| /kernel/linux/linux-6.6/security/keys/trusted-keys/ |
| D | trusted_tpm2.c | 107 payload->blob_len); in tpm2_key_decode() 231 int blob_len = 0; in tpm2_seal_trusted() local 315 blob_len = be32_to_cpup((__be32 *) &buf.data[TPM_HEADER_SIZE]); in tpm2_seal_trusted() 316 if (blob_len > MAX_BLOB_SIZE) { in tpm2_seal_trusted() 320 if (tpm_buf_length(&buf) < TPM_HEADER_SIZE + 4 + blob_len) { in tpm2_seal_trusted() 325 blob_len = tpm2_key_encode(payload, options, in tpm2_seal_trusted() 327 blob_len); in tpm2_seal_trusted() 338 if (blob_len < 0) in tpm2_seal_trusted() 339 rc = blob_len; in tpm2_seal_trusted() 341 payload->blob_len = blob_len; in tpm2_seal_trusted() [all …]
|
| D | trusted_core.c | 103 p->blob_len = strlen(c) / 2; in datablob_parse() 104 if (p->blob_len > MAX_BLOB_SIZE) in datablob_parse() 106 ret = hex2bin(p->blob, c, p->blob_len); in datablob_parse() 297 if (buffer && buflen >= 2 * p->blob_len) { in trusted_read() 299 for (i = 0; i < p->blob_len; i++) in trusted_read() 302 return 2 * p->blob_len; in trusted_read()
|
| D | trusted_caam.c | 32 p->blob_len = info.output_len; in trusted_caam_seal() 40 .input = p->blob, .input_len = p->blob_len, in trusted_caam_unseal()
|
| D | trusted_tee.c | 99 p->blob_len = param[1].u.memref.size; in trusted_tee_seal() 133 param[0].u.memref.size = p->blob_len; in trusted_tee_unseal()
|
| D | trusted_tpm1.c | 675 p->key, p->key_len + 1, p->blob, &p->blob_len, in key_seal() 697 ret = tpm_unseal(&tb, o->keyhandle, o->keyauth, p->blob, p->blob_len, in key_unseal()
|
| /kernel/linux/linux-5.10/security/keys/trusted-keys/ |
| D | trusted_tpm2.c | 66 unsigned int blob_len; in tpm2_seal_trusted() local 145 blob_len = be32_to_cpup((__be32 *) &buf.data[TPM_HEADER_SIZE]); in tpm2_seal_trusted() 146 if (blob_len > MAX_BLOB_SIZE) { in tpm2_seal_trusted() 150 if (tpm_buf_length(&buf) < TPM_HEADER_SIZE + 4 + blob_len) { in tpm2_seal_trusted() 155 memcpy(payload->blob, &buf.data[TPM_HEADER_SIZE + 4], blob_len); in tpm2_seal_trusted() 156 payload->blob_len = blob_len; in tpm2_seal_trusted() 193 unsigned int blob_len; in tpm2_load_cmd() local 197 if (private_len > (payload->blob_len - 2)) in tpm2_load_cmd() 201 blob_len = private_len + public_len + 4; in tpm2_load_cmd() 202 if (blob_len > payload->blob_len) in tpm2_load_cmd() [all …]
|
| D | trusted_tpm1.c | 682 p->key, p->key_len + 1, p->blob, &p->blob_len, in key_seal() 704 ret = tpm_unseal(&tb, o->keyhandle, o->keyauth, p->blob, p->blob_len, in key_unseal() 916 p->blob_len = strlen(c) / 2; in datablob_parse() 917 if (p->blob_len > MAX_BLOB_SIZE) in datablob_parse() 919 ret = hex2bin(p->blob, c, p->blob_len); in datablob_parse() 1180 if (buffer && buflen >= 2 * p->blob_len) { in trusted_read() 1182 for (i = 0; i < p->blob_len; i++) in trusted_read() 1185 return 2 * p->blob_len; in trusted_read()
|
