/linux-6.1.9/io_uring/ |
D | opdef.c | 54 .prep = io_nop_prep, 69 .prep = io_prep_rw, 87 .prep = io_prep_rw, 97 .prep = io_fsync_prep, 111 .prep = io_prep_rw, 127 .prep = io_prep_rw, 136 .prep = io_poll_add_prep, 142 .prep = io_poll_remove_prep, 149 .prep = io_sfr_prep, 161 .prep = io_sendmsg_prep, [all …]
|
/linux-6.1.9/crypto/asymmetric_keys/ |
D | pkcs7_key_type.c | 31 struct key_preparsed_payload *prep = ctx; in pkcs7_view_content() local 36 saved_prep_data = prep->data; in pkcs7_view_content() 37 saved_prep_datalen = prep->datalen; in pkcs7_view_content() 38 prep->data = data; in pkcs7_view_content() 39 prep->datalen = len; in pkcs7_view_content() 41 ret = user_preparse(prep); in pkcs7_view_content() 43 prep->data = saved_prep_data; in pkcs7_view_content() 44 prep->datalen = saved_prep_datalen; in pkcs7_view_content() 51 static int pkcs7_preparse(struct key_preparsed_payload *prep) in pkcs7_preparse() argument 61 prep->data, prep->datalen, in pkcs7_preparse() [all …]
|
D | pkcs8_parser.c | 136 static int pkcs8_key_preparse(struct key_preparsed_payload *prep) in pkcs8_key_preparse() argument 140 pub = pkcs8_parse(prep->data, prep->datalen); in pkcs8_key_preparse() 149 prep->payload.data[asym_subtype] = &public_key_subtype; in pkcs8_key_preparse() 150 prep->payload.data[asym_key_ids] = NULL; in pkcs8_key_preparse() 151 prep->payload.data[asym_crypto] = pub; in pkcs8_key_preparse() 152 prep->payload.data[asym_auth] = NULL; in pkcs8_key_preparse() 153 prep->quotalen = 100; in pkcs8_key_preparse()
|
D | x509_public_key.c | 144 static int x509_key_preparse(struct key_preparsed_payload *prep) in x509_key_preparse() argument 153 cert = x509_cert_parse(prep->data, prep->datalen); in x509_key_preparse() 213 prep->payload.data[asym_subtype] = &public_key_subtype; in x509_key_preparse() 214 prep->payload.data[asym_key_ids] = kids; in x509_key_preparse() 215 prep->payload.data[asym_crypto] = cert->pub; in x509_key_preparse() 216 prep->payload.data[asym_auth] = cert->sig; in x509_key_preparse() 217 prep->description = desc; in x509_key_preparse() 218 prep->quotalen = 100; in x509_key_preparse()
|
D | asymmetric_type.c | 402 static int asymmetric_key_preparse(struct key_preparsed_payload *prep) in asymmetric_key_preparse() argument 409 if (prep->datalen == 0) in asymmetric_key_preparse() 418 ret = parser->parse(prep); in asymmetric_key_preparse() 448 static void asymmetric_key_free_preparse(struct key_preparsed_payload *prep) in asymmetric_key_free_preparse() argument 450 struct asymmetric_key_subtype *subtype = prep->payload.data[asym_subtype]; in asymmetric_key_free_preparse() 451 struct asymmetric_key_ids *kids = prep->payload.data[asym_key_ids]; in asymmetric_key_free_preparse() 456 subtype->destroy(prep->payload.data[asym_crypto], in asymmetric_key_free_preparse() 457 prep->payload.data[asym_auth]); in asymmetric_key_free_preparse() 461 kfree(prep->description); in asymmetric_key_free_preparse()
|
/linux-6.1.9/security/keys/ |
D | key.c | 425 struct key_preparsed_payload *prep, in __key_instantiate_and_link() argument 443 ret = key->type->instantiate(key, prep); in __key_instantiate_and_link() 466 if (prep->expiry != TIME64_MAX) { in __key_instantiate_and_link() 467 key->expiry = prep->expiry; in __key_instantiate_and_link() 468 key_schedule_gc(prep->expiry + key_gc_delay); in __key_instantiate_and_link() 504 struct key_preparsed_payload prep; in key_instantiate_and_link() local 508 memset(&prep, 0, sizeof(prep)); in key_instantiate_and_link() 509 prep.orig_description = key->description; in key_instantiate_and_link() 510 prep.data = data; in key_instantiate_and_link() 511 prep.datalen = datalen; in key_instantiate_and_link() [all …]
|
