Lines Matching +full:32 +full:kb
46 * 128 * 128 * 4 bytes = 64 KB big. Usage of this memory is
59 static int ep11_kb_split(const u8 *kb, size_t kblen, u32 kbver, in ep11_kb_split() argument
70 hdr = (struct ep11kblob_header *)kb; in ep11_kb_split()
87 pl = (u8 *)kb + hdrsize; in ep11_kb_split()
103 static int ep11_kb_decode(const u8 *kb, size_t kblen, in ep11_kb_decode() argument
115 tmph = (struct ep11kblob_header *)kb; in ep11_kb_decode()
121 if (ep11_kb_split(kb, kblen, tmph->version, in ep11_kb_decode()
154 struct ep11keyblob *kb; in ep11_kb_wkvp() local
156 if (ep11_kb_decode(keyblob, keybloblen, NULL, NULL, &kb, NULL)) in ep11_kb_wkvp()
158 return kb->wkvp; in ep11_kb_wkvp()
169 struct ep11keyblob *kb = (struct ep11keyblob *)(key + sizeof(*hdr)); in ep11_check_aes_key_with_hdr() local
173 if (keylen < sizeof(*hdr) + sizeof(*kb)) { in ep11_check_aes_key_with_hdr()
175 __func__, keylen, sizeof(*hdr) + sizeof(*kb)); in ep11_check_aes_key_with_hdr()
203 if (hdr->len < sizeof(*hdr) + sizeof(*kb)) { in ep11_check_aes_key_with_hdr()
206 __func__, (int)hdr->len, sizeof(*hdr) + sizeof(*kb)); in ep11_check_aes_key_with_hdr()
210 if (kb->version != EP11_STRUCT_MAGIC) { in ep11_check_aes_key_with_hdr()
213 __func__, (int)kb->version, EP11_STRUCT_MAGIC); in ep11_check_aes_key_with_hdr()
216 if (checkcpacfexp && !(kb->attr & EP11_BLOB_PKEY_EXTRACTABLE)) { in ep11_check_aes_key_with_hdr()
236 struct ep11keyblob *kb = (struct ep11keyblob *)(key + sizeof(*hdr)); in ep11_check_ecc_key_with_hdr() local
240 if (keylen < sizeof(*hdr) + sizeof(*kb)) { in ep11_check_ecc_key_with_hdr()
242 __func__, keylen, sizeof(*hdr) + sizeof(*kb)); in ep11_check_ecc_key_with_hdr()
270 if (hdr->len < sizeof(*hdr) + sizeof(*kb)) { in ep11_check_ecc_key_with_hdr()
273 __func__, (int)hdr->len, sizeof(*hdr) + sizeof(*kb)); in ep11_check_ecc_key_with_hdr()
277 if (kb->version != EP11_STRUCT_MAGIC) { in ep11_check_ecc_key_with_hdr()
280 __func__, (int)kb->version, EP11_STRUCT_MAGIC); in ep11_check_ecc_key_with_hdr()
283 if (checkcpacfexp && !(kb->attr & EP11_BLOB_PKEY_EXTRACTABLE)) { in ep11_check_ecc_key_with_hdr()
303 struct ep11keyblob *kb = (struct ep11keyblob *)key; in ep11_check_aes_key() local
307 if (keylen < sizeof(*kb)) { in ep11_check_aes_key()
309 __func__, keylen, sizeof(*kb)); in ep11_check_aes_key()
313 if (kb->head.type != TOKTYPE_NON_CCA) { in ep11_check_aes_key()
316 __func__, (int)kb->head.type, TOKTYPE_NON_CCA); in ep11_check_aes_key()
319 if (kb->head.version != TOKVER_EP11_AES) { in ep11_check_aes_key()
322 __func__, (int)kb->head.version, TOKVER_EP11_AES); in ep11_check_aes_key()
325 if (kb->head.len > keylen) { in ep11_check_aes_key()
328 __func__, (int)kb->head.len, keylen); in ep11_check_aes_key()
331 if (kb->head.len < sizeof(*kb)) { in ep11_check_aes_key()
334 __func__, (int)kb->head.len, sizeof(*kb)); in ep11_check_aes_key()
338 if (kb->version != EP11_STRUCT_MAGIC) { in ep11_check_aes_key()
341 __func__, (int)kb->version, EP11_STRUCT_MAGIC); in ep11_check_aes_key()
344 if (checkcpacfexp && !(kb->attr & EP11_BLOB_PKEY_EXTRACTABLE)) { in ep11_check_aes_key()
497 /* len should cover at least 3 fields with 32 bit value each */ in check_reply_pl()
652 u8 fwid[32]; in ep11_get_card_info()
653 u8 xcp_config_hash[32]; in ep11_get_card_info()
654 u8 CSP_config_hash[32]; in ep11_get_card_info()
705 u8 cur_WK_VP[32]; in ep11_get_domain_info()
706 u8 new_WK_VP[32]; in ep11_get_domain_info()
723 memcpy(info->cur_wkvp, dom_query_info.cur_WK_VP, 32); in ep11_get_domain_info()
729 memcpy(info->new_wkvp, dom_query_info.new_WK_VP, 32); in ep11_get_domain_info()
988 /* reply cprb and payload, assume out data size <= in data size + 32 */ in ep11_cryptsingle()
989 rep_pl_size = sizeof(struct crypt_rep_pl) + ASN1TAGLEN(inbufsize + 32); in ep11_cryptsingle()
1494 case 16 + 32: in ep11_kblob2protkey()
1499 case 24 + 32: in ep11_kblob2protkey()
1504 case 32 + 32: in ep11_kblob2protkey()