Home
last modified time | relevance | path

Searched refs:blob_len (Results 1 – 17 of 17) sorted by relevance

/linux/security/keys/trusted-keys/
A Dtrusted_tpm2.c107 payload->blob_len); in tpm2_key_decode()
231 int blob_len = 0; in tpm2_seal_trusted() local
316 if (blob_len > MAX_BLOB_SIZE) { in tpm2_seal_trusted()
327 blob_len); in tpm2_seal_trusted()
338 if (blob_len < 0) in tpm2_seal_trusted()
339 rc = blob_len; in tpm2_seal_trusted()
341 payload->blob_len = blob_len; in tpm2_seal_trusted()
368 unsigned int blob_len; in tpm2_load_cmd() local
385 if (payload->blob_len < 4) in tpm2_load_cmd()
409 if (blob_len > payload->blob_len) in tpm2_load_cmd()
[all …]
A Dtrusted_core.c95 p->blob_len = strlen(c) / 2; in datablob_parse()
96 if (p->blob_len > MAX_BLOB_SIZE) in datablob_parse()
98 ret = hex2bin(p->blob, c, p->blob_len); in datablob_parse()
289 if (buffer && buflen >= 2 * p->blob_len) { in trusted_read()
291 for (i = 0; i < p->blob_len; i++) in trusted_read()
294 return 2 * p->blob_len; in trusted_read()
A Dtrusted_tee.c109 p->blob_len = param[1].u.memref.size; in trusted_tee_seal()
135 p->blob_len, TEE_SHM_DMA_BUF | in trusted_tee_unseal()
157 param[0].u.memref.size = p->blob_len; in trusted_tee_unseal()
A Dtrusted_tpm1.c675 p->key, p->key_len + 1, p->blob, &p->blob_len, in key_seal()
697 ret = tpm_unseal(&tb, o->keyhandle, o->keyauth, p->blob, p->blob_len, in key_unseal()
/linux/fs/cifs/
A Dsess.c645 if (tioffset > blob_len || tioffset + tilen > blob_len) { in decode_ntlmssp_challenge()
1152 u16 blob_len; in sess_auth_kerberos() local
1242 blob_len); in sess_auth_kerberos()
1246 bcc_ptr += blob_len; in sess_auth_kerberos()
1247 bytes_remaining -= blob_len; in sess_auth_kerberos()
1330 u16 blob_len; in sess_auth_rawntlmssp_negotiate() local
1354 &blob_len, ses, in sess_auth_rawntlmssp_negotiate()
1398 blob_len); in sess_auth_rawntlmssp_negotiate()
1432 u16 blob_len; in sess_auth_rawntlmssp_authenticate() local
1487 blob_len); in sess_auth_rawntlmssp_authenticate()
[all …]
A Dntlmssp.h121 int decode_ntlmssp_challenge(char *bcc_ptr, int blob_len, struct cifs_ses *ses);
/linux/include/keys/
A Dtrusted-type.h29 unsigned int blob_len; member
89 pr_info("bloblen %d\n", p->blob_len); in dump_payload()
91 16, 1, p->blob, p->blob_len, 0); in dump_payload()
/linux/crypto/asymmetric_keys/
A Dtpm_parser.c15 u32 blob_len; member
28 ctx->blob_len = vlen; in tpm_note_key()
48 return tpm_key_create(ctx.blob, ctx.blob_len); in tpm_parse()
A Dasym_tpm.c303 tk->blob_len = 0; in asym_tpm_destroy()
529 tk->blob, tk->blob_len, &keyhandle); in tpm_key_decrypt()
677 tk->blob, tk->blob_len, &keyhandle); in tpm_key_sign()
816 uint32_t len = tk->blob_len; in extract_key_parameters()
898 struct tpm_key *tpm_key_create(const void *blob, uint32_t blob_len) in tpm_key_create() argument
918 tk->blob = kmemdup(blob, blob_len, GFP_KERNEL); in tpm_key_create()
922 tk->blob_len = blob_len; in tpm_key_create()
932 tk->blob_len = 0; in tpm_key_create()
/linux/fs/ksmbd/
A Dauth.c298 int blob_len, struct ksmbd_session *sess) in ksmbd_decode_ntlmssp_auth_blob() argument
305 if (blob_len < sizeof(struct authenticate_message)) { in ksmbd_decode_ntlmssp_auth_blob()
307 blob_len); in ksmbd_decode_ntlmssp_auth_blob()
322 if (blob_len < (u64)dn_off + dn_len || blob_len < (u64)nt_off + nt_len) in ksmbd_decode_ntlmssp_auth_blob()
350 int blob_len, struct ksmbd_session *sess) in ksmbd_decode_ntlmssp_neg_blob() argument
352 if (blob_len < sizeof(struct negotiate_message)) { in ksmbd_decode_ntlmssp_neg_blob()
354 blob_len); in ksmbd_decode_ntlmssp_neg_blob()
426 blob_len = blob_off + uni_len; in ksmbd_build_ntlmssp_challenge_blob()
438 chgblob->TargetInfoArray.BufferOffset = cpu_to_le32(blob_len); in ksmbd_build_ntlmssp_challenge_blob()
462 blob_len += target_info_len; in ksmbd_build_ntlmssp_challenge_blob()
[all …]
A Dauth.h45 int blob_len, struct ksmbd_session *sess);
47 int blob_len, struct ksmbd_session *sess);
A Dtransport_ipc.h32 ksmbd_ipc_spnego_authen_request(const char *spnego_blob, int blob_len);
A Dtransport_ipc.c518 ksmbd_ipc_spnego_authen_request(const char *spnego_blob, int blob_len) in ksmbd_ipc_spnego_authen_request() argument
525 blob_len + 1); in ksmbd_ipc_spnego_authen_request()
532 req->spnego_blob_len = blob_len; in ksmbd_ipc_spnego_authen_request()
533 memcpy(req->spnego_blob, spnego_blob, blob_len); in ksmbd_ipc_spnego_authen_request()
/linux/include/crypto/
A Dasym_tpm_subtype.h9 u32 blob_len; member
15 struct tpm_key *tpm_key_create(const void *blob, uint32_t blob_len);
/linux/net/ceph/
A Dauth_x_protocol.h13 __le32 blob_len; member
A Dmon_client.c75 int blob_len; in ceph_monmap_decode() local
82 ceph_decode_32_safe(p, end, blob_len, e_inval); in ceph_monmap_decode()
83 ceph_decode_need(p, end, blob_len, e_inval); in ceph_monmap_decode()
A Dauth_x.c312 p = (void *)(msg_a + 1) + le32_to_cpu(msg_a->ticket_blob.blob_len); in encrypt_authorizer()
394 msg_a->ticket_blob.blob_len = cpu_to_le32(ticket_blob_len); in ceph_x_build_authorizer()

Completed in 56 milliseconds