• Home
  • Raw
  • Download

Lines Matching +full:2 +full:kb

237 	cprbmem = kcalloc(2, cprbplusparamblen, GFP_KERNEL);  in alloc_and_prep_cprbmem()
247 memcpy(preqcblk->func_id, "T2", 2); in alloc_and_prep_cprbmem()
272 memzero_explicit(mem, 2 * (sizeof(struct CPRBX) + paramblen)); in free_cprbmem()
306 u8 subfunc_code[2]; in cca_genseckey()
325 u8 subfunc_code[2]; in cca_genseckey()
339 /* get already prepared memory for 2 cprbs with param block each */ in cca_genseckey()
349 memcpy(preqparm->subfunc_code, "KG", 2); in cca_genseckey()
379 preqparm->lv2.keyid[i].attr = (i == 2 ? 0x30 : 0x10); in cca_genseckey()
448 u8 subfunc_code[2]; in cca_clr2seckey()
466 u8 subfunc_code[2]; in cca_clr2seckey()
480 /* get already prepared memory for 2 cprbs with param block each */ in cca_clr2seckey()
490 memcpy(preqparm->subfunc_code, "CM", 2); in cca_clr2seckey()
588 u8 subfunc_code[2]; in cca_sec2protkey()
603 u8 subfunc_code[2]; in cca_sec2protkey()
611 u8 flags[2]; in cca_sec2protkey()
626 /* get already prepared memory for 2 cprbs with param block each */ in cca_sec2protkey()
636 memcpy(preqparm->subfunc_code, "US", 2); in cca_sec2protkey()
749 u8 subfunc_code[2]; in cca_gencipherkey()
751 char rule_array[2*8]; in cca_gencipherkey()
798 } kb; in cca_gencipherkey() member
801 u8 subfunc_code[2]; in cca_gencipherkey()
813 } kb; in cca_gencipherkey() member
817 /* get already prepared memory for 2 cprbs with param block each */ in cca_gencipherkey()
828 memcpy(preqparm->subfunc_code, "GK", 2); in cca_gencipherkey()
829 preqparm->rule_array_len = sizeof(uint16_t) + 2 * 8; in cca_gencipherkey()
830 memcpy(preqparm->rule_array, "AES OP ", 2*8); in cca_gencipherkey()
850 /* prepare kb block */ in cca_gencipherkey()
851 preqparm->kb.len = sizeof(preqparm->kb); in cca_gencipherkey()
852 preqparm->kb.tlv1.len = sizeof(preqparm->kb.tlv1); in cca_gencipherkey()
853 preqparm->kb.tlv1.flag = 0x0030; in cca_gencipherkey()
854 preqparm->kb.tlv2.len = sizeof(preqparm->kb.tlv2); in cca_gencipherkey()
855 preqparm->kb.tlv2.flag = 0x0030; in cca_gencipherkey()
856 preqparm->kb.tlv3.len = sizeof(preqparm->kb.tlv3); in cca_gencipherkey()
857 preqparm->kb.tlv3.flag = 0x0030; in cca_gencipherkey()
858 memcpy(preqparm->kb.tlv3.gen_key_id_1, in cca_gencipherkey()
860 preqparm->kb.tlv4.len = sizeof(preqparm->kb.tlv4); in cca_gencipherkey()
861 preqparm->kb.tlv4.flag = 0x0030; in cca_gencipherkey()
862 preqparm->kb.tlv5.len = sizeof(preqparm->kb.tlv5); in cca_gencipherkey()
863 preqparm->kb.tlv5.flag = 0x0030; in cca_gencipherkey()
864 preqparm->kb.tlv6.len = sizeof(preqparm->kb.tlv6); in cca_gencipherkey()
865 preqparm->kb.tlv6.flag = 0x0030; in cca_gencipherkey()
867 /* patch the skeleton key token export flags inside the kb block */ in cca_gencipherkey()
869 t = (struct cipherkeytoken *) preqparm->kb.tlv3.gen_key_id_1; in cca_gencipherkey()
903 if (prepparm->kb.len < 120 + 5 * sizeof(uint16_t) || in cca_gencipherkey()
904 prepparm->kb.len > 136 + 5 * sizeof(uint16_t)) { in cca_gencipherkey()
913 prepparm->kb.tlv1.gen_key, in cca_gencipherkey()
921 t = (struct cipherkeytoken *) prepparm->kb.tlv1.gen_key; in cca_gencipherkey()
953 u8 subfunc_code[2]; in _ip_cprb_helper()
979 u8 subfunc_code[2]; in _ip_cprb_helper()
991 } kb; in _ip_cprb_helper() member
996 /* get already prepared memory for 2 cprbs with param block each */ in _ip_cprb_helper()
