Home
last modified time | relevance | path

Searched refs:body_size (Results 1 – 3 of 3) sorted by relevance

/linux-4.19.296/include/linux/sunrpc/
Dgss_asn1.h70 int *body_size,
76 unsigned int body_size);
80 int body_size,
/linux-4.19.296/drivers/char/tpm/
Dtpm2-space.c78 unsigned int body_size; in tpm2_load_context() local
86 body_size = sizeof(*ctx) + be16_to_cpu(ctx->blob_size); in tpm2_load_context()
87 tpm_buf_append(&tbuf, &buf[*offset], body_size); in tpm2_load_context()
119 *offset += body_size; in tpm2_load_context()
129 unsigned int body_size; in tpm2_save_context() local
155 body_size = tpm_buf_length(&tbuf) - TPM_HEADER_SIZE; in tpm2_save_context()
156 if ((*offset + body_size) > buf_size) { in tpm2_save_context()
162 memcpy(&buf[*offset], &tbuf.data[TPM_HEADER_SIZE], body_size); in tpm2_save_context()
163 *offset += body_size; in tpm2_save_context()
/linux-4.19.296/fs/ecryptfs/
Dkeystore.c1242 size_t body_size; in parse_tag_1_packet() local
1284 rc = ecryptfs_parse_packet_length(&data[(*packet_size)], &body_size, in parse_tag_1_packet()
1291 if (unlikely(body_size < (ECRYPTFS_SIG_SIZE + 2))) { in parse_tag_1_packet()
1292 printk(KERN_WARNING "Invalid body size ([%td])\n", body_size); in parse_tag_1_packet()
1297 if (unlikely((*packet_size) + body_size > max_packet_size)) { in parse_tag_1_packet()
1315 body_size - (ECRYPTFS_SIG_SIZE + 2); in parse_tag_1_packet()
1324 &data[(*packet_size)], (body_size - (ECRYPTFS_SIG_SIZE + 2))); in parse_tag_1_packet()
1374 size_t body_size; in parse_tag_3_packet() local
1418 rc = ecryptfs_parse_packet_length(&data[(*packet_size)], &body_size, in parse_tag_3_packet()
1425 if (unlikely(body_size < (ECRYPTFS_SALT_SIZE + 5))) { in parse_tag_3_packet()
[all …]