D | user_defined.c | 59 int user_preparse(struct key_preparsed_payload *prep) in user_preparse() argument 62 size_t datalen = prep->datalen; in user_preparse() 64 if (datalen <= 0 || datalen > 32767 || !prep->data) in user_preparse() 72 prep->quotalen = datalen; in user_preparse() 73 prep->payload.data[0] = upayload; in user_preparse() 75 memcpy(upayload->data, prep->data, datalen); in user_preparse() 83 void user_free_preparse(struct key_preparsed_payload *prep) in user_free_preparse() argument 85 kfree_sensitive(prep->payload.data[0]); in user_free_preparse() 101 int user_update(struct key *key, struct key_preparsed_payload *prep) in user_update() argument 107 ret = key_payload_reserve(key, prep->datalen); in user_update() [all …]
|
D | big_key.c | 57 int big_key_preparse(struct key_preparsed_payload *prep) in big_key_preparse() argument 59 struct big_key_payload *payload = to_big_key_payload(prep->payload); in big_key_preparse() 63 size_t datalen = prep->datalen; in big_key_preparse() 67 BUILD_BUG_ON(sizeof(*payload) != sizeof(prep->payload.data)); in big_key_preparse() 69 if (datalen <= 0 || datalen > 1024 * 1024 || !prep->data) in big_key_preparse() 73 prep->quotalen = 16; in big_key_preparse() 102 chacha20poly1305_encrypt(buf, prep->data, datalen, NULL, 0, in big_key_preparse() 136 memcpy(data, prep->data, prep->datalen); in big_key_preparse() 152 void big_key_free_preparse(struct key_preparsed_payload *prep) in big_key_free_preparse() argument 154 struct big_key_payload *payload = to_big_key_payload(prep->payload); in big_key_free_preparse() [all …]
|
D | request_key_auth.c | 42 static int request_key_auth_preparse(struct key_preparsed_payload *prep) in request_key_auth_preparse() argument 47 static void request_key_auth_free_preparse(struct key_preparsed_payload *prep) in request_key_auth_free_preparse() argument 55 struct key_preparsed_payload *prep) in request_key_auth_instantiate() argument 57 rcu_assign_keypointer(key, (struct request_key_auth *)prep->data); in request_key_auth_instantiate()
|
/linux-6.1.9/net/rxrpc/ |
D | key.c | 52 static int rxrpc_preparse_xdr_rxkad(struct key_preparsed_payload *prep, in rxrpc_preparse_xdr_rxkad() argument 75 prep->quotalen = datalen + plen; in rxrpc_preparse_xdr_rxkad() 116 prep->payload.data[1] = (void *)((unsigned long)prep->payload.data[1] + 1); in rxrpc_preparse_xdr_rxkad() 119 for (pptoken = (struct rxrpc_key_token **)&prep->payload.data[0]; in rxrpc_preparse_xdr_rxkad() 125 if (expiry < prep->expiry) in rxrpc_preparse_xdr_rxkad() 126 prep->expiry = expiry; in rxrpc_preparse_xdr_rxkad() 136 static int rxrpc_preparse_xdr(struct key_preparsed_payload *prep) in rxrpc_preparse_xdr() argument 138 const __be32 *xdr = prep->data, *token, *p; in rxrpc_preparse_xdr() 141 size_t datalen = prep->datalen; in rxrpc_preparse_xdr() 146 prep->datalen); in rxrpc_preparse_xdr() [all …]
|
D | server_key.c | 67 static int rxrpc_preparse_s(struct key_preparsed_payload *prep) in rxrpc_preparse_s() argument 73 _enter("%zu", prep->datalen); in rxrpc_preparse_s() 75 if (!prep->orig_description) in rxrpc_preparse_s() 78 if (sscanf(prep->orig_description, "%u:%u%n", &service, &sec_class, &n) != 2) in rxrpc_preparse_s() 85 prep->payload.data[1] = (struct rxrpc_security *)sec; in rxrpc_preparse_s() 90 return sec->preparse_server_key(prep); in rxrpc_preparse_s() 93 static void rxrpc_free_preparse_s(struct key_preparsed_payload *prep) in rxrpc_free_preparse_s() argument 95 const struct rxrpc_security *sec = prep->payload.data[1]; in rxrpc_free_preparse_s() 98 sec->free_preparse_server_key(prep); in rxrpc_free_preparse_s()
|
/linux-6.1.9/net/dns_resolver/ |
D | dns_key.c | 92 dns_resolver_preparse(struct key_preparsed_payload *prep) in dns_resolver_preparse() argument 98 int datalen = prep->datalen, result_len = 0; in dns_resolver_preparse() 99 const char *data = prep->data, *end, *opt; in dns_resolver_preparse() 189 prep->payload.data[dns_key_error] = ERR_PTR(-derrno); in dns_resolver_preparse() 202 if (prep->payload.data[dns_key_error]) { in dns_resolver_preparse() 203 kleave(" = 0 [h_error %ld]", PTR_ERR(prep->payload.data[dns_key_error])); in dns_resolver_preparse() 209 prep->quotalen = result_len; in dns_resolver_preparse() 221 prep->payload.data[dns_key_data] = upayload; in dns_resolver_preparse() 229 static void dns_resolver_free_preparse(struct key_preparsed_payload *prep) in dns_resolver_free_preparse() argument 233 kfree(prep->payload.data[dns_key_data]); in dns_resolver_free_preparse()