1007 memcpy(preq_ra_block->subfunc_code, "IP", 2); in _ip_cprb_helper()
1008 preq_ra_block->rule_array_len = sizeof(uint16_t) + 2 * 8; in _ip_cprb_helper()
1011 preqcblk->req_parml = sizeof(struct rule_array_block) + 2 * 8; in _ip_cprb_helper()
1071 if (prepparm->kb.len < 120 + 3 * sizeof(uint16_t) || in _ip_cprb_helper()
1072 prepparm->kb.len > 136 + 3 * sizeof(uint16_t)) { in _ip_cprb_helper()
1082 t = (struct cipherkeytoken *) prepparm->kb.tlv1.key_token; in _ip_cprb_helper()
1125 * 2/4 EXOR the clear key in cca_clr2cipherkey()
1141 "%s clear key import 2/4 with CSNBKPI2 failed, rc=%d\n", in cca_clr2cipherkey()
1188 u8 subfunc_code[2]; in cca_cipher2protkey()
1202 } kb; in cca_cipher2protkey() member
1205 u8 subfunc_code[2]; in cca_cipher2protkey()
1213 u8 flags[2]; in cca_cipher2protkey()
1228 } kb; in cca_cipher2protkey() member
1232 /* get already prepared memory for 2 cprbs with param block each */ in cca_cipher2protkey()
1242 memcpy(preqparm->subfunc_code, "AU", 2); in cca_cipher2protkey()
1250 + 2 * sizeof(uint16_t); in cca_cipher2protkey()
1252 /* kb, cca token */ in cca_cipher2protkey()
1253 preqparm->kb.len = keytoklen + 3 * sizeof(uint16_t); in cca_cipher2protkey()
1254 preqparm->kb.cca_key_token_len = keytoklen + 2 * sizeof(uint16_t); in cca_cipher2protkey()
1255 memcpy(preqparm->kb.cca_key_token, ckey, keytoklen); in cca_cipher2protkey()
1354 u8 subfunc_code[2]; in cca_ecc2protkey()
1368 } kb; in cca_ecc2protkey() member
1371 u8 subfunc_code[2]; in cca_ecc2protkey()
1379 u8 flags[2]; in cca_ecc2protkey()
1394 } kb; in cca_ecc2protkey() member
1398 /* get already prepared memory for 2 cprbs with param block each */ in cca_ecc2protkey()
1408 memcpy(preqparm->subfunc_code, "AU", 2); in cca_ecc2protkey()
1416 + 2 * sizeof(uint16_t); in cca_ecc2protkey()
1418 /* kb, cca token */ in cca_ecc2protkey()
1419 preqparm->kb.len = keylen + 3 * sizeof(uint16_t); in cca_ecc2protkey()
1420 preqparm->kb.cca_key_token_len = keylen + 2 * sizeof(uint16_t); in cca_ecc2protkey()
1421 memcpy(preqparm->kb.cca_key_token, key, keylen); in cca_ecc2protkey()
1507 u8 subfunc_code[2]; in cca_query_crypto_facility()
1518 u8 subfunc_code[2]; in cca_query_crypto_facility()
1522 /* get already prepared memory for 2 cprbs with param block each */ in cca_query_crypto_facility()
1532 memcpy(preqparm->subfunc_code, "FQ", 2); in cca_query_crypto_facility()
1694 varray = pg + PAGE_SIZE/2; in fetch_cca_info()
1695 rlen = vlen = PAGE_SIZE/2; in fetch_cca_info()
1705 if (ci->old_aes_mk_state == '2') in fetch_cca_info()
1707 if (ci->cur_aes_mk_state == '2') in fetch_cca_info()
1715 rlen = vlen = PAGE_SIZE/2; in fetch_cca_info()
1722 if (ci->old_apka_mk_state == '2') in fetch_cca_info()
1724 if (ci->cur_apka_mk_state == '2') in fetch_cca_info()
1733 return found == 2 ? 0 : -ENOENT; in fetch_cca_info()
1787 ci.cur_aes_mk_state == '2' && in findcard()
1795 ci.cur_aes_mk_state == '2' && in findcard()
1818 ci.cur_aes_mk_state == '2' && in findcard()
1822 ci.old_aes_mk_state == '2' && in findcard()
1920 if (mktype == AES_MK_SET && ci.cur_aes_mk_state != '2') in cca_findcard2()
1922 if (mktype == APKA_MK_SET && ci.cur_apka_mk_state != '2') in cca_findcard2()
1933 if (old_mkvp && ci.old_aes_mk_state == '2' && in cca_findcard2()
1939 if (old_mkvp && ci.old_apka_mk_state == '2' && in cca_findcard2()