Lines Matching defs:keylen
387 static int pkey_nonccatok2pkey(const u8 *key, u32 keylen,
398 if (keylen != sizeof(struct protaeskeytoken))
417 if (keylen < sizeof(struct clearaeskeytoken))
420 if (keylen != sizeof(*t) + t->len)
457 rc = ep11_check_aes_key(debug_info, 3, key, keylen, 1);
465 rc = ep11_check_aes_key_with_hdr(debug_info, 3, key, keylen, 1);
485 static int pkey_ccainttok2pkey(const u8 *key, u32 keylen,
492 if (keylen != sizeof(struct secaeskeytoken))
496 if (keylen < hdr->len || keylen > MAXCCAVLSCTOKENSIZE)
511 int pkey_keyblob2pkey(const u8 *key, u32 keylen,
517 if (keylen < sizeof(struct keytoken_header)) {
518 DEBUG_ERR("%s invalid keylen %d\n", __func__, keylen);
524 rc = pkey_nonccatok2pkey(key, keylen, protkey);
527 rc = pkey_ccainttok2pkey(key, keylen, protkey);
649 static int pkey_verifykey2(const u8 *key, size_t keylen,
658 if (keylen < sizeof(struct keytoken_header))
732 rc = ep11_check_aes_key(debug_info, 3, key, keylen, 1);
760 const u8 *key, size_t keylen,
770 if (keylen < sizeof(struct keytoken_header))
775 if (keylen != sizeof(struct secaeskeytoken))
780 if (keylen < hdr->len || keylen > MAXCCAVLSCTOKENSIZE)
791 if (keylen < sizeof(struct ep11keyblob))
793 if (ep11_check_aes_key(debug_info, 3, key, keylen, 1))
796 return pkey_nonccatok2pkey(key, keylen, pkey);
831 static int pkey_apqns4key(const u8 *key, size_t keylen, u32 flags,
838 if (keylen < sizeof(struct keytoken_header) || flags == 0)
1001 const u8 *key, size_t keylen, u32 *protkeytype,
1011 if (keylen < sizeof(struct keytoken_header))
1018 if (ep11_check_aes_key_with_hdr(debug_info, 3, key, keylen, 1))
1024 if (ep11_check_ecc_key_with_hdr(debug_info, 3, key, keylen, 1))
1030 if (ep11_check_aes_key(debug_info, 3, key, keylen, 1))
1035 if (keylen != sizeof(struct secaeskeytoken))
1041 if (keylen < hdr->len || keylen > MAXCCAVLSCTOKENSIZE)
1052 if (keylen < sizeof(struct eccprivkeytoken))
1054 if (cca_check_sececckeytoken(debug_info, 3, key, keylen, 1))
1059 rc = pkey_nonccatok2pkey(key, keylen, &pkey);
1109 static void *_copy_key_from_user(void __user *ukey, size_t keylen)
1111 if (!ukey || keylen < MINKEYBLOBSIZE || keylen > KEYBLOBBUFSIZE)
1114 return memdup_user(ukey, keylen);
1269 kkey = _copy_key_from_user(ktp.key, ktp.keylen);
1272 rc = pkey_keyblob2pkey(kkey, ktp.keylen, &ktp.protkey);
1274 memzero_explicit(kkey, ktp.keylen);
1309 if (kgs.keylen < klen) {
1318 kgs.keylen = klen;
1351 if (kcs.keylen < klen) {
1360 kcs.keylen = klen;
1374 kkey = _copy_key_from_user(kvk.key, kvk.keylen);
1377 rc = pkey_verifykey2(kkey, kvk.keylen,
1399 kkey = _copy_key_from_user(ktp.key, ktp.keylen);
1405 kkey, ktp.keylen, &ktp.protkey);
1408 memzero_explicit(kkey, ktp.keylen);
1433 kkey = _copy_key_from_user(kak.key, kak.keylen);
1438 rc = pkey_apqns4key(kkey, kak.keylen, kak.flags,
1519 kkey = _copy_key_from_user(ktp.key, ktp.keylen);
1531 ktp.keylen, &ktp.pkeytype,
1535 memzero_explicit(kkey, ktp.keylen);