Lines Matching +full:8 +full:kb

310 			char  key_form[8];  in cca_genseckey()
311 char key_length[8]; in cca_genseckey()
312 char key_type1[8]; in cca_genseckey()
313 char key_type2[8]; in cca_genseckey()
352 memcpy(preqparm->lv1.key_form, "OP ", 8); in cca_genseckey()
357 memcpy(preqparm->lv1.key_length, "KEYLN16 ", 8); in cca_genseckey()
362 memcpy(preqparm->lv1.key_length, "KEYLN24 ", 8); in cca_genseckey()
367 memcpy(preqparm->lv1.key_length, "KEYLN32 ", 8); in cca_genseckey()
375 memcpy(preqparm->lv1.key_type1, "AESDATA ", 8); in cca_genseckey()
422 prepparm->lv3.keyblock.tok, 8*keysize); in cca_genseckey()
450 char rule_array[8]; in cca_clr2seckey()
491 memcpy(preqparm->rule_array, "AES ", 8); in cca_clr2seckey()
560 prepparm->lv3.keyblock.tok, 8*keysize); in cca_clr2seckey()
751 char rule_array[2*8]; in cca_gencipherkey()
754 u8 key_type_1[8]; in cca_gencipherkey()
755 u8 key_type_2[8]; in cca_gencipherkey()
798 } kb; in cca_gencipherkey() member
813 } kb; in cca_gencipherkey() member
829 preqparm->rule_array_len = sizeof(uint16_t) + 2 * 8; in cca_gencipherkey()
830 memcpy(preqparm->rule_array, "AES OP ", 2*8); in cca_gencipherkey()
847 memcpy(preqparm->vud.key_type_1, "TOKEN ", 8); in cca_gencipherkey()
850 /* prepare kb block */ in cca_gencipherkey()
851 preqparm->kb.len = sizeof(preqparm->kb); in cca_gencipherkey()
852 preqparm->kb.tlv1.len = sizeof(preqparm->kb.tlv1); in cca_gencipherkey()
853 preqparm->kb.tlv1.flag = 0x0030; in cca_gencipherkey()
854 preqparm->kb.tlv2.len = sizeof(preqparm->kb.tlv2); in cca_gencipherkey()
855 preqparm->kb.tlv2.flag = 0x0030; in cca_gencipherkey()
856 preqparm->kb.tlv3.len = sizeof(preqparm->kb.tlv3); in cca_gencipherkey()
857 preqparm->kb.tlv3.flag = 0x0030; in cca_gencipherkey()
858 memcpy(preqparm->kb.tlv3.gen_key_id_1, in cca_gencipherkey()
860 preqparm->kb.tlv4.len = sizeof(preqparm->kb.tlv4); in cca_gencipherkey()
861 preqparm->kb.tlv4.flag = 0x0030; in cca_gencipherkey()
862 preqparm->kb.tlv5.len = sizeof(preqparm->kb.tlv5); in cca_gencipherkey()
863 preqparm->kb.tlv5.flag = 0x0030; in cca_gencipherkey()
864 preqparm->kb.tlv6.len = sizeof(preqparm->kb.tlv6); in cca_gencipherkey()
865 preqparm->kb.tlv6.flag = 0x0030; in cca_gencipherkey()
867 /* patch the skeleton key token export flags inside the kb block */ in cca_gencipherkey()
869 t = (struct cipherkeytoken *) preqparm->kb.tlv3.gen_key_id_1; in cca_gencipherkey()
903 if (prepparm->kb.len < 120 + 5 * sizeof(uint16_t) || in cca_gencipherkey()
904 prepparm->kb.len > 136 + 5 * sizeof(uint16_t)) { in cca_gencipherkey()
913 prepparm->kb.tlv1.gen_key, in cca_gencipherkey()
921 t = (struct cipherkeytoken *) prepparm->kb.tlv1.gen_key; in cca_gencipherkey()
991 } kb; in _ip_cprb_helper() member
994 int complete = strncmp(rule_array_2, "COMPLETE", 8) ? 0 : 1; in _ip_cprb_helper()
1008 preq_ra_block->rule_array_len = sizeof(uint16_t) + 2 * 8; in _ip_cprb_helper()
