| /linux/security/keys/trusted-keys/ |
| H A D | trusted_tpm2.c | 112 payload->blob_len); in tpm2_key_decode() 238 int blob_len = 0; in tpm2_seal_trusted() local 331 blob_len = tpm_buf_read_u32(&buf, &offset); in tpm2_seal_trusted() 332 if (blob_len > MAX_BLOB_SIZE || buf.flags & TPM_BUF_BOUNDARY_ERROR) { in tpm2_seal_trusted() 336 if (buf.length - offset < blob_len) { in tpm2_seal_trusted() 341 blob_len = tpm2_key_encode(payload, options, &buf.data[offset], blob_len); in tpm2_seal_trusted() 342 if (blob_len < 0) in tpm2_seal_trusted() 343 rc = blob_len; in tpm2_seal_trusted() 350 payload->blob_len = blob_len; in tpm2_seal_trusted() 379 unsigned int blob_len; in tpm2_load_cmd() local [all …]
|
| H A D | trusted_caam.c | 118 p->blob_len = info.output_len; in trusted_caam_seal() 120 p->key_len = p->blob_len + sizeof(struct caam_pkey_info); in trusted_caam_seal() 122 memcpy(p->key + sizeof(struct caam_pkey_info), p->blob, p->blob_len); in trusted_caam_seal() 132 .input = p->blob, .input_len = p->blob_len, in trusted_caam_unseal() 138 info.pkey_info.plain_key_sz = p->blob_len - CAAM_BLOB_OVERHEAD; in trusted_caam_unseal() 145 p->key_len = p->blob_len + sizeof(struct caam_pkey_info); in trusted_caam_unseal() 147 memcpy(p->key + sizeof(struct caam_pkey_info), p->blob, p->blob_len); in trusted_caam_unseal()
|
| H A D | trusted_core.c | 112 p->blob_len = strlen(c) / 2; in datablob_parse() 113 if (p->blob_len > MAX_BLOB_SIZE) in datablob_parse() 115 ret = hex2bin(p->blob, c, p->blob_len); in datablob_parse() 306 if (buffer && buflen >= 2 * p->blob_len) { in trusted_read() 308 for (i = 0; i < p->blob_len; i++) in trusted_read() 311 return 2 * p->blob_len; in trusted_read()
|
| H A D | trusted_pkwm.c | 115 p->blob_len = output_len; in trusted_pkwm_seal() 136 input_len = p->blob_len; in trusted_pkwm_unseal() 143 memcpy(input_buf, p->blob, p->blob_len); in trusted_pkwm_unseal()
|
| H A D | trusted_dcp.c | 232 p->blob_len = blen; in trusted_dcp_seal() 257 if (blen != p->blob_len) { in trusted_dcp_unseal() 259 p->blob_len); in trusted_dcp_unseal()
|
| H A D | trusted_tee.c | 99 p->blob_len = param[1].u.memref.size; in trusted_tee_seal() 133 param[0].u.memref.size = p->blob_len; in trusted_tee_unseal()
|
| H A D | trusted_tpm1.c | 639 p->key, p->key_len + 1, p->blob, &p->blob_len, in key_seal() 661 ret = tpm_unseal(&tb, o->keyhandle, o->keyauth, p->blob, p->blob_len, in key_unseal()
|
| /linux/fs/smb/client/ |
| H A D | smb1session.c | 540 u16 blob_len; in sess_auth_kerberos() local 627 blob_len = le16_to_cpu(pSMB->resp.SecurityBlobLength); in sess_auth_kerberos() 628 if (blob_len > bytes_remaining) { in sess_auth_kerberos() 630 blob_len); in sess_auth_kerberos() 634 bcc_ptr += blob_len; in sess_auth_kerberos() 635 bytes_remaining -= blob_len; in sess_auth_kerberos() 720 u16 blob_len; in sess_auth_rawntlmssp_negotiate() local 744 &blob_len, ses, server, in sess_auth_rawntlmssp_negotiate() 749 sess_data->iov[1].iov_len = blob_len; in sess_auth_rawntlmssp_negotiate() 751 pSMB->req.SecurityBlobLength = cpu_to_le16(blob_len); in sess_auth_rawntlmssp_negotiate() [all …]
|
| H A D | sess.c | 642 int decode_ntlmssp_challenge(char *bcc_ptr, int blob_len, in decode_ntlmssp_challenge() argument 650 if (blob_len < sizeof(CHALLENGE_MESSAGE)) { in decode_ntlmssp_challenge() 651 cifs_dbg(VFS, "challenge blob len %d too small\n", blob_len); in decode_ntlmssp_challenge() 702 if (tioffset > blob_len || tioffset + tilen > blob_len) { in decode_ntlmssp_challenge()
|
| /linux/fs/smb/server/ |
| H A D | auth.c | 186 int blob_len, struct ksmbd_conn *conn, in ksmbd_decode_ntlmssp_auth_blob() argument 194 if (blob_len < sizeof(struct authenticate_message)) { in ksmbd_decode_ntlmssp_auth_blob() 196 blob_len); in ksmbd_decode_ntlmssp_auth_blob() 211 if (blob_len < (u64)dn_off + dn_len || blob_len < (u64)nt_off + nt_len || in ksmbd_decode_ntlmssp_auth_blob() 238 if (blob_len < (u64)sess_key_off + sess_key_len) in ksmbd_decode_ntlmssp_auth_blob() 266 int blob_len, struct ksmbd_conn *conn) in ksmbd_decode_ntlmssp_neg_blob() argument 268 if (blob_len < sizeof(struct negotiate_message)) { in ksmbd_decode_ntlmssp_neg_blob() 270 blob_len); in ksmbd_decode_ntlmssp_neg_blob() 298 unsigned int flags, blob_off, blob_len, type, target_info_len = 0; in ksmbd_build_ntlmssp_challenge_blob() local 347 blob_len = blob_off + uni_len; in ksmbd_build_ntlmssp_challenge_blob() [all …]
|
| H A D | transport_ipc.c | 642 ksmbd_ipc_spnego_authen_request(const char *spnego_blob, int blob_len) in ksmbd_ipc_spnego_authen_request() argument 648 if (blob_len > KSMBD_IPC_MAX_PAYLOAD) in ksmbd_ipc_spnego_authen_request() 652 blob_len + 1); in ksmbd_ipc_spnego_authen_request() 659 req->spnego_blob_len = blob_len; in ksmbd_ipc_spnego_authen_request() 660 memcpy(req->spnego_blob, spnego_blob, blob_len); in ksmbd_ipc_spnego_authen_request()
|
| H A D | transport_ipc.h | 34 ksmbd_ipc_spnego_authen_request(const char *spnego_blob, int blob_len);
|
| /linux/net/ceph/ |
| H A D | auth_x_protocol.h | 51 __le32 blob_len; 13 __le32 blob_len; global() member
|
| H A D | mon_client.c | 75 u32 blob_len; in ceph_monmap_decode() local 82 ceph_decode_32_safe(p, end, blob_len, e_inval); in ceph_monmap_decode() 83 ceph_decode_need(p, end, blob_len, e_inval); in ceph_monmap_decode()
|
| H A D | auth_x.c | 352 p = (void *)(msg_a + 1) + le32_to_cpu(msg_a->ticket_blob.blob_len); in encrypt_authorizer() 441 msg_a->ticket_blob.blob_len = cpu_to_le32(ticket_blob_len); in ceph_x_build_authorizer()
|