Searched refs:blob_len (Results  1 – 11 of 11) sorted by relevance
| /Linux-v5.4/fs/cifs/ | 
| D | sess.c | 288 int decode_ntlmssp_challenge(char *bcc_ptr, int blob_len,  in decode_ntlmssp_challenge()  argument296 	if (blob_len < sizeof(CHALLENGE_MESSAGE)) {  in decode_ntlmssp_challenge()
 297 		cifs_dbg(VFS, "challenge blob len %d too small\n", blob_len);  in decode_ntlmssp_challenge()
 320 	if (tioffset > blob_len || tioffset + tilen > blob_len) {  in decode_ntlmssp_challenge()
 1029 	u16 blob_len;  in sess_auth_kerberos()  local
 1117 	blob_len = le16_to_cpu(pSMB->resp.SecurityBlobLength);  in sess_auth_kerberos()
 1118 	if (blob_len > bytes_remaining) {  in sess_auth_kerberos()
 1120 				blob_len);  in sess_auth_kerberos()
 1124 	bcc_ptr += blob_len;  in sess_auth_kerberos()
 1125 	bytes_remaining -= blob_len;  in sess_auth_kerberos()
 [all …]
 
 | 
| D | ntlmssp.h | 134 int decode_ntlmssp_challenge(char *bcc_ptr, int blob_len, struct cifs_ses *ses);
 | 
| /Linux-v5.4/crypto/asymmetric_keys/ | 
| D | tpm_parser.c | 15 	u32		blob_len;  member28 	ctx->blob_len = vlen;  in tpm_note_key()
 48 	return tpm_key_create(ctx.blob, ctx.blob_len);  in tpm_parse()
 
 | 
| D | asym_tpm.c | 319 	tk->blob_len = 0;  in asym_tpm_destroy()544 				tk->blob, tk->blob_len, &keyhandle);  in tpm_key_decrypt()
 693 			 tk->blob, tk->blob_len, &keyhandle);  in tpm_key_sign()
 832 	uint32_t len = tk->blob_len;  in extract_key_parameters()
 914 struct tpm_key *tpm_key_create(const void *blob, uint32_t blob_len)  in tpm_key_create()  argument
 934 	tk->blob = kmemdup(blob, blob_len, GFP_KERNEL);  in tpm_key_create()
 938 	tk->blob_len = blob_len;  in tpm_key_create()
 948 	tk->blob_len = 0;  in tpm_key_create()
 
 | 
| /Linux-v5.4/include/crypto/ | 
| D | asym_tpm_subtype.h | 9 	u32 blob_len;  member15 struct tpm_key *tpm_key_create(const void *blob, uint32_t blob_len);
 
 | 
| /Linux-v5.4/drivers/char/tpm/ | 
| D | tpm2-cmd.c | 423 	unsigned int blob_len;  in tpm2_seal_trusted()  local494 	blob_len = be32_to_cpup((__be32 *) &buf.data[TPM_HEADER_SIZE]);  in tpm2_seal_trusted()
 495 	if (blob_len > MAX_BLOB_SIZE) {  in tpm2_seal_trusted()
 499 	if (tpm_buf_length(&buf) < TPM_HEADER_SIZE + 4 + blob_len) {  in tpm2_seal_trusted()
 504 	memcpy(payload->blob, &buf.data[TPM_HEADER_SIZE + 4], blob_len);  in tpm2_seal_trusted()
 505 	payload->blob_len = blob_len;  in tpm2_seal_trusted()
 541 	unsigned int blob_len;  in tpm2_load_cmd()  local
 545 	if (private_len > (payload->blob_len - 2))  in tpm2_load_cmd()
 549 	blob_len = private_len + public_len + 4;  in tpm2_load_cmd()
 550 	if (blob_len > payload->blob_len)  in tpm2_load_cmd()
 [all …]
 
 | 
| /Linux-v5.4/include/keys/ | 
| D | trusted.h | 69 	pr_info("trusted_key: bloblen %d\n", p->blob_len);  in dump_payload()71 		       16, 1, p->blob, p->blob_len, 0);  in dump_payload()
 
 | 
| D | trusted-type.h | 23 	unsigned int blob_len;  member
 | 
| /Linux-v5.4/security/keys/ | 
| D | trusted.c | 684 		       p->key, p->key_len + 1, p->blob, &p->blob_len,  in key_seal()706 	ret = tpm_unseal(tb, o->keyhandle, o->keyauth, p->blob, p->blob_len,  in key_unseal()
 898 		p->blob_len = strlen(c) / 2;  in datablob_parse()
 899 		if (p->blob_len > MAX_BLOB_SIZE)  in datablob_parse()
 901 		ret = hex2bin(p->blob, c, p->blob_len);  in datablob_parse()
 1159 	if (buffer && buflen >= 2 * p->blob_len) {  in trusted_read()
 1160 		ascii_buf = kmalloc_array(2, p->blob_len, GFP_KERNEL);  in trusted_read()
 1165 		for (i = 0; i < p->blob_len; i++)  in trusted_read()
 1167 		if (copy_to_user(buffer, ascii_buf, 2 * p->blob_len) != 0) {  in trusted_read()
 1173 	return 2 * p->blob_len;  in trusted_read()
 
 | 
| /Linux-v5.4/net/ceph/ | 
| D | auth_x_protocol.h | 13 	__le32 blob_len;  member
 | 
| D | auth_x.c | 309 	p = (void *)(msg_a + 1) + le32_to_cpu(msg_a->ticket_blob.blob_len);  in encrypt_authorizer()390 	msg_a->ticket_blob.blob_len = cpu_to_le32(ticket_blob_len);  in ceph_x_build_authorizer()
 
 |