Home
last modified time | relevance | path

Searched refs:blob_len (Results 1 – 15 of 15) sorted by relevance

/Linux-v6.1/security/keys/trusted-keys/
Dtrusted_tpm2.c107 payload->blob_len); in tpm2_key_decode()
231 int blob_len = 0; in tpm2_seal_trusted() local
315 blob_len = be32_to_cpup((__be32 *) &buf.data[TPM_HEADER_SIZE]); in tpm2_seal_trusted()
316 if (blob_len > MAX_BLOB_SIZE) { in tpm2_seal_trusted()
320 if (tpm_buf_length(&buf) < TPM_HEADER_SIZE + 4 + blob_len) { in tpm2_seal_trusted()
325 blob_len = tpm2_key_encode(payload, options, in tpm2_seal_trusted()
327 blob_len); in tpm2_seal_trusted()
338 if (blob_len < 0) in tpm2_seal_trusted()
339 rc = blob_len; in tpm2_seal_trusted()
341 payload->blob_len = blob_len; in tpm2_seal_trusted()
[all …]
Dtrusted_core.c104 p->blob_len = strlen(c) / 2; in datablob_parse()
105 if (p->blob_len > MAX_BLOB_SIZE) in datablob_parse()
107 ret = hex2bin(p->blob, c, p->blob_len); in datablob_parse()
298 if (buffer && buflen >= 2 * p->blob_len) { in trusted_read()
300 for (i = 0; i < p->blob_len; i++) in trusted_read()
303 return 2 * p->blob_len; in trusted_read()
Dtrusted_caam.c32 p->blob_len = info.output_len; in trusted_caam_seal()
40 .input = p->blob, .input_len = p->blob_len, in trusted_caam_unseal()
Dtrusted_tee.c107 p->blob_len = param[1].u.memref.size; in trusted_tee_seal()
133 p->blob_len); in trusted_tee_unseal()
153 param[0].u.memref.size = p->blob_len; in trusted_tee_unseal()
Dtrusted_tpm1.c675 p->key, p->key_len + 1, p->blob, &p->blob_len, in key_seal()
697 ret = tpm_unseal(&tb, o->keyhandle, o->keyauth, p->blob, p->blob_len, in key_unseal()
/Linux-v6.1/include/keys/
Dtrusted-type.h29 unsigned int blob_len; member
89 pr_info("bloblen %d\n", p->blob_len); in dump_payload()
91 16, 1, p->blob, p->blob_len, 0); in dump_payload()
/Linux-v6.1/fs/cifs/
Dsess.c754 int decode_ntlmssp_challenge(char *bcc_ptr, int blob_len, in decode_ntlmssp_challenge() argument
762 if (blob_len < sizeof(CHALLENGE_MESSAGE)) { in decode_ntlmssp_challenge()
763 cifs_dbg(VFS, "challenge blob len %d too small\n", blob_len); in decode_ntlmssp_challenge()
811 if (tioffset > blob_len || tioffset + tilen > blob_len) { in decode_ntlmssp_challenge()
1399 u16 blob_len; in sess_auth_kerberos() local
1485 blob_len = le16_to_cpu(pSMB->resp.SecurityBlobLength); in sess_auth_kerberos()
1486 if (blob_len > bytes_remaining) { in sess_auth_kerberos()
1488 blob_len); in sess_auth_kerberos()
1492 bcc_ptr += blob_len; in sess_auth_kerberos()
1493 bytes_remaining -= blob_len; in sess_auth_kerberos()
[all …]
Dntlmssp.h145 int decode_ntlmssp_challenge(char *bcc_ptr, int blob_len, struct cifs_ses *ses);
/Linux-v6.1/fs/ksmbd/
Dauth.c300 int blob_len, struct ksmbd_conn *conn, in ksmbd_decode_ntlmssp_auth_blob() argument
308 if (blob_len < sizeof(struct authenticate_message)) { in ksmbd_decode_ntlmssp_auth_blob()
310 blob_len); in ksmbd_decode_ntlmssp_auth_blob()
325 if (blob_len < (u64)dn_off + dn_len || blob_len < (u64)nt_off + nt_len) in ksmbd_decode_ntlmssp_auth_blob()
351 if (blob_len < (u64)sess_key_off + sess_key_len) in ksmbd_decode_ntlmssp_auth_blob()
377 int blob_len, struct ksmbd_conn *conn) in ksmbd_decode_ntlmssp_neg_blob() argument
379 if (blob_len < sizeof(struct negotiate_message)) { in ksmbd_decode_ntlmssp_neg_blob()
381 blob_len); in ksmbd_decode_ntlmssp_neg_blob()
410 unsigned int flags, blob_off, blob_len, type, target_info_len = 0; in ksmbd_build_ntlmssp_challenge_blob() local
459 blob_len = blob_off + uni_len; in ksmbd_build_ntlmssp_challenge_blob()
[all …]
Dauth.h46 int blob_len, struct ksmbd_conn *conn,
49 int blob_len, struct ksmbd_conn *conn);
Dtransport_ipc.h32 ksmbd_ipc_spnego_authen_request(const char *spnego_blob, int blob_len);
Dtransport_ipc.c524 ksmbd_ipc_spnego_authen_request(const char *spnego_blob, int blob_len) in ksmbd_ipc_spnego_authen_request() argument
531 blob_len + 1); in ksmbd_ipc_spnego_authen_request()
538 req->spnego_blob_len = blob_len; in ksmbd_ipc_spnego_authen_request()
539 memcpy(req->spnego_blob, spnego_blob, blob_len); in ksmbd_ipc_spnego_authen_request()
/Linux-v6.1/net/ceph/
Dauth_x_protocol.h13 __le32 blob_len; member
Dmon_client.c75 int blob_len; in ceph_monmap_decode() local
82 ceph_decode_32_safe(p, end, blob_len, e_inval); in ceph_monmap_decode()
83 ceph_decode_need(p, end, blob_len, e_inval); in ceph_monmap_decode()
Dauth_x.c312 p = (void *)(msg_a + 1) + le32_to_cpu(msg_a->ticket_blob.blob_len); in encrypt_authorizer()
394 msg_a->ticket_blob.blob_len = cpu_to_le32(ticket_blob_len); in ceph_x_build_authorizer()