Searched refs:blob_len (Results 1 - 8 of 8) sorted by relevance
/linux-4.4.14/net/ceph/ |
H A D | auth_x_protocol.h | 12 __le32 blob_len; member in struct:ceph_x_ticket_blob
|
H A D | auth_x.c | 335 msg_a->ticket_blob.blob_len = cpu_to_le32(ticket_blob_len); ceph_x_build_authorizer()
|
/linux-4.4.14/include/keys/ |
H A D | trusted-type.h | 25 unsigned int blob_len; member in struct:trusted_key_payload
|
/linux-4.4.14/security/keys/ |
H A D | trusted.h | 56 pr_info("trusted_key: bloblen %d\n", p->blob_len); dump_payload() 58 16, 1, p->blob, p->blob_len, 0); dump_payload()
|
H A D | trusted.c | 675 p->key, p->key_len + 1, p->blob, &p->blob_len, key_seal() 697 ret = tpm_unseal(tb, o->keyhandle, o->keyauth, p->blob, p->blob_len, key_unseal() 837 p->blob_len = strlen(c) / 2; datablob_parse() 838 if (p->blob_len > MAX_BLOB_SIZE) datablob_parse() 840 ret = hex2bin(p->blob, c, p->blob_len); datablob_parse() 1099 return 2 * p->blob_len; trusted_read() 1100 ascii_buf = kmalloc(2 * p->blob_len, GFP_KERNEL); trusted_read() 1105 for (i = 0; i < p->blob_len; i++) trusted_read() 1107 if ((copy_to_user(buffer, ascii_buf, 2 * p->blob_len)) != 0) { trusted_read() 1112 return 2 * p->blob_len; trusted_read()
|
/linux-4.4.14/fs/cifs/ |
H A D | sess.c | 280 int decode_ntlmssp_challenge(char *bcc_ptr, int blob_len, decode_ntlmssp_challenge() argument 288 if (blob_len < sizeof(CHALLENGE_MESSAGE)) { decode_ntlmssp_challenge() 289 cifs_dbg(VFS, "challenge blob len %d too small\n", blob_len); decode_ntlmssp_challenge() 312 if (tioffset > blob_len || tioffset + tilen > blob_len) { decode_ntlmssp_challenge() 993 u16 blob_len; sess_auth_kerberos() local 1081 blob_len = le16_to_cpu(pSMB->resp.SecurityBlobLength); sess_auth_kerberos() 1082 if (blob_len > bytes_remaining) { sess_auth_kerberos() 1084 blob_len); sess_auth_kerberos() 1088 bcc_ptr += blob_len; sess_auth_kerberos() 1089 bytes_remaining -= blob_len; sess_auth_kerberos() 1173 u16 blob_len; sess_auth_rawntlmssp_negotiate() local 1233 blob_len = le16_to_cpu(pSMB->resp.SecurityBlobLength); sess_auth_rawntlmssp_negotiate() 1234 if (blob_len > bytes_remaining) { sess_auth_rawntlmssp_negotiate() 1236 blob_len); sess_auth_rawntlmssp_negotiate() 1241 rc = decode_ntlmssp_challenge(bcc_ptr, blob_len, ses); sess_auth_rawntlmssp_negotiate() 1270 u16 blob_len; sess_auth_rawntlmssp_authenticate() local 1295 &blob_len, ses, sess_data->nls_cp); sess_auth_rawntlmssp_authenticate() 1298 sess_data->iov[1].iov_len = blob_len; sess_auth_rawntlmssp_authenticate() 1300 pSMB->req.SecurityBlobLength = cpu_to_le16(blob_len); sess_auth_rawntlmssp_authenticate() 1334 blob_len = le16_to_cpu(pSMB->resp.SecurityBlobLength); sess_auth_rawntlmssp_authenticate() 1335 if (blob_len > bytes_remaining) { sess_auth_rawntlmssp_authenticate() 1337 blob_len); sess_auth_rawntlmssp_authenticate() 1341 bcc_ptr += blob_len; sess_auth_rawntlmssp_authenticate() 1342 bytes_remaining -= blob_len; sess_auth_rawntlmssp_authenticate()
|
H A D | ntlmssp.h | 134 int decode_ntlmssp_challenge(char *bcc_ptr, int blob_len, struct cifs_ses *ses);
|
/linux-4.4.14/drivers/char/tpm/ |
H A D | tpm2-cmd.c | 430 unsigned int blob_len; tpm2_seal_trusted() local 479 blob_len = be32_to_cpup((__be32 *) &buf.data[TPM_HEADER_SIZE]); tpm2_seal_trusted() 480 if (blob_len > MAX_BLOB_SIZE) { tpm2_seal_trusted() 485 memcpy(payload->blob, &buf.data[TPM_HEADER_SIZE + 4], blob_len); tpm2_seal_trusted() 486 payload->blob_len = blob_len; tpm2_seal_trusted() 505 unsigned int blob_len; tpm2_load() local 509 if (private_len > (payload->blob_len - 2)) tpm2_load() 513 blob_len = private_len + public_len + 4; tpm2_load() 514 if (blob_len > payload->blob_len) tpm2_load() 528 tpm_buf_append(&buf, payload->blob, blob_len); tpm2_load()
|
Completed in 168 milliseconds