Lines Matching defs:keylen
293 static int pkey_ep11key2pkey(const u8 *key, size_t keylen,
306 ep11_kb_wkvp(key, keylen));
314 rc = ep11_kblob2protkey(card, dom, key, keylen,
519 u32 keylen;
524 keylen = 32;
527 keylen = 48;
530 keylen = 80;
533 keylen = 32;
536 keylen = 64;
544 if (t->len != keylen) {
564 static int pkey_nonccatok2pkey(const u8 *key, u32 keylen,
574 if (keylen != sizeof(struct protaeskeytoken))
588 if (keylen < sizeof(struct clearkeytoken) ||
589 keylen != sizeof(*t) + t->len)
615 rc = ep11_check_aes_key(debug_info, 3, key, keylen, 1);
618 rc = pkey_ep11key2pkey(key, keylen,
624 rc = ep11_check_aes_key_with_hdr(debug_info, 3, key, keylen, 1);
627 rc = pkey_ep11key2pkey(key, keylen,
642 static int pkey_ccainttok2pkey(const u8 *key, u32 keylen,
649 if (keylen != sizeof(struct secaeskeytoken))
653 if (keylen < hdr->len || keylen > MAXCCAVLSCTOKENSIZE)
668 int pkey_keyblob2pkey(const u8 *key, u32 keylen,
674 if (keylen < sizeof(struct keytoken_header)) {
675 DEBUG_ERR("%s invalid keylen %d\n", __func__, keylen);
681 rc = pkey_nonccatok2pkey(key, keylen,
685 rc = pkey_ccainttok2pkey(key, keylen,
826 static int pkey_verifykey2(const u8 *key, size_t keylen,
835 if (keylen < sizeof(struct keytoken_header))
910 rc = ep11_check_aes_key(debug_info, 3, key, keylen, 1);
921 ep11_kb_wkvp(key, keylen));
937 key, keylen, 1);
948 ep11_kb_wkvp(key, keylen));
967 const u8 *key, size_t keylen,
977 if (keylen < sizeof(struct keytoken_header))
982 if (keylen != sizeof(struct secaeskeytoken))
987 if (keylen < hdr->len || keylen > MAXCCAVLSCTOKENSIZE)
998 if (ep11_check_aes_key(debug_info, 3, key, keylen, 1))
1002 key, keylen, 1))
1005 return pkey_nonccatok2pkey(key, keylen,
1031 rc = ep11_kblob2protkey(card, dom, key, keylen,
1042 static int pkey_apqns4key(const u8 *key, size_t keylen, u32 flags,
1049 if (keylen < sizeof(struct keytoken_header) || flags == 0)
1220 const u8 *key, size_t keylen,
1230 if (keylen < sizeof(struct keytoken_header))
1237 if (ep11_check_aes_key_with_hdr(debug_info, 3, key, keylen, 1))
1243 if (ep11_check_ecc_key_with_hdr(debug_info, 3, key, keylen, 1))
1249 if (ep11_check_aes_key(debug_info, 3, key, keylen, 1))
1254 if (keylen != sizeof(struct secaeskeytoken))
1260 if (keylen < hdr->len || keylen > MAXCCAVLSCTOKENSIZE)
1271 if (keylen < sizeof(struct eccprivkeytoken))
1273 if (cca_check_sececckeytoken(debug_info, 3, key, keylen, 1))
1276 return pkey_nonccatok2pkey(key, keylen,
1323 static void *_copy_key_from_user(void __user *ukey, size_t keylen)
1325 if (!ukey || keylen < MINKEYBLOBBUFSIZE || keylen > KEYBLOBBUFSIZE)
1328 return memdup_user(ukey, keylen);
1491 kkey = _copy_key_from_user(ktp.key, ktp.keylen);
1495 rc = pkey_keyblob2pkey(kkey, ktp.keylen, ktp.protkey.protkey,
1498 memzero_explicit(kkey, ktp.keylen);
1533 if (kgs.keylen < klen) {
1542 kgs.keylen = klen;
1575 if (kcs.keylen < klen) {
1584 kcs.keylen = klen;
1598 kkey = _copy_key_from_user(kvk.key, kvk.keylen);
1601 rc = pkey_verifykey2(kkey, kvk.keylen,
1623 kkey = _copy_key_from_user(ktp.key, ktp.keylen);
1630 kkey, ktp.keylen,
1635 memzero_explicit(kkey, ktp.keylen);
1660 kkey = _copy_key_from_user(kak.key, kak.keylen);
1665 rc = pkey_apqns4key(kkey, kak.keylen, kak.flags,
1746 kkey = _copy_key_from_user(ktp.key, ktp.keylen);
1758 kkey, ktp.keylen,
1762 memzero_explicit(kkey, ktp.keylen);