Lines Matching +full:1 +full:kb

72 			found = 1;  in card_cache_update()
123 struct ep11keyblob *kb = (struct ep11keyblob *)(key + sizeof(*hdr)); in ep11_check_aes_key_with_hdr() local
127 if (keylen < sizeof(*hdr) + sizeof(*kb)) { in ep11_check_aes_key_with_hdr()
129 __func__, keylen, sizeof(*hdr) + sizeof(*kb)); in ep11_check_aes_key_with_hdr()
157 if (hdr->len < sizeof(*hdr) + sizeof(*kb)) { in ep11_check_aes_key_with_hdr()
160 __func__, (int)hdr->len, sizeof(*hdr) + sizeof(*kb)); in ep11_check_aes_key_with_hdr()
164 if (kb->version != EP11_STRUCT_MAGIC) { in ep11_check_aes_key_with_hdr()
167 __func__, (int)kb->version, EP11_STRUCT_MAGIC); in ep11_check_aes_key_with_hdr()
170 if (checkcpacfexp && !(kb->attr & EP11_BLOB_PKEY_EXTRACTABLE)) { in ep11_check_aes_key_with_hdr()
190 struct ep11keyblob *kb = (struct ep11keyblob *)(key + sizeof(*hdr)); in ep11_check_ecc_key_with_hdr() local
194 if (keylen < sizeof(*hdr) + sizeof(*kb)) { in ep11_check_ecc_key_with_hdr()
196 __func__, keylen, sizeof(*hdr) + sizeof(*kb)); in ep11_check_ecc_key_with_hdr()
224 if (hdr->len < sizeof(*hdr) + sizeof(*kb)) { in ep11_check_ecc_key_with_hdr()
227 __func__, (int)hdr->len, sizeof(*hdr) + sizeof(*kb)); in ep11_check_ecc_key_with_hdr()
231 if (kb->version != EP11_STRUCT_MAGIC) { in ep11_check_ecc_key_with_hdr()
234 __func__, (int)kb->version, EP11_STRUCT_MAGIC); in ep11_check_ecc_key_with_hdr()
237 if (checkcpacfexp && !(kb->attr & EP11_BLOB_PKEY_EXTRACTABLE)) { in ep11_check_ecc_key_with_hdr()
257 struct ep11keyblob *kb = (struct ep11keyblob *)key; in ep11_check_aes_key() local
261 if (keylen < sizeof(*kb)) { in ep11_check_aes_key()
263 __func__, keylen, sizeof(*kb)); in ep11_check_aes_key()
267 if (kb->head.type != TOKTYPE_NON_CCA) { in ep11_check_aes_key()
270 __func__, (int)kb->head.type, TOKTYPE_NON_CCA); in ep11_check_aes_key()
273 if (kb->head.version != TOKVER_EP11_AES) { in ep11_check_aes_key()
276 __func__, (int)kb->head.version, TOKVER_EP11_AES); in ep11_check_aes_key()
279 if (kb->head.len > keylen) { in ep11_check_aes_key()
282 __func__, (int)kb->head.len, keylen); in ep11_check_aes_key()
285 if (kb->head.len < sizeof(*kb)) { in ep11_check_aes_key()
288 __func__, (int)kb->head.len, sizeof(*kb)); in ep11_check_aes_key()
292 if (kb->version != EP11_STRUCT_MAGIC) { in ep11_check_aes_key()
295 __func__, (int)kb->version, EP11_STRUCT_MAGIC); in ep11_check_aes_key()
298 if (checkcpacfexp && !(kb->attr & EP11_BLOB_PKEY_EXTRACTABLE)) { in ep11_check_aes_key()
337 #define ASN1TAGLEN(x) (2 + (x) + ((x) > 127 ? 1 : 0) + ((x) > 255 ? 1 : 0))
343 ptr[1] = 0x82; in asn1tag_write()
349 ptr[1] = 0x81; in asn1tag_write()
354 ptr[1] = (u8)valuelen; in asn1tag_write()
