Lines Matching +full:32 +full:kb

118 static int ep11_kb_split(const u8 *kb, size_t kblen, u32 kbver,  in ep11_kb_split()  argument
129 hdr = (struct ep11kblob_header *)kb; in ep11_kb_split()
146 pl = (u8 *)kb + hdrsize; in ep11_kb_split()
162 static int ep11_kb_decode(const u8 *kb, size_t kblen, in ep11_kb_decode() argument
174 tmph = (struct ep11kblob_header *)kb; in ep11_kb_decode()
180 if (ep11_kb_split(kb, kblen, tmph->version, in ep11_kb_decode()
213 struct ep11keyblob *kb; in ep11_kb_wkvp() local
215 if (ep11_kb_decode(keyblob, keybloblen, NULL, NULL, &kb, NULL)) in ep11_kb_wkvp()
217 return kb->wkvp; in ep11_kb_wkvp()
228 struct ep11keyblob *kb = (struct ep11keyblob *)(key + sizeof(*hdr)); in ep11_check_aes_key_with_hdr() local
232 if (keylen < sizeof(*hdr) + sizeof(*kb)) { in ep11_check_aes_key_with_hdr()
234 __func__, keylen, sizeof(*hdr) + sizeof(*kb)); in ep11_check_aes_key_with_hdr()
262 if (hdr->len < sizeof(*hdr) + sizeof(*kb)) { in ep11_check_aes_key_with_hdr()
265 __func__, (int)hdr->len, sizeof(*hdr) + sizeof(*kb)); in ep11_check_aes_key_with_hdr()
269 if (kb->version != EP11_STRUCT_MAGIC) { in ep11_check_aes_key_with_hdr()
272 __func__, (int)kb->version, EP11_STRUCT_MAGIC); in ep11_check_aes_key_with_hdr()
275 if (checkcpacfexp && !(kb->attr & EP11_BLOB_PKEY_EXTRACTABLE)) { in ep11_check_aes_key_with_hdr()
295 struct ep11keyblob *kb = (struct ep11keyblob *)(key + sizeof(*hdr)); in ep11_check_ecc_key_with_hdr() local
299 if (keylen < sizeof(*hdr) + sizeof(*kb)) { in ep11_check_ecc_key_with_hdr()
301 __func__, keylen, sizeof(*hdr) + sizeof(*kb)); in ep11_check_ecc_key_with_hdr()
329 if (hdr->len < sizeof(*hdr) + sizeof(*kb)) { in ep11_check_ecc_key_with_hdr()
332 __func__, (int)hdr->len, sizeof(*hdr) + sizeof(*kb)); in ep11_check_ecc_key_with_hdr()
336 if (kb->version != EP11_STRUCT_MAGIC) { in ep11_check_ecc_key_with_hdr()
339 __func__, (int)kb->version, EP11_STRUCT_MAGIC); in ep11_check_ecc_key_with_hdr()
342 if (checkcpacfexp && !(kb->attr & EP11_BLOB_PKEY_EXTRACTABLE)) { in ep11_check_ecc_key_with_hdr()
362 struct ep11keyblob *kb = (struct ep11keyblob *)key; in ep11_check_aes_key() local
366 if (keylen < sizeof(*kb)) { in ep11_check_aes_key()
368 __func__, keylen, sizeof(*kb)); in ep11_check_aes_key()
372 if (kb->head.type != TOKTYPE_NON_CCA) { in ep11_check_aes_key()
375 __func__, (int)kb->head.type, TOKTYPE_NON_CCA); in ep11_check_aes_key()
378 if (kb->head.version != TOKVER_EP11_AES) { in ep11_check_aes_key()
381 __func__, (int)kb->head.version, TOKVER_EP11_AES); in ep11_check_aes_key()
384 if (kb->head.len > keylen) { in ep11_check_aes_key()
387 __func__, (int)kb->head.len, keylen); in ep11_check_aes_key()
390 if (kb->head.len < sizeof(*kb)) { in ep11_check_aes_key()
393 __func__, (int)kb->head.len, sizeof(*kb)); in ep11_check_aes_key()
397 if (kb->version != EP11_STRUCT_MAGIC) { in ep11_check_aes_key()
400 __func__, (int)kb->version, EP11_STRUCT_MAGIC); in ep11_check_aes_key()
403 if (checkcpacfexp && !(kb->attr & EP11_BLOB_PKEY_EXTRACTABLE)) { in ep11_check_aes_key()
535 /* len should cover at least 3 fields with 32 bit value each */ in check_reply_pl()
672 u8 fwid[32]; in ep11_get_card_info()
673 u8 xcp_config_hash[32]; in ep11_get_card_info()
674 u8 CSP_config_hash[32]; in ep11_get_card_info()
728 u8 cur_WK_VP[32]; in ep11_get_domain_info()
729 u8 new_WK_VP[32]; in ep11_get_domain_info()
749 memcpy(info->cur_wkvp, p_dom_info->cur_WK_VP, 32); in ep11_get_domain_info()
755 memcpy(info->new_wkvp, p_dom_info->new_WK_VP, 32); in ep11_get_domain_info()
1014 /* reply cprb and payload, assume out data size <= in data size + 32 */ in ep11_cryptsingle()
1015 rep_pl_size = sizeof(struct crypt_rep_pl) + ASN1TAGLEN(inbufsize + 32); in ep11_cryptsingle()
1498 case 16 + 32: in ep11_kblob2protkey()
1503 case 24 + 32: in ep11_kblob2protkey()
1508 case 32 + 32: in ep11_kblob2protkey()