| /kernel/linux/linux-6.6/include/keys/ |
| D | trusted-type.h | 29 unsigned int blob_len; member 89 pr_info("bloblen %d\n", p->blob_len); in dump_payload() 91 16, 1, p->blob, p->blob_len, 0); in dump_payload()
|
| /kernel/linux/linux-5.10/crypto/asymmetric_keys/ |
| D | tpm_parser.c | 15 u32 blob_len; member 28 ctx->blob_len = vlen; in tpm_note_key() 48 return tpm_key_create(ctx.blob, ctx.blob_len); in tpm_parse()
|
| D | asym_tpm.c | 303 tk->blob_len = 0; in asym_tpm_destroy() 529 tk->blob, tk->blob_len, &keyhandle); in tpm_key_decrypt() 677 tk->blob, tk->blob_len, &keyhandle); in tpm_key_sign() 816 uint32_t len = tk->blob_len; in extract_key_parameters() 898 struct tpm_key *tpm_key_create(const void *blob, uint32_t blob_len) in tpm_key_create() argument 918 tk->blob = kmemdup(blob, blob_len, GFP_KERNEL); in tpm_key_create() 922 tk->blob_len = blob_len; in tpm_key_create() 932 tk->blob_len = 0; in tpm_key_create()
|
| /kernel/linux/linux-5.10/include/crypto/ |
| D | asym_tpm_subtype.h | 9 u32 blob_len; member 15 struct tpm_key *tpm_key_create(const void *blob, uint32_t blob_len);
|
| /kernel/linux/linux-6.6/fs/smb/client/ |
| D | sess.c | 929 int decode_ntlmssp_challenge(char *bcc_ptr, int blob_len, in decode_ntlmssp_challenge() argument 937 if (blob_len < sizeof(CHALLENGE_MESSAGE)) { in decode_ntlmssp_challenge() 938 cifs_dbg(VFS, "challenge blob len %d too small\n", blob_len); in decode_ntlmssp_challenge() 986 if (tioffset > blob_len || tioffset + tilen > blob_len) { in decode_ntlmssp_challenge() 1577 u16 blob_len; in sess_auth_kerberos() local 1664 blob_len = le16_to_cpu(pSMB->resp.SecurityBlobLength); in sess_auth_kerberos() 1665 if (blob_len > bytes_remaining) { in sess_auth_kerberos() 1667 blob_len); in sess_auth_kerberos() 1671 bcc_ptr += blob_len; in sess_auth_kerberos() 1672 bytes_remaining -= blob_len; in sess_auth_kerberos() [all …]
|
| D | ntlmssp.h | 145 int decode_ntlmssp_challenge(char *bcc_ptr, int blob_len, struct cifs_ses *ses);
|
| /kernel/linux/linux-5.10/fs/cifs/ |
| D | sess.c | 566 int decode_ntlmssp_challenge(char *bcc_ptr, int blob_len, in decode_ntlmssp_challenge() argument 574 if (blob_len < sizeof(CHALLENGE_MESSAGE)) { in decode_ntlmssp_challenge() 575 cifs_dbg(VFS, "challenge blob len %d too small\n", blob_len); in decode_ntlmssp_challenge() 598 if (tioffset > blob_len || tioffset + tilen > blob_len) { in decode_ntlmssp_challenge() 1307 u16 blob_len; in sess_auth_kerberos() local 1394 blob_len = le16_to_cpu(pSMB->resp.SecurityBlobLength); in sess_auth_kerberos() 1395 if (blob_len > bytes_remaining) { in sess_auth_kerberos() 1397 blob_len); in sess_auth_kerberos() 1401 bcc_ptr += blob_len; in sess_auth_kerberos() 1402 bytes_remaining -= blob_len; in sess_auth_kerberos() [all …]
|
| D | ntlmssp.h | 134 int decode_ntlmssp_challenge(char *bcc_ptr, int blob_len, struct cifs_ses *ses);
