Lines Matching defs:keylen

292 static int pkey_ep11key2pkey(const u8 *key, size_t keylen,
308 ep11_kb_wkvp(key, keylen));
316 rc = ep11_kblob2protkey(card, dom, key, keylen,
521 u32 keylen;
526 keylen = 32;
529 keylen = 48;
532 keylen = 80;
535 keylen = 32;
538 keylen = 64;
546 if (t->len != keylen) {
566 static int pkey_nonccatok2pkey(const u8 *key, u32 keylen,
576 if (keylen != sizeof(struct protaeskeytoken))
590 if (keylen < sizeof(struct clearkeytoken) ||
591 keylen != sizeof(*t) + t->len)
617 rc = ep11_check_aes_key(pkey_dbf_info, 3, key, keylen, 1);
620 rc = pkey_ep11key2pkey(key, keylen,
627 3, key, keylen, 1);
630 rc = pkey_ep11key2pkey(key, keylen,
645 static int pkey_ccainttok2pkey(const u8 *key, u32 keylen,
652 if (keylen != sizeof(struct secaeskeytoken))
656 if (keylen < hdr->len || keylen > MAXCCAVLSCTOKENSIZE)
671 int pkey_keyblob2pkey(const u8 *key, u32 keylen,
677 if (keylen < sizeof(struct keytoken_header)) {
678 PKEY_DBF_ERR("%s invalid keylen %d\n", __func__, keylen);
684 rc = pkey_nonccatok2pkey(key, keylen,
688 rc = pkey_ccainttok2pkey(key, keylen,
829 static int pkey_verifykey2(const u8 *key, size_t keylen,
838 if (keylen < sizeof(struct keytoken_header))
913 rc = ep11_check_aes_key(pkey_dbf_info, 3, key, keylen, 1);
924 ep11_kb_wkvp(key, keylen));
940 3, key, keylen, 1);
951 ep11_kb_wkvp(key, keylen));
970 const u8 *key, size_t keylen,
980 if (keylen < sizeof(struct keytoken_header))
985 if (keylen != sizeof(struct secaeskeytoken))
990 if (keylen < hdr->len || keylen > MAXCCAVLSCTOKENSIZE)
1003 3, key, keylen, 1))
1007 3, key, keylen, 1))
1010 return pkey_nonccatok2pkey(key, keylen,
1036 rc = ep11_kblob2protkey(card, dom, key, keylen,
1047 static int pkey_apqns4key(const u8 *key, size_t keylen, u32 flags,
1054 if (keylen < sizeof(struct keytoken_header) || flags == 0)
1225 const u8 *key, size_t keylen,
1235 if (keylen < sizeof(struct keytoken_header))
1243 3, key, keylen, 1))
1250 3, key, keylen, 1))
1256 if (ep11_check_aes_key(pkey_dbf_info, 3, key, keylen, 1))
1261 if (keylen != sizeof(struct secaeskeytoken))
1267 if (keylen < hdr->len || keylen > MAXCCAVLSCTOKENSIZE)
1279 if (keylen < sizeof(struct eccprivkeytoken))
1281 if (cca_check_sececckeytoken(pkey_dbf_info, 3, key, keylen, 1))
1284 return pkey_nonccatok2pkey(key, keylen,
1331 static void *_copy_key_from_user(void __user *ukey, size_t keylen)
1333 if (!ukey || keylen < MINKEYBLOBBUFSIZE || keylen > KEYBLOBBUFSIZE)
1336 return memdup_user(ukey, keylen);
1499 kkey = _copy_key_from_user(ktp.key, ktp.keylen);
1503 rc = pkey_keyblob2pkey(kkey, ktp.keylen, ktp.protkey.protkey,
1506 memzero_explicit(kkey, ktp.keylen);
1541 if (kgs.keylen < klen) {
1550 kgs.keylen = klen;
1583 if (kcs.keylen < klen) {
1592 kcs.keylen = klen;
1606 kkey = _copy_key_from_user(kvk.key, kvk.keylen);
1609 rc = pkey_verifykey2(kkey, kvk.keylen,
1631 kkey = _copy_key_from_user(ktp.key, ktp.keylen);
1638 kkey, ktp.keylen,
1643 memzero_explicit(kkey, ktp.keylen);
1668 kkey = _copy_key_from_user(kak.key, kak.keylen);
1673 rc = pkey_apqns4key(kkey, kak.keylen, kak.flags,
1754 kkey = _copy_key_from_user(ktp.key, ktp.keylen);
1766 kkey, ktp.keylen,
1770 memzero_explicit(kkey, ktp.keylen);