Lines Matching defs:token

44  * Simple check if the token is a valid CCA secure AES data key
45 * token. If keybitsize is given, the bitsize of the key is
49 const u8 *token, int keybitsize)
51 struct secaeskeytoken *t = (struct secaeskeytoken *)token;
57 DBF("%s token check failed, type 0x%02x != 0x%02x\n",
63 DBF("%s token check failed, version 0x%02x != 0x%02x\n",
69 DBF("%s token check failed, bitsize %d != %d\n",
81 * Simple check if the token is a valid CCA secure AES cipher key
82 * token. If keybitsize is given, the bitsize of the key is
88 const u8 *token, int keybitsize,
91 struct cipherkeytoken *t = (struct cipherkeytoken *)token;
98 DBF("%s token check failed, type 0x%02x != 0x%02x\n",
104 DBF("%s token check failed, version 0x%02x != 0x%02x\n",
110 DBF("%s token check failed, algtype 0x%02x != 0x02\n",
116 DBF("%s token check failed, keytype 0x%04x != 0x0001\n",
122 DBF("%s token check failed, unknown plfver 0x%02x\n",
128 DBF("%s token check failed, unknown wpllen %d\n",
152 DBF("%s token check failed, bitsize %d\n",
159 DBF("%s token check failed, XPRT_CPAC bit is 0\n",
171 * Simple check if the token is a valid CCA secure ECC private
172 * key token. Returns 0 on success or errno value on failure.
175 const u8 *token, size_t keysize,
178 struct eccprivkeytoken *t = (struct eccprivkeytoken *)token;
184 DBF("%s token check failed, type 0x%02x != 0x%02x\n",
190 DBF("%s token check failed, len %d > keysize %zu\n",
196 DBF("%s token check failed, secid 0x%02x != 0x20\n",
202 DBF("%s token check failed, XPRTCPAC bit is 0\n",
404 /* check length of the returned secure key token */
409 ZCRYPT_DBF_ERR("%s secure token size mismatch %d != %d bytes\n",
415 /* check secure key token */
423 /* copy the generated secure key token */
542 /* check length of the returned secure key token */
547 ZCRYPT_DBF_ERR("%s secure token size mismatch %d != %d bytes\n",
553 /* check secure key token */
561 /* copy the generated secure key token */
594 u8 token[]; /* cca secure key token */
640 memcpy(preqparm->lv2.token, seckey, SECKEYBLOBSIZE);
864 /* patch the skeleton key token export flags inside the kb block */
915 /* copy the generated vlsc key token */
984 u8 key_token[]; /* key token */
1074 /* copy the vlsc key token back */
1091 u8 *token;
1099 /* allocate space for the key token to build */
1100 token = kmalloc(MAXCCAVLSCTOKENSIZE, GFP_KERNEL);
1101 if (!token)
1104 /* prepare the token with the key skeleton */
1106 memcpy(token, aes_cipher_key_skeleton, tokensize);
1108 /* patch the skeleton key token export flags */
1110 t = (struct cipherkeytoken *)token;
1123 exorbuf, keybitsize, token, &tokensize);
1130 clrkey, keybitsize, token, &tokensize);
1137 exorbuf, keybitsize, token, &tokensize);
1144 NULL, keybitsize, token, &tokensize);
1151 /* copy the generated key token */
1156 memcpy(keybuf, token, tokensize);
1161 kfree(token);
1241 /* kb, cca token */
1404 /* kb, cca token */
1844 * Verification Pattern provided inside a secure key token.