|
| /kernel/linux/linux-6.6/fs/smb/server/ |
| D | auth.c | 303 int blob_len, struct ksmbd_conn *conn, in ksmbd_decode_ntlmssp_auth_blob() argument 311 if (blob_len < sizeof(struct authenticate_message)) { in ksmbd_decode_ntlmssp_auth_blob() 313 blob_len); in ksmbd_decode_ntlmssp_auth_blob() 328 if (blob_len < (u64)dn_off + dn_len || blob_len < (u64)nt_off + nt_len || in ksmbd_decode_ntlmssp_auth_blob() 355 if (blob_len < (u64)sess_key_off + sess_key_len) in ksmbd_decode_ntlmssp_auth_blob() 384 int blob_len, struct ksmbd_conn *conn) in ksmbd_decode_ntlmssp_neg_blob() argument 386 if (blob_len < sizeof(struct negotiate_message)) { in ksmbd_decode_ntlmssp_neg_blob() 388 blob_len); in ksmbd_decode_ntlmssp_neg_blob() 417 unsigned int flags, blob_off, blob_len, type, target_info_len = 0; in ksmbd_build_ntlmssp_challenge_blob() local 466 blob_len = blob_off + uni_len; in ksmbd_build_ntlmssp_challenge_blob() [all …]
|
| D | auth.h | 46 int blob_len, struct ksmbd_conn *conn, 49 int blob_len, struct ksmbd_conn *conn);
|
| D | transport_ipc.h | 32 ksmbd_ipc_spnego_authen_request(const char *spnego_blob, int blob_len);
|
| D | transport_ipc.c | 527 ksmbd_ipc_spnego_authen_request(const char *spnego_blob, int blob_len) in ksmbd_ipc_spnego_authen_request() argument 534 blob_len + 1); in ksmbd_ipc_spnego_authen_request() 541 req->spnego_blob_len = blob_len; in ksmbd_ipc_spnego_authen_request() 542 memcpy(req->spnego_blob, spnego_blob, blob_len); in ksmbd_ipc_spnego_authen_request()
|
| /kernel/linux/linux-5.10/include/keys/ |
| D | trusted_tpm.h | 68 pr_info("trusted_key: bloblen %d\n", p->blob_len); in dump_payload() 70 16, 1, p->blob, p->blob_len, 0); in dump_payload()
|
| D | trusted-type.h | 23 unsigned int blob_len; member
|
| /kernel/linux/linux-5.10/net/ceph/ |
| D | auth_x_protocol.h | 13 __le32 blob_len; member
|
| /kernel/linux/linux-6.6/net/ceph/ |
| D | auth_x_protocol.h | 13 __le32 blob_len; member
|
| D | mon_client.c | 75 int blob_len; in ceph_monmap_decode() local 82 ceph_decode_32_safe(p, end, blob_len, e_inval); in ceph_monmap_decode() 83 ceph_decode_need(p, end, blob_len, e_inval); in ceph_monmap_decode()
|
| /kernel/linux/patches/linux-5.10/imx8mm_patch/patches/drivers/ |
| D | 0016_linux_drivers_crypto.patch | 2484 + dev_dbg(dev, "blob: %p (%zu)]\n", blob, info->blob_len); 2501 + if (info->blob_len < (blob_req_len + BLOB_OVERHEAD)) 2505 + info->blob_len = blob_req_len + BLOB_OVERHEAD; 2513 + dev_dbg(dev, "blob: %p (%zu)]\n", blob, info->blob_len); 2531 + if (map_read_data(dev, info->blob_len, &blob_dma, &tmp_blob)) { 2546 + blob_dma, info->blob_len); 2563 + read_map_data(dev, blob, blob_dma, tmp_blob, info->blob_len); 2567 + info->blob_len, 1); 2574 + info->blob_len, DMA_FROM_DEVICE); 2630 + __func__, blob, info->blob_len, mem_type, color); [all …]
|