blob_len          319 crypto/asymmetric_keys/asym_tpm.c 	tk->blob_len = 0;
blob_len          545 crypto/asymmetric_keys/asym_tpm.c 				tk->blob, tk->blob_len, &keyhandle);
blob_len          694 crypto/asymmetric_keys/asym_tpm.c 			 tk->blob, tk->blob_len, &keyhandle);
blob_len          833 crypto/asymmetric_keys/asym_tpm.c 	uint32_t len = tk->blob_len;
blob_len          915 crypto/asymmetric_keys/asym_tpm.c struct tpm_key *tpm_key_create(const void *blob, uint32_t blob_len)
blob_len          935 crypto/asymmetric_keys/asym_tpm.c 	tk->blob = kmemdup(blob, blob_len, GFP_KERNEL);
blob_len          939 crypto/asymmetric_keys/asym_tpm.c 	tk->blob_len = blob_len;
blob_len          949 crypto/asymmetric_keys/asym_tpm.c 	tk->blob_len = 0;
blob_len           15 crypto/asymmetric_keys/tpm_parser.c 	u32		blob_len;
blob_len           28 crypto/asymmetric_keys/tpm_parser.c 	ctx->blob_len = vlen;
blob_len           48 crypto/asymmetric_keys/tpm_parser.c 	return tpm_key_create(ctx.blob, ctx.blob_len);
blob_len          423 drivers/char/tpm/tpm2-cmd.c 	unsigned int blob_len;
blob_len          494 drivers/char/tpm/tpm2-cmd.c 	blob_len = be32_to_cpup((__be32 *) &buf.data[TPM_HEADER_SIZE]);
blob_len          495 drivers/char/tpm/tpm2-cmd.c 	if (blob_len > MAX_BLOB_SIZE) {
blob_len          499 drivers/char/tpm/tpm2-cmd.c 	if (tpm_buf_length(&buf) < TPM_HEADER_SIZE + 4 + blob_len) {
blob_len          504 drivers/char/tpm/tpm2-cmd.c 	memcpy(payload->blob, &buf.data[TPM_HEADER_SIZE + 4], blob_len);
blob_len          505 drivers/char/tpm/tpm2-cmd.c 	payload->blob_len = blob_len;
blob_len          541 drivers/char/tpm/tpm2-cmd.c 	unsigned int blob_len;
blob_len          545 drivers/char/tpm/tpm2-cmd.c 	if (private_len > (payload->blob_len - 2))
blob_len          549 drivers/char/tpm/tpm2-cmd.c 	blob_len = private_len + public_len + 4;
blob_len          550 drivers/char/tpm/tpm2-cmd.c 	if (blob_len > payload->blob_len)
blob_len          564 drivers/char/tpm/tpm2-cmd.c 	tpm_buf_append(&buf, payload->blob, blob_len);
blob_len          134 fs/cifs/ntlmssp.h int decode_ntlmssp_challenge(char *bcc_ptr, int blob_len, struct cifs_ses *ses);
blob_len          288 fs/cifs/sess.c int decode_ntlmssp_challenge(char *bcc_ptr, int blob_len,
blob_len          296 fs/cifs/sess.c 	if (blob_len < sizeof(CHALLENGE_MESSAGE)) {
blob_len          297 fs/cifs/sess.c 		cifs_dbg(VFS, "challenge blob len %d too small\n", blob_len);
blob_len          320 fs/cifs/sess.c 	if (tioffset > blob_len || tioffset + tilen > blob_len) {
blob_len         1029 fs/cifs/sess.c 	u16 blob_len;
blob_len         1117 fs/cifs/sess.c 	blob_len = le16_to_cpu(pSMB->resp.SecurityBlobLength);
blob_len         1118 fs/cifs/sess.c 	if (blob_len > bytes_remaining) {
blob_len         1120 fs/cifs/sess.c 				blob_len);
blob_len         1124 fs/cifs/sess.c 	bcc_ptr += blob_len;
blob_len         1125 fs/cifs/sess.c 	bytes_remaining -= blob_len;
blob_len         1207 fs/cifs/sess.c 	u16 blob_len;
blob_len         1267 fs/cifs/sess.c 	blob_len = le16_to_cpu(pSMB->resp.SecurityBlobLength);
blob_len         1268 fs/cifs/sess.c 	if (blob_len > bytes_remaining) {
blob_len         1270 fs/cifs/sess.c 				blob_len);
blob_len         1275 fs/cifs/sess.c 	rc = decode_ntlmssp_challenge(bcc_ptr, blob_len, ses);
blob_len         1304 fs/cifs/sess.c 	u16 blob_len;
blob_len         1317 fs/cifs/sess.c 					&blob_len, ses, sess_data->nls_cp);
blob_len         1320 fs/cifs/sess.c 	sess_data->iov[1].iov_len = blob_len;
blob_len         1322 fs/cifs/sess.c 	pSMB->req.SecurityBlobLength = cpu_to_le16(blob_len);
blob_len         1356 fs/cifs/sess.c 	blob_len = le16_to_cpu(pSMB->resp.SecurityBlobLength);
blob_len         1357 fs/cifs/sess.c 	if (blob_len > bytes_remaining) {
blob_len         1359 fs/cifs/sess.c 				blob_len);
blob_len         1363 fs/cifs/sess.c 	bcc_ptr += blob_len;
blob_len         1364 fs/cifs/sess.c 	bytes_remaining -= blob_len;
blob_len            9 include/crypto/asym_tpm_subtype.h 	u32 blob_len;
blob_len           15 include/crypto/asym_tpm_subtype.h struct tpm_key *tpm_key_create(const void *blob, uint32_t blob_len);
blob_len           23 include/keys/trusted-type.h 	unsigned int blob_len;
blob_len           69 include/keys/trusted.h 	pr_info("trusted_key: bloblen %d\n", p->blob_len);
blob_len           71 include/keys/trusted.h 		       16, 1, p->blob, p->blob_len, 0);
blob_len          309 net/ceph/auth_x.c 	p = (void *)(msg_a + 1) + le32_to_cpu(msg_a->ticket_blob.blob_len);
blob_len          390 net/ceph/auth_x.c 	msg_a->ticket_blob.blob_len = cpu_to_le32(ticket_blob_len);
blob_len           13 net/ceph/auth_x_protocol.h 	__le32 blob_len;
blob_len          684 security/keys/trusted.c 		       p->key, p->key_len + 1, p->blob, &p->blob_len,
blob_len          706 security/keys/trusted.c 	ret = tpm_unseal(tb, o->keyhandle, o->keyauth, p->blob, p->blob_len,
blob_len          898 security/keys/trusted.c 		p->blob_len = strlen(c) / 2;
blob_len          899 security/keys/trusted.c 		if (p->blob_len > MAX_BLOB_SIZE)
blob_len          901 security/keys/trusted.c 		ret = hex2bin(p->blob, c, p->blob_len);
blob_len         1158 security/keys/trusted.c 	if (buffer && buflen >= 2 * p->blob_len) {
blob_len         1160 security/keys/trusted.c 		for (i = 0; i < p->blob_len; i++)
blob_len         1163 security/keys/trusted.c 	return 2 * p->blob_len;