Home
last modified time | relevance | path

Searched refs:body_size (Results 1 – 9 of 9) sorted by relevance

/Linux-v5.4/net/sunrpc/auth_gss/
Dgss_generic_token.c147 g_token_size(struct xdr_netobj *mech, unsigned int body_size) in g_token_size() argument
150 body_size += 2 + (int) mech->len; /* NEED overflow check */ in g_token_size()
151 return 1 + der_length_size(body_size) + body_size; in g_token_size()
160 g_make_token_header(struct xdr_netobj *mech, int body_size, unsigned char **buf) in g_make_token_header() argument
163 der_write_length(buf, 2 + mech->len + body_size); in g_make_token_header()
180 g_verify_token_header(struct xdr_netobj *mech, int *body_size, in g_verify_token_header() argument
227 *body_size = toksize; in g_verify_token_header()
Dgss_krb5_seal.c77 int body_size = GSS_KRB5_TOK_HDR_LEN + ctx->gk5e->cksumlength; in setup_token() local
79 token->len = g_token_size(&ctx->mech_used, body_size); in setup_token()
82 g_make_token_header(&ctx->mech_used, body_size, (unsigned char **)&ptr); in setup_token()
/Linux-v5.4/include/linux/sunrpc/
Dgss_asn1.h70 int *body_size,
76 unsigned int body_size);
80 int body_size,
/Linux-v5.4/drivers/char/tpm/
Dtpm2-space.c73 unsigned int body_size; in tpm2_load_context() local
81 body_size = sizeof(*ctx) + be16_to_cpu(ctx->blob_size); in tpm2_load_context()
82 tpm_buf_append(&tbuf, &buf[*offset], body_size); in tpm2_load_context()
113 *offset += body_size; in tpm2_load_context()
123 unsigned int body_size; in tpm2_save_context() local
148 body_size = tpm_buf_length(&tbuf) - TPM_HEADER_SIZE; in tpm2_save_context()
149 if ((*offset + body_size) > buf_size) { in tpm2_save_context()
155 memcpy(&buf[*offset], &tbuf.data[TPM_HEADER_SIZE], body_size); in tpm2_save_context()
156 *offset += body_size; in tpm2_save_context()
/Linux-v5.4/fs/ecryptfs/
Dkeystore.c1228 size_t body_size; in parse_tag_1_packet() local
1270 rc = ecryptfs_parse_packet_length(&data[(*packet_size)], &body_size, in parse_tag_1_packet()
1277 if (unlikely(body_size < (ECRYPTFS_SIG_SIZE + 2))) { in parse_tag_1_packet()
1278 printk(KERN_WARNING "Invalid body size ([%td])\n", body_size); in parse_tag_1_packet()
1283 if (unlikely((*packet_size) + body_size > max_packet_size)) { in parse_tag_1_packet()
1301 body_size - (ECRYPTFS_SIG_SIZE + 2); in parse_tag_1_packet()
1310 &data[(*packet_size)], (body_size - (ECRYPTFS_SIG_SIZE + 2))); in parse_tag_1_packet()
1360 size_t body_size; in parse_tag_3_packet() local
1404 rc = ecryptfs_parse_packet_length(&data[(*packet_size)], &body_size, in parse_tag_3_packet()
1411 if (unlikely(body_size < (ECRYPTFS_SALT_SIZE + 5))) { in parse_tag_3_packet()
[all …]
/Linux-v5.4/Documentation/filesystems/
Domfs.txt54 __be16 h_crc; /* crc-ccitt of body_size bytes */
/Linux-v5.4/drivers/media/platform/vsp1/
Dvsp1_dl.c402 size_t body_size; member
444 vsp1_extended_commands[type].body_size; in vsp1_dl_cmd_pool_create()
/Linux-v5.4/drivers/staging/ks7010/
Dks_hostif.h312 __le16 body_size; /* +16 */ member
Dks_hostif.c275 bsize = le16_to_cpu(ap_info->body_size); in get_ap_information()