Home
last modified time | relevance | path

Searched refs:blob_len (Results 1 – 7 of 7) sorted by relevance

/linux-4.1.27/fs/cifs/
Dsess.c280 int decode_ntlmssp_challenge(char *bcc_ptr, int blob_len, in decode_ntlmssp_challenge() argument
288 if (blob_len < sizeof(CHALLENGE_MESSAGE)) { in decode_ntlmssp_challenge()
289 cifs_dbg(VFS, "challenge blob len %d too small\n", blob_len); in decode_ntlmssp_challenge()
312 if (tioffset > blob_len || tioffset + tilen > blob_len) { in decode_ntlmssp_challenge()
993 u16 blob_len; in sess_auth_kerberos() local
1081 blob_len = le16_to_cpu(pSMB->resp.SecurityBlobLength); in sess_auth_kerberos()
1082 if (blob_len > bytes_remaining) { in sess_auth_kerberos()
1084 blob_len); in sess_auth_kerberos()
1088 bcc_ptr += blob_len; in sess_auth_kerberos()
1089 bytes_remaining -= blob_len; in sess_auth_kerberos()
[all …]
Dntlmssp.h134 int decode_ntlmssp_challenge(char *bcc_ptr, int blob_len, struct cifs_ses *ses);
/linux-4.1.27/security/keys/
Dtrusted.h67 pr_info("trusted_key: bloblen %d\n", p->blob_len); in dump_payload()
69 16, 1, p->blob, p->blob_len, 0); in dump_payload()
Dtrusted.c675 p->key, p->key_len + 1, p->blob, &p->blob_len, in key_seal()
697 ret = tpm_unseal(tb, o->keyhandle, o->keyauth, p->blob, p->blob_len, in key_unseal()
837 p->blob_len = strlen(c) / 2; in datablob_parse()
838 if (p->blob_len > MAX_BLOB_SIZE) in datablob_parse()
840 ret = hex2bin(p->blob, c, p->blob_len); in datablob_parse()
1069 return 2 * p->blob_len; in trusted_read()
1070 ascii_buf = kmalloc(2 * p->blob_len, GFP_KERNEL); in trusted_read()
1075 for (i = 0; i < p->blob_len; i++) in trusted_read()
1077 if ((copy_to_user(buffer, ascii_buf, 2 * p->blob_len)) != 0) { in trusted_read()
1082 return 2 * p->blob_len; in trusted_read()
/linux-4.1.27/include/keys/
Dtrusted-type.h23 unsigned int blob_len; member
/linux-4.1.27/net/ceph/
Dauth_x_protocol.h12 __le32 blob_len; member
Dauth_x.c325 msg_a->ticket_blob.blob_len = cpu_to_le32(ticket_blob_len); in ceph_x_build_authorizer()