Searched refs:body_size (Results 1 – 3 of 3) sorted by relevance
/linux-4.19.296/include/linux/sunrpc/ |
D | gss_asn1.h | 70 int *body_size, 76 unsigned int body_size); 80 int body_size,
|
/linux-4.19.296/drivers/char/tpm/ |
D | tpm2-space.c | 78 unsigned int body_size; in tpm2_load_context() local 86 body_size = sizeof(*ctx) + be16_to_cpu(ctx->blob_size); in tpm2_load_context() 87 tpm_buf_append(&tbuf, &buf[*offset], body_size); in tpm2_load_context() 119 *offset += body_size; in tpm2_load_context() 129 unsigned int body_size; in tpm2_save_context() local 155 body_size = tpm_buf_length(&tbuf) - TPM_HEADER_SIZE; in tpm2_save_context() 156 if ((*offset + body_size) > buf_size) { in tpm2_save_context() 162 memcpy(&buf[*offset], &tbuf.data[TPM_HEADER_SIZE], body_size); in tpm2_save_context() 163 *offset += body_size; in tpm2_save_context()
|
/linux-4.19.296/fs/ecryptfs/ |
D | keystore.c | 1242 size_t body_size; in parse_tag_1_packet() local 1284 rc = ecryptfs_parse_packet_length(&data[(*packet_size)], &body_size, in parse_tag_1_packet() 1291 if (unlikely(body_size < (ECRYPTFS_SIG_SIZE + 2))) { in parse_tag_1_packet() 1292 printk(KERN_WARNING "Invalid body size ([%td])\n", body_size); in parse_tag_1_packet() 1297 if (unlikely((*packet_size) + body_size > max_packet_size)) { in parse_tag_1_packet() 1315 body_size - (ECRYPTFS_SIG_SIZE + 2); in parse_tag_1_packet() 1324 &data[(*packet_size)], (body_size - (ECRYPTFS_SIG_SIZE + 2))); in parse_tag_1_packet() 1374 size_t body_size; in parse_tag_3_packet() local 1418 rc = ecryptfs_parse_packet_length(&data[(*packet_size)], &body_size, in parse_tag_3_packet() 1425 if (unlikely(body_size < (ECRYPTFS_SALT_SIZE + 5))) { in parse_tag_3_packet() [all …]
|