Home
last modified time | relevance | path

Searched refs:blob_len (Results 1 – 11 of 11) sorted by relevance

/Linux-v5.4/fs/cifs/
Dsess.c288 int decode_ntlmssp_challenge(char *bcc_ptr, int blob_len, in decode_ntlmssp_challenge() argument
296 if (blob_len < sizeof(CHALLENGE_MESSAGE)) { in decode_ntlmssp_challenge()
297 cifs_dbg(VFS, "challenge blob len %d too small\n", blob_len); in decode_ntlmssp_challenge()
320 if (tioffset > blob_len || tioffset + tilen > blob_len) { in decode_ntlmssp_challenge()
1029 u16 blob_len; in sess_auth_kerberos() local
1117 blob_len = le16_to_cpu(pSMB->resp.SecurityBlobLength); in sess_auth_kerberos()
1118 if (blob_len > bytes_remaining) { in sess_auth_kerberos()
1120 blob_len); in sess_auth_kerberos()
1124 bcc_ptr += blob_len; in sess_auth_kerberos()
1125 bytes_remaining -= blob_len; in sess_auth_kerberos()
[all …]
Dntlmssp.h134 int decode_ntlmssp_challenge(char *bcc_ptr, int blob_len, struct cifs_ses *ses);
/Linux-v5.4/crypto/asymmetric_keys/
Dtpm_parser.c15 u32 blob_len; member
28 ctx->blob_len = vlen; in tpm_note_key()
48 return tpm_key_create(ctx.blob, ctx.blob_len); in tpm_parse()
Dasym_tpm.c319 tk->blob_len = 0; in asym_tpm_destroy()
544 tk->blob, tk->blob_len, &keyhandle); in tpm_key_decrypt()
693 tk->blob, tk->blob_len, &keyhandle); in tpm_key_sign()
832 uint32_t len = tk->blob_len; in extract_key_parameters()
914 struct tpm_key *tpm_key_create(const void *blob, uint32_t blob_len) in tpm_key_create() argument
934 tk->blob = kmemdup(blob, blob_len, GFP_KERNEL); in tpm_key_create()
938 tk->blob_len = blob_len; in tpm_key_create()
948 tk->blob_len = 0; in tpm_key_create()
/Linux-v5.4/include/crypto/
Dasym_tpm_subtype.h9 u32 blob_len; member
15 struct tpm_key *tpm_key_create(const void *blob, uint32_t blob_len);
/Linux-v5.4/drivers/char/tpm/
Dtpm2-cmd.c423 unsigned int blob_len; in tpm2_seal_trusted() local
494 blob_len = be32_to_cpup((__be32 *) &buf.data[TPM_HEADER_SIZE]); in tpm2_seal_trusted()
495 if (blob_len > MAX_BLOB_SIZE) { in tpm2_seal_trusted()
499 if (tpm_buf_length(&buf) < TPM_HEADER_SIZE + 4 + blob_len) { in tpm2_seal_trusted()
504 memcpy(payload->blob, &buf.data[TPM_HEADER_SIZE + 4], blob_len); in tpm2_seal_trusted()
505 payload->blob_len = blob_len; in tpm2_seal_trusted()
541 unsigned int blob_len; in tpm2_load_cmd() local
545 if (private_len > (payload->blob_len - 2)) in tpm2_load_cmd()
549 blob_len = private_len + public_len + 4; in tpm2_load_cmd()
550 if (blob_len > payload->blob_len) in tpm2_load_cmd()
[all …]
/Linux-v5.4/include/keys/
Dtrusted.h69 pr_info("trusted_key: bloblen %d\n", p->blob_len); in dump_payload()
71 16, 1, p->blob, p->blob_len, 0); in dump_payload()
Dtrusted-type.h23 unsigned int blob_len; member
/Linux-v5.4/security/keys/
Dtrusted.c684 p->key, p->key_len + 1, p->blob, &p->blob_len, in key_seal()
706 ret = tpm_unseal(tb, o->keyhandle, o->keyauth, p->blob, p->blob_len, in key_unseal()
898 p->blob_len = strlen(c) / 2; in datablob_parse()
899 if (p->blob_len > MAX_BLOB_SIZE) in datablob_parse()
901 ret = hex2bin(p->blob, c, p->blob_len); in datablob_parse()
1159 if (buffer && buflen >= 2 * p->blob_len) { in trusted_read()
1160 ascii_buf = kmalloc_array(2, p->blob_len, GFP_KERNEL); in trusted_read()
1165 for (i = 0; i < p->blob_len; i++) in trusted_read()
1167 if (copy_to_user(buffer, ascii_buf, 2 * p->blob_len) != 0) { in trusted_read()
1173 return 2 * p->blob_len; in trusted_read()
/Linux-v5.4/net/ceph/
Dauth_x_protocol.h13 __le32 blob_len; member
Dauth_x.c309 p = (void *)(msg_a + 1) + le32_to_cpu(msg_a->ticket_blob.blob_len); in encrypt_authorizer()
390 msg_a->ticket_blob.blob_len = cpu_to_le32(ticket_blob_len); in ceph_x_build_authorizer()