Lines Matching +full:8 +full:kb

47  * 128 * 128 * 4 bytes = 64 KB big. Usage of this memory is
334 char key_form[8]; in cca_genseckey()
335 char key_length[8]; in cca_genseckey()
336 char key_type1[8]; in cca_genseckey()
337 char key_type2[8]; in cca_genseckey()
377 memcpy(preqparm->lv1.key_form, "OP ", 8); in cca_genseckey()
382 memcpy(preqparm->lv1.key_length, "KEYLN16 ", 8); in cca_genseckey()
387 memcpy(preqparm->lv1.key_length, "KEYLN24 ", 8); in cca_genseckey()
392 memcpy(preqparm->lv1.key_length, "KEYLN32 ", 8); in cca_genseckey()
400 memcpy(preqparm->lv1.key_type1, "AESDATA ", 8); in cca_genseckey()
447 prepparm->lv3.keyblock.tok, 8 * keysize); in cca_genseckey()
475 char rule_array[8]; in cca_clr2seckey()
517 memcpy(preqparm->rule_array, "AES ", 8); in cca_clr2seckey()
586 prepparm->lv3.keyblock.tok, 8 * keysize); in cca_clr2seckey()
692 if (prepcblk->ccp_rtcode == 8 && prepcblk->ccp_rscode == 2290) in cca_sec2protkey()
781 char rule_array[2 * 8]; in cca_gencipherkey()
784 u8 key_type_1[8]; in cca_gencipherkey()
785 u8 key_type_2[8]; in cca_gencipherkey()
828 } kb; in cca_gencipherkey() member
843 } kb; in cca_gencipherkey() member
860 preqparm->rule_array_len = sizeof(uint16_t) + 2 * 8; in cca_gencipherkey()
861 memcpy(preqparm->rule_array, "AES OP ", 2 * 8); in cca_gencipherkey()
877 memcpy(preqparm->vud.key_type_1, "TOKEN ", 8); in cca_gencipherkey()
880 /* prepare kb block */ in cca_gencipherkey()
881 preqparm->kb.len = sizeof(preqparm->kb); in cca_gencipherkey()
882 preqparm->kb.tlv1.len = sizeof(preqparm->kb.tlv1); in cca_gencipherkey()
883 preqparm->kb.tlv1.flag = 0x0030; in cca_gencipherkey()
884 preqparm->kb.tlv2.len = sizeof(preqparm->kb.tlv2); in cca_gencipherkey()
885 preqparm->kb.tlv2.flag = 0x0030; in cca_gencipherkey()
886 preqparm->kb.tlv3.len = sizeof(preqparm->kb.tlv3); in cca_gencipherkey()
887 preqparm->kb.tlv3.flag = 0x0030; in cca_gencipherkey()
888 memcpy(preqparm->kb.tlv3.gen_key_id_1, in cca_gencipherkey()
890 preqparm->kb.tlv4.len = sizeof(preqparm->kb.tlv4); in cca_gencipherkey()
891 preqparm->kb.tlv4.flag = 0x0030; in cca_gencipherkey()
892 preqparm->kb.tlv5.len = sizeof(preqparm->kb.tlv5); in cca_gencipherkey()
893 preqparm->kb.tlv5.flag = 0x0030; in cca_gencipherkey()
894 preqparm->kb.tlv6.len = sizeof(preqparm->kb.tlv6); in cca_gencipherkey()
895 preqparm->kb.tlv6.flag = 0x0030; in cca_gencipherkey()
897 /* patch the skeleton key token export flags inside the kb block */ in cca_gencipherkey()
899 t = (struct cipherkeytoken *)preqparm->kb.tlv3.gen_key_id_1; in cca_gencipherkey()
931 if (prepparm->kb.len < 120 + 5 * sizeof(uint16_t) || in cca_gencipherkey()
932 prepparm->kb.len > 136 + 5 * sizeof(uint16_t)) { in cca_gencipherkey()
941 prepparm->kb.tlv1.gen_key, in cca_gencipherkey()
949 t = (struct cipherkeytoken *)prepparm->kb.tlv1.gen_key; in cca_gencipherkey()
1020 } kb; in _ip_cprb_helper() member
1023 int complete = strncmp(rule_array_2, "COMPLETE", 8) ? 0 : 1; in _ip_cprb_helper()
1038 preq_ra_block->rule_array_len = sizeof(uint16_t) + 2 * 8; in _ip_cprb_helper()
1039 memcpy(preq_ra_block->rule_array, rule_array_1, 8); in _ip_cprb_helper()
