Searched refs:blob_len (Results 1 – 8 of 8) sorted by relevance
/Linux-v4.19/fs/cifs/ |
D | sess.c | 280 int decode_ntlmssp_challenge(char *bcc_ptr, int blob_len, in decode_ntlmssp_challenge() argument 288 if (blob_len < sizeof(CHALLENGE_MESSAGE)) { in decode_ntlmssp_challenge() 289 cifs_dbg(VFS, "challenge blob len %d too small\n", blob_len); in decode_ntlmssp_challenge() 312 if (tioffset > blob_len || tioffset + tilen > blob_len) { in decode_ntlmssp_challenge() 1022 u16 blob_len; in sess_auth_kerberos() local 1110 blob_len = le16_to_cpu(pSMB->resp.SecurityBlobLength); in sess_auth_kerberos() 1111 if (blob_len > bytes_remaining) { in sess_auth_kerberos() 1113 blob_len); in sess_auth_kerberos() 1117 bcc_ptr += blob_len; in sess_auth_kerberos() 1118 bytes_remaining -= blob_len; in sess_auth_kerberos() [all …]
|
D | ntlmssp.h | 134 int decode_ntlmssp_challenge(char *bcc_ptr, int blob_len, struct cifs_ses *ses);
|
/Linux-v4.19/drivers/char/tpm/ |
D | tpm2-cmd.c | 422 unsigned int blob_len; in tpm2_seal_trusted() local 494 blob_len = be32_to_cpup((__be32 *) &buf.data[TPM_HEADER_SIZE]); in tpm2_seal_trusted() 495 if (blob_len > MAX_BLOB_SIZE) { in tpm2_seal_trusted() 499 if (tpm_buf_length(&buf) < TPM_HEADER_SIZE + 4 + blob_len) { in tpm2_seal_trusted() 504 memcpy(payload->blob, &buf.data[TPM_HEADER_SIZE + 4], blob_len); in tpm2_seal_trusted() 505 payload->blob_len = blob_len; in tpm2_seal_trusted() 542 unsigned int blob_len; in tpm2_load_cmd() local 546 if (private_len > (payload->blob_len - 2)) in tpm2_load_cmd() 550 blob_len = private_len + public_len + 4; in tpm2_load_cmd() 551 if (blob_len > payload->blob_len) in tpm2_load_cmd() [all …]
|
/Linux-v4.19/security/keys/ |
D | trusted.h | 57 pr_info("trusted_key: bloblen %d\n", p->blob_len); in dump_payload() 59 16, 1, p->blob, p->blob_len, 0); in dump_payload()
|
D | trusted.c | 675 p->key, p->key_len + 1, p->blob, &p->blob_len, in key_seal() 697 ret = tpm_unseal(tb, o->keyhandle, o->keyauth, p->blob, p->blob_len, in key_unseal() 889 p->blob_len = strlen(c) / 2; in datablob_parse() 890 if (p->blob_len > MAX_BLOB_SIZE) in datablob_parse() 892 ret = hex2bin(p->blob, c, p->blob_len); in datablob_parse() 1150 if (buffer && buflen >= 2 * p->blob_len) { in trusted_read() 1151 ascii_buf = kmalloc_array(2, p->blob_len, GFP_KERNEL); in trusted_read() 1156 for (i = 0; i < p->blob_len; i++) in trusted_read() 1158 if (copy_to_user(buffer, ascii_buf, 2 * p->blob_len) != 0) { in trusted_read() 1164 return 2 * p->blob_len; in trusted_read()
|
/Linux-v4.19/include/keys/ |
D | trusted-type.h | 26 unsigned int blob_len; member
|
/Linux-v4.19/net/ceph/ |
D | auth_x_protocol.h | 13 __le32 blob_len; member
|
D | auth_x.c | 309 p = (void *)(msg_a + 1) + le32_to_cpu(msg_a->ticket_blob.blob_len); in encrypt_authorizer() 390 msg_a->ticket_blob.blob_len = cpu_to_le32(ticket_blob_len); in ceph_x_build_authorizer()
|