body_size 73 drivers/char/tpm/tpm2-space.c unsigned int body_size; body_size 81 drivers/char/tpm/tpm2-space.c body_size = sizeof(*ctx) + be16_to_cpu(ctx->blob_size); body_size 82 drivers/char/tpm/tpm2-space.c tpm_buf_append(&tbuf, &buf[*offset], body_size); body_size 113 drivers/char/tpm/tpm2-space.c *offset += body_size; body_size 123 drivers/char/tpm/tpm2-space.c unsigned int body_size; body_size 148 drivers/char/tpm/tpm2-space.c body_size = tpm_buf_length(&tbuf) - TPM_HEADER_SIZE; body_size 149 drivers/char/tpm/tpm2-space.c if ((*offset + body_size) > buf_size) { body_size 155 drivers/char/tpm/tpm2-space.c memcpy(&buf[*offset], &tbuf.data[TPM_HEADER_SIZE], body_size); body_size 156 drivers/char/tpm/tpm2-space.c *offset += body_size; body_size 402 drivers/media/platform/vsp1/vsp1_dl.c size_t body_size; body_size 444 drivers/media/platform/vsp1/vsp1_dl.c vsp1_extended_commands[type].body_size; body_size 275 drivers/staging/ks7010/ks_hostif.c bsize = le16_to_cpu(ap_info->body_size); body_size 312 drivers/staging/ks7010/ks_hostif.h __le16 body_size; /* +16 */ body_size 1228 fs/ecryptfs/keystore.c size_t body_size; body_size 1270 fs/ecryptfs/keystore.c rc = ecryptfs_parse_packet_length(&data[(*packet_size)], &body_size, body_size 1277 fs/ecryptfs/keystore.c if (unlikely(body_size < (ECRYPTFS_SIG_SIZE + 2))) { body_size 1278 fs/ecryptfs/keystore.c printk(KERN_WARNING "Invalid body size ([%td])\n", body_size); body_size 1283 fs/ecryptfs/keystore.c if (unlikely((*packet_size) + body_size > max_packet_size)) { body_size 1301 fs/ecryptfs/keystore.c body_size - (ECRYPTFS_SIG_SIZE + 2); body_size 1310 fs/ecryptfs/keystore.c &data[(*packet_size)], (body_size - (ECRYPTFS_SIG_SIZE + 2))); body_size 1360 fs/ecryptfs/keystore.c size_t body_size; body_size 1404 fs/ecryptfs/keystore.c rc = ecryptfs_parse_packet_length(&data[(*packet_size)], &body_size, body_size 1411 fs/ecryptfs/keystore.c if (unlikely(body_size < (ECRYPTFS_SALT_SIZE + 5))) { body_size 1412 fs/ecryptfs/keystore.c printk(KERN_WARNING "Invalid body size ([%td])\n", body_size); body_size 1417 fs/ecryptfs/keystore.c if (unlikely((*packet_size) + body_size > max_packet_size)) { body_size 1423 fs/ecryptfs/keystore.c (body_size - (ECRYPTFS_SALT_SIZE + 5)); body_size 1533 fs/ecryptfs/keystore.c size_t body_size; body_size 1563 fs/ecryptfs/keystore.c rc = ecryptfs_parse_packet_length(&data[(*packet_size)], &body_size, body_size 1569 fs/ecryptfs/keystore.c if (body_size < 14) { body_size 1570 fs/ecryptfs/keystore.c printk(KERN_WARNING "Invalid body size ([%td])\n", body_size); body_size 1575 fs/ecryptfs/keystore.c (*tag_11_contents_size) = (body_size - 14); body_size 1576 fs/ecryptfs/keystore.c if (unlikely((*packet_size) + body_size + 1 > max_packet_size)) { body_size 70 include/linux/sunrpc/gss_asn1.h int *body_size, body_size 76 include/linux/sunrpc/gss_asn1.h unsigned int body_size); body_size 80 include/linux/sunrpc/gss_asn1.h int body_size, body_size 147 net/sunrpc/auth_gss/gss_generic_token.c g_token_size(struct xdr_netobj *mech, unsigned int body_size) body_size 150 net/sunrpc/auth_gss/gss_generic_token.c body_size += 2 + (int) mech->len; /* NEED overflow check */ body_size 151 net/sunrpc/auth_gss/gss_generic_token.c return 1 + der_length_size(body_size) + body_size; body_size 160 net/sunrpc/auth_gss/gss_generic_token.c g_make_token_header(struct xdr_netobj *mech, int body_size, unsigned char **buf) body_size 163 net/sunrpc/auth_gss/gss_generic_token.c der_write_length(buf, 2 + mech->len + body_size); body_size 180 net/sunrpc/auth_gss/gss_generic_token.c g_verify_token_header(struct xdr_netobj *mech, int *body_size, body_size 227 net/sunrpc/auth_gss/gss_generic_token.c *body_size = toksize; body_size 77 net/sunrpc/auth_gss/gss_krb5_seal.c int body_size = GSS_KRB5_TOK_HDR_LEN + ctx->gk5e->cksumlength; body_size 79 net/sunrpc/auth_gss/gss_krb5_seal.c token->len = g_token_size(&ctx->mech_used, body_size); body_size 82 net/sunrpc/auth_gss/gss_krb5_seal.c g_make_token_header(&ctx->mech_used, body_size, (unsigned char **)&ptr);