Lines Matching +full:4 +full:kb
47 * 128 * 128 * 4 bytes = 64 KB big. Usage of this memory is
828 } kb; in cca_gencipherkey() member
843 } kb; in cca_gencipherkey() member
880 /* prepare kb block */ in cca_gencipherkey()
881 preqparm->kb.len = sizeof(preqparm->kb); in cca_gencipherkey()
882 preqparm->kb.tlv1.len = sizeof(preqparm->kb.tlv1); in cca_gencipherkey()
883 preqparm->kb.tlv1.flag = 0x0030; in cca_gencipherkey()
884 preqparm->kb.tlv2.len = sizeof(preqparm->kb.tlv2); in cca_gencipherkey()
885 preqparm->kb.tlv2.flag = 0x0030; in cca_gencipherkey()
886 preqparm->kb.tlv3.len = sizeof(preqparm->kb.tlv3); in cca_gencipherkey()
887 preqparm->kb.tlv3.flag = 0x0030; in cca_gencipherkey()
888 memcpy(preqparm->kb.tlv3.gen_key_id_1, in cca_gencipherkey()
890 preqparm->kb.tlv4.len = sizeof(preqparm->kb.tlv4); in cca_gencipherkey()
891 preqparm->kb.tlv4.flag = 0x0030; in cca_gencipherkey()
892 preqparm->kb.tlv5.len = sizeof(preqparm->kb.tlv5); in cca_gencipherkey()
893 preqparm->kb.tlv5.flag = 0x0030; in cca_gencipherkey()
894 preqparm->kb.tlv6.len = sizeof(preqparm->kb.tlv6); in cca_gencipherkey()
895 preqparm->kb.tlv6.flag = 0x0030; in cca_gencipherkey()
897 /* patch the skeleton key token export flags inside the kb block */ in cca_gencipherkey()
899 t = (struct cipherkeytoken *)preqparm->kb.tlv3.gen_key_id_1; in cca_gencipherkey()
931 if (prepparm->kb.len < 120 + 5 * sizeof(uint16_t) || in cca_gencipherkey()
932 prepparm->kb.len > 136 + 5 * sizeof(uint16_t)) { in cca_gencipherkey()
941 prepparm->kb.tlv1.gen_key, in cca_gencipherkey()
949 t = (struct cipherkeytoken *)prepparm->kb.tlv1.gen_key; in cca_gencipherkey()
1020 } kb; in _ip_cprb_helper() member
1099 if (prepparm->kb.len < 120 + 3 * sizeof(uint16_t) || in _ip_cprb_helper()
1100 prepparm->kb.len > 136 + 3 * sizeof(uint16_t)) { in _ip_cprb_helper()
1110 t = (struct cipherkeytoken *)prepparm->kb.tlv1.key_token; in _ip_cprb_helper()
1159 * Do the key import with the clear key value in 4 steps: in cca_clr2cipherkey()
1160 * 1/4 FIRST import with only random data in cca_clr2cipherkey()
1161 * 2/4 EXOR the clear key in cca_clr2cipherkey()
1162 * 3/4 EXOR the very same random data again in cca_clr2cipherkey()
1163 * 4/4 COMPLETE the secure cipher key import in cca_clr2cipherkey()
1168 ZCRYPT_DBF_ERR("%s clear key import 1/4 with CSNBKPI2 failed, rc=%d\n", in cca_clr2cipherkey()
1175 ZCRYPT_DBF_ERR("%s clear key import 2/4 with CSNBKPI2 failed, rc=%d\n", in cca_clr2cipherkey()
1182 ZCRYPT_DBF_ERR("%s clear key import 3/4 with CSNBKPI2 failed, rc=%d\n", in cca_clr2cipherkey()
1189 ZCRYPT_DBF_ERR("%s clear key import 4/4 with CSNBKPI2 failed, rc=%d\n", in cca_clr2cipherkey()
1235 } kb; in cca_cipher2protkey() member
1261 } kb; in cca_cipher2protkey() member
1286 /* kb, cca token */ in cca_cipher2protkey()
1287 preqparm->kb.len = keytoklen + 3 * sizeof(uint16_t); in cca_cipher2protkey()
1288 preqparm->kb.cca_key_token_len = keytoklen + 2 * sizeof(uint16_t); in cca_cipher2protkey()
1289 memcpy(preqparm->kb.cca_key_token, ckey, keytoklen); in cca_cipher2protkey()
1401 } kb; in cca_ecc2protkey() member
1450 /* kb, cca token */ in cca_ecc2protkey()
1451 preqparm->kb.len = keylen + 3 * sizeof(uint16_t); in cca_ecc2protkey()
1452 preqparm->kb.cca_key_token_len = keylen + 2 * sizeof(uint16_t); in cca_ecc2protkey()
1453 memcpy(preqparm->kb.cca_key_token, key, keylen); in cca_ecc2protkey()
1667 ci->new_asym_mk_state = (char)rarray[4 * 8]; in cca_get_info()