body_size          73 drivers/char/tpm/tpm2-space.c 	unsigned int body_size;
body_size          81 drivers/char/tpm/tpm2-space.c 	body_size = sizeof(*ctx) + be16_to_cpu(ctx->blob_size);
body_size          82 drivers/char/tpm/tpm2-space.c 	tpm_buf_append(&tbuf, &buf[*offset], body_size);
body_size         113 drivers/char/tpm/tpm2-space.c 	*offset += body_size;
body_size         123 drivers/char/tpm/tpm2-space.c 	unsigned int body_size;
body_size         148 drivers/char/tpm/tpm2-space.c 	body_size = tpm_buf_length(&tbuf) - TPM_HEADER_SIZE;
body_size         149 drivers/char/tpm/tpm2-space.c 	if ((*offset + body_size) > buf_size) {
body_size         155 drivers/char/tpm/tpm2-space.c 	memcpy(&buf[*offset], &tbuf.data[TPM_HEADER_SIZE], body_size);
body_size         156 drivers/char/tpm/tpm2-space.c 	*offset += body_size;
body_size         402 drivers/media/platform/vsp1/vsp1_dl.c 	size_t body_size;
body_size         444 drivers/media/platform/vsp1/vsp1_dl.c 		   vsp1_extended_commands[type].body_size;
body_size         275 drivers/staging/ks7010/ks_hostif.c 	bsize = le16_to_cpu(ap_info->body_size);
body_size         312 drivers/staging/ks7010/ks_hostif.h 	__le16 body_size;	/* +16 */
body_size        1228 fs/ecryptfs/keystore.c 	size_t body_size;
body_size        1270 fs/ecryptfs/keystore.c 	rc = ecryptfs_parse_packet_length(&data[(*packet_size)], &body_size,
body_size        1277 fs/ecryptfs/keystore.c 	if (unlikely(body_size < (ECRYPTFS_SIG_SIZE + 2))) {
body_size        1278 fs/ecryptfs/keystore.c 		printk(KERN_WARNING "Invalid body size ([%td])\n", body_size);
body_size        1283 fs/ecryptfs/keystore.c 	if (unlikely((*packet_size) + body_size > max_packet_size)) {
body_size        1301 fs/ecryptfs/keystore.c 		body_size - (ECRYPTFS_SIG_SIZE + 2);
body_size        1310 fs/ecryptfs/keystore.c 	       &data[(*packet_size)], (body_size - (ECRYPTFS_SIG_SIZE + 2)));
body_size        1360 fs/ecryptfs/keystore.c 	size_t body_size;
body_size        1404 fs/ecryptfs/keystore.c 	rc = ecryptfs_parse_packet_length(&data[(*packet_size)], &body_size,
body_size        1411 fs/ecryptfs/keystore.c 	if (unlikely(body_size < (ECRYPTFS_SALT_SIZE + 5))) {
body_size        1412 fs/ecryptfs/keystore.c 		printk(KERN_WARNING "Invalid body size ([%td])\n", body_size);
body_size        1417 fs/ecryptfs/keystore.c 	if (unlikely((*packet_size) + body_size > max_packet_size)) {
body_size        1423 fs/ecryptfs/keystore.c 		(body_size - (ECRYPTFS_SALT_SIZE + 5));
body_size        1533 fs/ecryptfs/keystore.c 	size_t body_size;
body_size        1563 fs/ecryptfs/keystore.c 	rc = ecryptfs_parse_packet_length(&data[(*packet_size)], &body_size,
body_size        1569 fs/ecryptfs/keystore.c 	if (body_size < 14) {
body_size        1570 fs/ecryptfs/keystore.c 		printk(KERN_WARNING "Invalid body size ([%td])\n", body_size);
body_size        1575 fs/ecryptfs/keystore.c 	(*tag_11_contents_size) = (body_size - 14);
body_size        1576 fs/ecryptfs/keystore.c 	if (unlikely((*packet_size) + body_size + 1 > max_packet_size)) {
body_size          70 include/linux/sunrpc/gss_asn1.h      int *body_size,
body_size          76 include/linux/sunrpc/gss_asn1.h      unsigned int body_size);
body_size          80 include/linux/sunrpc/gss_asn1.h      int body_size,
body_size         147 net/sunrpc/auth_gss/gss_generic_token.c g_token_size(struct xdr_netobj *mech, unsigned int body_size)
body_size         150 net/sunrpc/auth_gss/gss_generic_token.c 	body_size += 2 + (int) mech->len;         /* NEED overflow check */
body_size         151 net/sunrpc/auth_gss/gss_generic_token.c 	return 1 + der_length_size(body_size) + body_size;
body_size         160 net/sunrpc/auth_gss/gss_generic_token.c g_make_token_header(struct xdr_netobj *mech, int body_size, unsigned char **buf)
body_size         163 net/sunrpc/auth_gss/gss_generic_token.c 	der_write_length(buf, 2 + mech->len + body_size);
body_size         180 net/sunrpc/auth_gss/gss_generic_token.c g_verify_token_header(struct xdr_netobj *mech, int *body_size,
body_size         227 net/sunrpc/auth_gss/gss_generic_token.c 		*body_size = toksize;
body_size          77 net/sunrpc/auth_gss/gss_krb5_seal.c 	int body_size = GSS_KRB5_TOK_HDR_LEN + ctx->gk5e->cksumlength;
body_size          79 net/sunrpc/auth_gss/gss_krb5_seal.c 	token->len = g_token_size(&ctx->mech_used, body_size);
body_size          82 net/sunrpc/auth_gss/gss_krb5_seal.c 	g_make_token_header(&ctx->mech_used, body_size, (unsigned char **)&ptr);