1009 memcpy(preq_ra_block->rule_array, rule_array_1, 8); in _ip_cprb_helper()
1010 memcpy(preq_ra_block->rule_array + 8, rule_array_2, 8); in _ip_cprb_helper()
1011 preqcblk->req_parml = sizeof(struct rule_array_block) + 2 * 8; in _ip_cprb_helper()
1013 preq_ra_block->rule_array_len += 8; in _ip_cprb_helper()
1014 memcpy(preq_ra_block->rule_array + 16, rule_array_3, 8); in _ip_cprb_helper()
1015 preqcblk->req_parml += 8; in _ip_cprb_helper()
1021 n = complete ? 0 : (clr_key_bit_size + 7) / 8; in _ip_cprb_helper()
1071 if (prepparm->kb.len < 120 + 3 * sizeof(uint16_t) || in _ip_cprb_helper()
1072 prepparm->kb.len > 136 + 3 * sizeof(uint16_t)) { in _ip_cprb_helper()
1082 t = (struct cipherkeytoken *) prepparm->kb.tlv1.key_token; in _ip_cprb_helper()
1190 u8 rule_array[8]; in cca_cipher2protkey()
1202 } kb; in cca_cipher2protkey() member
1228 } kb; in cca_cipher2protkey() member
1246 memcpy(preqparm->rule_array, "EXPT-SK ", 8); in cca_cipher2protkey()
1252 /* kb, cca token */ in cca_cipher2protkey()
1253 preqparm->kb.len = keytoklen + 3 * sizeof(uint16_t); in cca_cipher2protkey()
1254 preqparm->kb.cca_key_token_len = keytoklen + 2 * sizeof(uint16_t); in cca_cipher2protkey()
1255 memcpy(preqparm->kb.cca_key_token, ckey, keytoklen); in cca_cipher2protkey()
1356 u8 rule_array[8]; in cca_ecc2protkey()
1368 } kb; in cca_ecc2protkey() member
1394 } kb; in cca_ecc2protkey() member
1412 memcpy(preqparm->rule_array, "EXPT-SK ", 8); in cca_ecc2protkey()
1418 /* kb, cca token */ in cca_ecc2protkey()
1419 preqparm->kb.len = keylen + 3 * sizeof(uint16_t); in cca_ecc2protkey()
1420 preqparm->kb.cca_key_token_len = keylen + 2 * sizeof(uint16_t); in cca_ecc2protkey()
1421 memcpy(preqparm->kb.cca_key_token, key, keylen); in cca_ecc2protkey()
1509 char rule_array[8]; in cca_query_crypto_facility()
1700 if (rc == 0 && rlen >= 10*8 && vlen >= 204) { in fetch_cca_info()
1701 memcpy(ci->serial, rarray, 8); in fetch_cca_info()
1702 ci->new_aes_mk_state = (char) rarray[7*8]; in fetch_cca_info()
1703 ci->cur_aes_mk_state = (char) rarray[8*8]; in fetch_cca_info()
1704 ci->old_aes_mk_state = (char) rarray[9*8]; in fetch_cca_info()
1706 memcpy(&ci->old_aes_mkvp, varray + 172, 8); in fetch_cca_info()
1708 memcpy(&ci->cur_aes_mkvp, varray + 184, 8); in fetch_cca_info()
1710 memcpy(&ci->new_aes_mkvp, varray + 196, 8); in fetch_cca_info()
1718 if (rc == 0 && rlen >= 10*8 && vlen >= 240) { in fetch_cca_info()
1719 ci->new_apka_mk_state = (char) rarray[7*8]; in fetch_cca_info()
1720 ci->cur_apka_mk_state = (char) rarray[8*8]; in fetch_cca_info()
1721 ci->old_apka_mk_state = (char) rarray[9*8]; in fetch_cca_info()
1723 memcpy(&ci->old_apka_mkvp, varray + 208, 8); in fetch_cca_info()
1725 memcpy(&ci->cur_apka_mkvp, varray + 220, 8); in fetch_cca_info()
1727 memcpy(&ci->new_apka_mkvp, varray + 232, 8); in fetch_cca_info()