1040 memcpy(preq_ra_block->rule_array + 8, rule_array_2, 8); in _ip_cprb_helper()
1041 preqcblk->req_parml = sizeof(struct rule_array_block) + 2 * 8; in _ip_cprb_helper()
1043 preq_ra_block->rule_array_len += 8; in _ip_cprb_helper()
1044 memcpy(preq_ra_block->rule_array + 16, rule_array_3, 8); in _ip_cprb_helper()
1045 preqcblk->req_parml += 8; in _ip_cprb_helper()
1051 n = complete ? 0 : (clr_key_bit_size + 7) / 8; in _ip_cprb_helper()
1099 if (prepparm->kb.len < 120 + 3 * sizeof(uint16_t) || in _ip_cprb_helper()
1100 prepparm->kb.len > 136 + 3 * sizeof(uint16_t)) { in _ip_cprb_helper()
1110 t = (struct cipherkeytoken *)prepparm->kb.tlv1.key_token; in _ip_cprb_helper()
1223 u8 rule_array[8]; in cca_cipher2protkey()
1235 } kb; in cca_cipher2protkey() member
1261 } kb; in cca_cipher2protkey() member
1280 memcpy(preqparm->rule_array, "EXPT-SK ", 8); in cca_cipher2protkey()
1286 /* kb, cca token */ in cca_cipher2protkey()
1287 preqparm->kb.len = keytoklen + 3 * sizeof(uint16_t); in cca_cipher2protkey()
1288 preqparm->kb.cca_key_token_len = keytoklen + 2 * sizeof(uint16_t); in cca_cipher2protkey()
1289 memcpy(preqparm->kb.cca_key_token, ckey, keytoklen); in cca_cipher2protkey()
1310 if (prepcblk->ccp_rtcode == 8 && prepcblk->ccp_rscode == 2290) in cca_cipher2protkey()
1389 u8 rule_array[8]; in cca_ecc2protkey()
1401 } kb; in cca_ecc2protkey() member
1444 memcpy(preqparm->rule_array, "EXPT-SK ", 8); in cca_ecc2protkey()
1450 /* kb, cca token */ in cca_ecc2protkey()
1451 preqparm->kb.len = keylen + 3 * sizeof(uint16_t); in cca_ecc2protkey()
1452 preqparm->kb.cca_key_token_len = keylen + 2 * sizeof(uint16_t); in cca_ecc2protkey()
1453 memcpy(preqparm->kb.cca_key_token, key, keylen); in cca_ecc2protkey()
1474 if (prepcblk->ccp_rtcode == 8 && prepcblk->ccp_rscode == 2290) in cca_ecc2protkey()
1541 char rule_array[8]; in cca_query_crypto_facility()
1665 if (rc == 0 && rlen >= 10 * 8 && vlen >= 204) { in cca_get_info()
1666 memcpy(ci->serial, rarray, 8); in cca_get_info()
1667 ci->new_asym_mk_state = (char)rarray[4 * 8]; in cca_get_info()
1668 ci->cur_asym_mk_state = (char)rarray[5 * 8]; in cca_get_info()
1669 ci->old_asym_mk_state = (char)rarray[6 * 8]; in cca_get_info()
1676 ci->new_aes_mk_state = (char)rarray[7 * 8]; in cca_get_info()
1677 ci->cur_aes_mk_state = (char)rarray[8 * 8]; in cca_get_info()
1678 ci->old_aes_mk_state = (char)rarray[9 * 8]; in cca_get_info()
1680 memcpy(&ci->old_aes_mkvp, varray + 172, 8); in cca_get_info()
1682 memcpy(&ci->cur_aes_mkvp, varray + 184, 8); in cca_get_info()
1684 memcpy(&ci->new_aes_mkvp, varray + 196, 8); in cca_get_info()
1692 if (rc == 0 && rlen >= 13 * 8 && vlen >= 240) { in cca_get_info()
1693 ci->new_apka_mk_state = (char)rarray[10 * 8]; in cca_get_info()
1694 ci->cur_apka_mk_state = (char)rarray[11 * 8]; in cca_get_info()
1695 ci->old_apka_mk_state = (char)rarray[12 * 8]; in cca_get_info()
1697 memcpy(&ci->old_apka_mkvp, varray + 208, 8); in cca_get_info()
1699 memcpy(&ci->cur_apka_mkvp, varray + 220, 8); in cca_get_info()
1701 memcpy(&ci->new_apka_mkvp, varray + 232, 8); in cca_get_info()