Searched refs:body_size (Results 1 – 9 of 9) sorted by relevance
/Linux-v5.4/net/sunrpc/auth_gss/ |
D | gss_generic_token.c | 147 g_token_size(struct xdr_netobj *mech, unsigned int body_size) in g_token_size() argument 150 body_size += 2 + (int) mech->len; /* NEED overflow check */ in g_token_size() 151 return 1 + der_length_size(body_size) + body_size; in g_token_size() 160 g_make_token_header(struct xdr_netobj *mech, int body_size, unsigned char **buf) in g_make_token_header() argument 163 der_write_length(buf, 2 + mech->len + body_size); in g_make_token_header() 180 g_verify_token_header(struct xdr_netobj *mech, int *body_size, in g_verify_token_header() argument 227 *body_size = toksize; in g_verify_token_header()
|
D | gss_krb5_seal.c | 77 int body_size = GSS_KRB5_TOK_HDR_LEN + ctx->gk5e->cksumlength; in setup_token() local 79 token->len = g_token_size(&ctx->mech_used, body_size); in setup_token() 82 g_make_token_header(&ctx->mech_used, body_size, (unsigned char **)&ptr); in setup_token()
|
/Linux-v5.4/include/linux/sunrpc/ |
D | gss_asn1.h | 70 int *body_size, 76 unsigned int body_size); 80 int body_size,
|
/Linux-v5.4/drivers/char/tpm/ |
D | tpm2-space.c | 73 unsigned int body_size; in tpm2_load_context() local 81 body_size = sizeof(*ctx) + be16_to_cpu(ctx->blob_size); in tpm2_load_context() 82 tpm_buf_append(&tbuf, &buf[*offset], body_size); in tpm2_load_context() 113 *offset += body_size; in tpm2_load_context() 123 unsigned int body_size; in tpm2_save_context() local 148 body_size = tpm_buf_length(&tbuf) - TPM_HEADER_SIZE; in tpm2_save_context() 149 if ((*offset + body_size) > buf_size) { in tpm2_save_context() 155 memcpy(&buf[*offset], &tbuf.data[TPM_HEADER_SIZE], body_size); in tpm2_save_context() 156 *offset += body_size; in tpm2_save_context()
|
/Linux-v5.4/fs/ecryptfs/ |
D | keystore.c | 1228 size_t body_size; in parse_tag_1_packet() local 1270 rc = ecryptfs_parse_packet_length(&data[(*packet_size)], &body_size, in parse_tag_1_packet() 1277 if (unlikely(body_size < (ECRYPTFS_SIG_SIZE + 2))) { in parse_tag_1_packet() 1278 printk(KERN_WARNING "Invalid body size ([%td])\n", body_size); in parse_tag_1_packet() 1283 if (unlikely((*packet_size) + body_size > max_packet_size)) { in parse_tag_1_packet() 1301 body_size - (ECRYPTFS_SIG_SIZE + 2); in parse_tag_1_packet() 1310 &data[(*packet_size)], (body_size - (ECRYPTFS_SIG_SIZE + 2))); in parse_tag_1_packet() 1360 size_t body_size; in parse_tag_3_packet() local 1404 rc = ecryptfs_parse_packet_length(&data[(*packet_size)], &body_size, in parse_tag_3_packet() 1411 if (unlikely(body_size < (ECRYPTFS_SALT_SIZE + 5))) { in parse_tag_3_packet() [all …]
|
/Linux-v5.4/Documentation/filesystems/ |
D | omfs.txt | 54 __be16 h_crc; /* crc-ccitt of body_size bytes */
|
/Linux-v5.4/drivers/media/platform/vsp1/ |
D | vsp1_dl.c | 402 size_t body_size; member 444 vsp1_extended_commands[type].body_size; in vsp1_dl_cmd_pool_create()
|
/Linux-v5.4/drivers/staging/ks7010/ |
D | ks_hostif.h | 312 __le16 body_size; /* +16 */ member
|
D | ks_hostif.c | 275 bsize = le16_to_cpu(ap_info->body_size); in get_ap_information()
|