Searched refs:toksize (Results 1 - 6 of 6) sorted by relevance
/kernel/linux/linux-5.10/net/sunrpc/auth_gss/ |
H A D | gss_generic_token.c | 181 unsigned char **buf_in, int toksize) in g_verify_token_header() 188 if ((toksize-=1) < 0) in g_verify_token_header() 193 if ((seqsize = der_read_length(&buf, &toksize)) < 0) in g_verify_token_header() 196 if (seqsize != toksize) in g_verify_token_header() 199 if ((toksize-=1) < 0) in g_verify_token_header() 204 if ((toksize-=1) < 0) in g_verify_token_header() 208 if ((toksize-=toid.len) < 0) in g_verify_token_header() 219 if ((toksize-=2) < 0) in g_verify_token_header() 227 *body_size = toksize; in g_verify_token_header() 180 g_verify_token_header(struct xdr_netobj *mech, int *body_size, unsigned char **buf_in, int toksize) g_verify_token_header() argument
|
/kernel/linux/linux-6.6/net/sunrpc/auth_gss/ |
H A D | gss_generic_token.c | 181 unsigned char **buf_in, int toksize) in g_verify_token_header() 188 if ((toksize-=1) < 0) in g_verify_token_header() 193 if ((seqsize = der_read_length(&buf, &toksize)) < 0) in g_verify_token_header() 196 if (seqsize != toksize) in g_verify_token_header() 199 if ((toksize-=1) < 0) in g_verify_token_header() 204 if ((toksize-=1) < 0) in g_verify_token_header() 208 if ((toksize-=toid.len) < 0) in g_verify_token_header() 219 if ((toksize-=2) < 0) in g_verify_token_header() 226 *body_size = toksize; in g_verify_token_header() 180 g_verify_token_header(struct xdr_netobj *mech, int *body_size, unsigned char **buf_in, int toksize) g_verify_token_header() argument
|
/kernel/linux/linux-5.10/net/rxrpc/ |
H A D | key.c | 1050 u32 cnlen, toksize, ntoks, tok, zero; in rxrpc_read() local 1071 toksize = 4; /* sec index */ in rxrpc_read() 1075 toksize += 8 * 4; /* viceid, kvno, key*2, begin, in rxrpc_read() 1077 toksize += RND(token->kad->ticket_len); in rxrpc_read() 1082 toksize += 4 + princ->n_name_parts * 4; in rxrpc_read() 1084 toksize += RND(strlen(princ->name_parts[loop])); in rxrpc_read() 1085 toksize += 4 + RND(strlen(princ->realm)); in rxrpc_read() 1088 toksize += 4 + princ->n_name_parts * 4; in rxrpc_read() 1090 toksize += RND(strlen(princ->name_parts[loop])); in rxrpc_read() 1091 toksize in rxrpc_read() [all...] |
/kernel/linux/linux-6.6/net/rxrpc/ |
H A D | key.c | 568 u32 cnlen, toksize, ntoks, tok, zero; in rxrpc_read() local 588 toksize = 4; /* sec index */ in rxrpc_read() 592 toksize += 8 * 4; /* viceid, kvno, key*2, begin, in rxrpc_read() 595 toksize += RND(token->kad->ticket_len); in rxrpc_read() 604 _debug("token[%u]: toksize=%u", ntoks, toksize); in rxrpc_read() 605 if (WARN_ON(toksize > AFSTOKEN_LENGTH_MAX)) in rxrpc_read() 608 toksizes[ntoks++] = toksize; in rxrpc_read() 609 size += toksize + 4; /* each token has a length word */ in rxrpc_read() 658 toksize in rxrpc_read() [all...] |
/kernel/linux/linux-5.10/include/linux/sunrpc/ |
H A D | gss_asn1.h | 72 int toksize);
|
/kernel/linux/linux-6.6/include/linux/sunrpc/ |
H A D | gss_asn1.h | 72 int toksize);
|
Completed in 5 milliseconds