_PKA_MAX_KEY_GENERATION_SIZE_BITS/32)/2];
+ DxUint8_t q_ptr_null_flag;
+ CRYSError_t _funcRetCode;
+} SepRpc_CRYS_RSA_KG_GeneratePQprimesParams_s;
+
+
+
+/************ CRYS_RSA_KG_CalculateKeyPairFromPQ ***************/
+#define SEPRPC_FUNC_ID_CRYS_RSA_KG_CalculateKeyPairFromPQ 23
+/*
+CRYSError_t CRYS_RSA_KG_CalculateKeyPairFromPQ(
+ DxUint8_t pubExp_ptr[],
+ DxUint16_t pubExpSizeInBytes,
+ DxUint32_t p_ptr[],
+ DxUint32_t q_ptr[],
+ DxUint16_t primeSizeInBits,
+ CRYS_RSA_DecryptionMode_t privKeyMode,
+ CRYS_RSAUserPrivKey_t *UserPrivKey_ptr,
+ CRYS_RSAUserPubKey_t *userPubKey_ptr,
+ CRYS_RSAKGData_t *keyGenData_ptr)
+*/
+
+#define SEPRPC_MEMREF_NUM_CRYS_RSA_KG_CalculateKeyPairFromPQ 0
+#if SEPRPC_MEMREF_NUM_CRYS_RSA_KG_CalculateKeyPairFromPQ > SEP_RPC_MAX_MEMREF_PER_FUNC
+#error SEPRPC_MEMREF_NUM_CRYS_RSA_KG_CalculateKeyPairFromPQ is more than SEP_RPC_MAX_MEMREF_PER_FUNC
+#endif
+
+typedef struct SepRpc_CRYS_RSA_KG_CalculateKeyPairFromPQParams {
+ uint32_t num_of_memrefs; /* Number of elements in the memRef array */
+ /* Input */
+ DxUint8_t pubExp_ptr[ CRYS_RSA_MAXIMUM_MOD_BUFFER_SIZE_IN_WORDS*4];
+ DxUint8_t pubExp_ptr_null_flag;
+ /*le16*/DxUint16_t pubExpSizeInBytes;
+ /*le32*/DxUint32_t p_ptr[(CRYS_PKA_MAX_KEY_GENERATION_SIZE_BITS/32)/2];
+ DxUint8_t p_ptr_null_flag;
+ /*le32*/DxUint32_t q_ptr[(CRYS_PKA_MAX_KEY_GENERATION_SIZE_BITS/32)/2];
+ DxUint8_t q_ptr_null_flag;
+ /*le16*/DxUint16_t primeSizeInBits;
+ /*le32*/CRYS_RSA_DecryptionMode_t privKeyMode;
+ CRYS_RSAKGData_t __keyGenData_ptr;
+ DxUint8_t __keyGenData_ptr_null_flag;
+ /* Output */
+ CRYS_RSAUserPrivKey_t __UserPrivKey_ptr;
+ DxUint8_t __UserPrivKey_ptr_null_flag;
+ CRYS_RSAUserPubKey_t __userPubKey_ptr;
+ DxUint8_t __userPubKey_ptr_null_flag;
+ CRYSError_t _funcRetCode;
+} SepRpc_CRYS_RSA_KG_CalculateKeyPairFromPQParams_s;
+
+
+
+/************ DX_RSA_KG_ExtendGenerateKeyPair ***************/
+#define SEPRPC_FUNC_ID_DX_RSA_KG_ExtendGenerateKeyPair 24
+/*
+CRYSError_t DX_RSA_KG_ExtendGenerateKeyPair(
+ DxUint8_t pubExp_ptr[],
+ DxUint16_t pubExpSizeInBytes,
+ DxUint32_t keySizeBits,
+ CRYS_RSA_DecryptionMode_t privKeyMode,
+ CRYS_RSAUserPrivKey_t *UserPrivKey_ptr,
+ CRYS_RSAUserPubKey_t *userPubKey_ptr,
+ CRYS_RSAKGData_t *keyGenData_ptr)
+*/
+
+#define SEPRPC_MEMREF_NUM_DX_RSA_KG_ExtendGenerateKeyPair 0
+#if SEPRPC_MEMREF_NUM_DX_RSA_KG_ExtendGenerateKeyPair > SEP_RPC_MAX_MEMREF_PER_FUNC
+#error SEPRPC_MEMREF_NUM_DX_RSA_KG_ExtendGenerateKeyPair is more than SEP_RPC_MAX_MEMREF_PER_FUNC
+#endif
+
+typedef struct SepRpc_DX_RSA_KG_ExtendGenerateKeyPairParams {
+ uint32_t num_of_memrefs; /* Number of elements in the memRef array */
+ /* Input */
+ DxUint8_t pubExp_ptr[CRYS_RSA_MAXIMUM_MOD_BUFFER_SIZE_IN_WORDS*4];
+ DxUint8_t pubExp_ptr_null_flag;
+ /*le16*/DxUint16_t pubExpSizeInBytes;
+ /*le32*/DxUint32_t keySizeBits;
+ /*le32*/CRYS_RSA_DecryptionMode_t privKeyMode;
+ CRYS_RSAKGData_t __keyGenData_ptr;
+ DxUint8_t __keyGenData_ptr_null_flag;
+ /* Output */
+ CRYS_RSAUserPrivKey_t __UserPrivKey_ptr;
+ DxUint8_t __UserPrivKey_ptr_null_flag;
+ CRYS_RSAUserPubKey_t __userPubKey_ptr;
+ DxUint8_t __userPubKey_ptr_null_flag;
+ CRYSError_t _funcRetCode;
+} SepRpc_DX_RSA_KG_ExtendGenerateKeyPairParams_s;
+
+
+#endif /*__CRYS_RSA_SEPRPC_H__*/