437 if (pl[0] != 0x04 || pl[1] != 0x04) { in check_reply_pl()
444 if (pl[0] != 0x04 || pl[1] != 0x04) { in check_reply_pl()
451 if (pl[0] != 0x04 || pl[1] != 0x04) { in check_reply_pl()
492 int api = 1, rc = -ENOMEM; in ep11_query_info()
518 prep_urb(urb, &target, 1, in ep11_query_info()
643 info->cur_wk_state = '1'; in ep11_get_domain_info()
649 p_dom_info->dom_flags & 0x08 ? '2' : '1'; in ep11_get_domain_info()
704 struct ep11keyblob *kb; in ep11_genaeskey() local
725 api = (!keygenflags || keygenflags & 0x00200000) ? 4 : 1; in ep11_genaeskey()
756 prep_urb(urb, &target, 1, in ep11_genaeskey()
786 kb = (struct ep11keyblob *)keybuf; in ep11_genaeskey()
787 kb->head.type = TOKTYPE_NON_CCA; in ep11_genaeskey()
788 kb->head.len = rep_pl->data_len; in ep11_genaeskey()
789 kb->head.version = TOKVER_EP11_AES; in ep11_genaeskey()
790 kb->head.keybitlen = keybitsize; in ep11_genaeskey()
833 int n, api = 1, rc = -ENOMEM; in ep11_cryptsingle()
876 prep_urb(urb, &target, 1, in ep11_cryptsingle()
969 struct ep11keyblob *kb; in ep11_unwrapkey() local
981 api = (!keygenflags || keygenflags & 0x00200000) ? 4 : 1; in ep11_unwrapkey()
1024 prep_urb(urb, &target, 1, in ep11_unwrapkey()
1054 kb = (struct ep11keyblob *)keybuf; in ep11_unwrapkey()
1055 kb->head.type = TOKTYPE_NON_CCA; in ep11_unwrapkey()
1056 kb->head.len = rep_pl->data_len; in ep11_unwrapkey()
1057 kb->head.version = TOKVER_EP11_AES; in ep11_unwrapkey()
1058 kb->head.keybitlen = keybitsize; in ep11_unwrapkey()
1100 struct ep11keyblob *kb; in ep11_wrapkey() local
1107 kb = (struct ep11keyblob *)key; in ep11_wrapkey()
1108 if (kb->head.type == TOKTYPE_NON_CCA && in ep11_wrapkey()
1109 kb->head.version == TOKVER_EP11_AES) { in ep11_wrapkey()
1111 keysize = min_t(size_t, kb->head.len, keysize); in ep11_wrapkey()
1123 api = (!mech || mech == 0x80060001) ? 4 : 1; /* CKM_IBM_CPACF_WRAP */ in ep11_wrapkey()
1140 kb = (struct ep11keyblob *)(p - keysize); in ep11_wrapkey()
1141 memset(&kb->head, 0, sizeof(kb->head)); in ep11_wrapkey()
1162 prep_urb(urb, &target, 1, in ep11_wrapkey()
1204 struct ep11keyblob *kb; in ep11_clr2keyblob() local
1225 /* Step 1: generate AES 256 bit random kek key */ in ep11_clr2keyblob()
1235 kb = (struct ep11keyblob *)kek; in ep11_clr2keyblob()
1236 memset(&kb->head, 0, sizeof(kb->head)); in ep11_clr2keyblob()
1307 wkbuflen = (keylen + AES_BLOCK_SIZE) & (~(AES_BLOCK_SIZE - 1)); in ep11_kblob2protkey()
1324 if (wki->version != 1 || wki->pkeytype < 1 || wki->pkeytype > 5) { in ep11_kblob2protkey()
1333 case 1: /* AES */ in ep11_kblob2protkey()
1404 /* allocate 1k space for up to 256 apqns */ in ep11_findcard2()
1441 if (edi.cur_wk_state != '1') in ep11_findcard2()