Lines Matching defs:protkey

72 	u32 len;      /* bytes actually stored in protkey[] */
73 u8 protkey[MAXPROTKEYSIZE]; /* the protected key blob */
106 u8 *protkey, u32 *protkeylen, u32 *protkeytype)
198 memcpy(protkey, paramblock, *protkeylen);
207 static int pkey_skey2pkey(const u8 *key, u8 *protkey,
232 protkey, protkeylen, protkeytype);
236 protkey, protkeylen,
294 u8 *protkey, u32 *protkeylen, u32 *protkeytype)
315 protkey, protkeylen, protkeytype);
373 static int pkey_genprotkey(u32 keytype, u8 *protkey,
392 protkey, protkeylen, protkeytype);
397 get_random_bytes(protkey, keysize);
405 static int pkey_verifyprotkey(const u8 *protkey, u32 protkeylen,
444 memcpy(param.key, protkey, protkeylen);
458 u8 *protkey, u32 *protkeylen, u32 *protkeytype)
479 protkey, protkeylen, protkeytype);
492 protkey, protkeylen, protkeytype);
503 protkey, protkeylen, protkeytype);
517 u8 *protkey, u32 *protkeylen, u32 *protkeytype)
552 protkey, protkeylen, protkeytype);
565 u8 *protkey, u32 *protkeylen, u32 *protkeytype)
577 rc = pkey_verifyprotkey(t->protkey, t->len, t->keytype);
580 memcpy(protkey, t->protkey, t->len);
595 rc = nonccatokaes2pkey(t, protkey,
603 rc = nonccatokecc2pkey(t, protkey,
619 protkey, protkeylen, protkeytype);
628 protkey, protkeylen, protkeytype);
643 u8 *protkey, u32 *protkeylen, u32 *protkeytype)
662 return pkey_skey2pkey(key, protkey, protkeylen, protkeytype);
669 u8 *protkey, u32 *protkeylen, u32 *protkeytype)
682 protkey, protkeylen, protkeytype);
686 protkey, protkeylen, protkeytype);
968 u8 *protkey, u32 *protkeylen, u32 *protkeytype)
1006 protkey, protkeylen,
1024 protkey, protkeylen, protkeytype);
1028 protkey, protkeylen,
1032 protkey, protkeylen,
1221 u8 *protkey, u32 *protkeylen, u32 *protkeytype)
1277 protkey, protkeylen, protkeytype);
1293 protkey, protkeylen,
1299 protkey, protkeylen,
1303 rc = cca_sec2protkey(card, dom, key, protkey,
1307 rc = cca_cipher2protkey(card, dom, key, protkey,
1310 rc = cca_ecc2protkey(card, dom, key, protkey,
1382 ksp.protkey.len = sizeof(ksp.protkey.protkey);
1384 ksp.seckey.seckey, ksp.protkey.protkey,
1385 &ksp.protkey.len, &ksp.protkey.type);
1399 kcp.protkey.len = sizeof(kcp.protkey.protkey);
1401 kcp.protkey.protkey,
1402 &kcp.protkey.len, &kcp.protkey.type);
1432 ksp.protkey.len = sizeof(ksp.protkey.protkey);
1433 rc = pkey_skey2pkey(ksp.seckey.seckey, ksp.protkey.protkey,
1434 &ksp.protkey.len, &ksp.protkey.type);
1463 kgp.protkey.len = sizeof(kgp.protkey.protkey);
1464 rc = pkey_genprotkey(kgp.keytype, kgp.protkey.protkey,
1465 &kgp.protkey.len, &kgp.protkey.type);
1479 rc = pkey_verifyprotkey(kvp.protkey.protkey,
1480 kvp.protkey.len, kvp.protkey.type);
1494 ktp.protkey.len = sizeof(ktp.protkey.protkey);
1495 rc = pkey_keyblob2pkey(kkey, ktp.keylen, ktp.protkey.protkey,
1496 &ktp.protkey.len, &ktp.protkey.type);
1628 ktp.protkey.len = sizeof(ktp.protkey.protkey);
1631 ktp.protkey.protkey, &ktp.protkey.len,
1632 &ktp.protkey.type);
1739 u8 *kkey, *protkey;
1751 protkey = kmalloc(protkeylen, GFP_KERNEL);
1752 if (!protkey) {
1759 protkey, &protkeylen, &ktp.pkeytype);
1765 kfree(protkey);
1770 kfree(protkey);
1773 if (copy_to_user(ktp.pkey, protkey, protkeylen)) {
1774 kfree(protkey);
1778 kfree(protkey);
1806 struct pkey_protkey protkey;
1820 protkey.len = sizeof(protkey.protkey);
1822 protkey.protkey, &protkey.len, &protkey.type);
1826 protkeytoken.len = protkey.len;
1827 memcpy(&protkeytoken.protkey, &protkey.protkey, protkey.len);
1832 /* xts needs a second protected key, reuse protkey struct */
1833 protkey.len = sizeof(protkey.protkey);
1835 protkey.protkey, &protkey.len, &protkey.type);
1839 protkeytoken.len = protkey.len;
1840 memcpy(&protkeytoken.protkey, &protkey.protkey, protkey.len);
1917 .name = "protkey",