|
/linux-6.1.9/include/linux/ |
D | key-type.h | 84 int (*preparse)(struct key_preparsed_payload *prep); 88 void (*free_preparse)(struct key_preparsed_payload *prep); 94 int (*instantiate)(struct key *key, struct key_preparsed_payload *prep); 101 int (*update)(struct key *key, struct key_preparsed_payload *prep); 190 extern int generic_key_instantiate(struct key *key, struct key_preparsed_payload *prep);
|
/linux-6.1.9/net/ceph/ |
D | crypto.c | 298 static int ceph_key_preparse(struct key_preparsed_payload *prep) in ceph_key_preparse() argument 301 size_t datalen = prep->datalen; in ceph_key_preparse() 306 if (datalen <= 0 || datalen > 32767 || !prep->data) in ceph_key_preparse() 315 p = (void *)prep->data; in ceph_key_preparse() 316 ret = ceph_crypto_key_decode(ckey, &p, (char*)prep->data+datalen); in ceph_key_preparse() 320 prep->payload.data[0] = ckey; in ceph_key_preparse() 321 prep->quotalen = datalen; in ceph_key_preparse() 330 static void ceph_key_free_preparse(struct key_preparsed_payload *prep) in ceph_key_free_preparse() argument 332 struct ceph_crypto_key *ckey = prep->payload.data[0]; in ceph_key_free_preparse()
|
/linux-6.1.9/include/keys/ |
D | big_key-type.h | 15 extern int big_key_preparse(struct key_preparsed_payload *prep); 16 extern void big_key_free_preparse(struct key_preparsed_payload *prep); 21 extern int big_key_update(struct key *key, struct key_preparsed_payload *prep);
|
D | user-type.h | 38 extern int user_preparse(struct key_preparsed_payload *prep); 39 extern void user_free_preparse(struct key_preparsed_payload *prep); 40 extern int user_update(struct key *key, struct key_preparsed_payload *prep);
|
/linux-6.1.9/security/keys/trusted-keys/ |
D | trusted_core.c | 148 struct key_preparsed_payload *prep) in trusted_instantiate() argument 151 size_t datalen = prep->datalen; in trusted_instantiate() 157 if (datalen <= 0 || datalen > 32767 || !prep->data) in trusted_instantiate() 163 memcpy(datablob, prep->data, datalen); in trusted_instantiate() 227 static int trusted_update(struct key *key, struct key_preparsed_payload *prep) in trusted_update() argument 231 size_t datalen = prep->datalen; in trusted_update() 240 if (datalen <= 0 || datalen > 32767 || !prep->data) in trusted_update() 253 memcpy(datablob, prep->data, datalen); in trusted_update()
|
/linux-6.1.9/net/smc/ |
D | smc_tx.h | 23 union smc_host_cursor sent, prep; in smc_tx_prepared_sends() local 26 smc_curs_copy(&prep, &conn->tx_curs_prep, conn); in smc_tx_prepared_sends() 27 return smc_curs_diff(conn->sndbuf_desc->len, &sent, &prep); in smc_tx_prepared_sends()
|
D | smc_tx.c | 187 union smc_host_cursor prep; in smc_tx_sendmsg() local 241 smc_curs_copy(&prep, &conn->tx_curs_prep, conn); in smc_tx_sendmsg() 242 tx_cnt_prep = prep.count; in smc_tx_sendmsg() 270 smc_curs_add(conn->sndbuf_desc->len, &prep, copylen); in smc_tx_sendmsg() 271 smc_curs_copy(&conn->tx_curs_prep, &prep, conn); in smc_tx_sendmsg() 484 union smc_host_cursor sent, prep, prod, cons; in smc_tx_rdma_writes() local 491 smc_curs_copy(&prep, &conn->tx_curs_prep, conn); in smc_tx_rdma_writes() 493 to_send = smc_curs_diff(conn->sndbuf_desc->len, &sent, &prep); in smc_tx_rdma_writes()
|
/linux-6.1.9/certs/ |
D | blacklist.c | 87 struct key_preparsed_payload *prep) in blacklist_key_instantiate() argument 109 strlen(key->description), prep->data, prep->datalen, in blacklist_key_instantiate() 124 return generic_key_instantiate(key, prep); in blacklist_key_instantiate() 128 struct key_preparsed_payload *prep) in blacklist_key_update() argument
|
/linux-6.1.9/fs/crypto/ |
D | keyring.c | 131 struct key_preparsed_payload *prep) in fscrypt_user_key_instantiate() argument 562 static int fscrypt_provisioning_key_preparse(struct key_preparsed_payload *prep) in fscrypt_provisioning_key_preparse() argument 564 const struct fscrypt_provisioning_key_payload *payload = prep->data; in fscrypt_provisioning_key_preparse() 566 if (prep->datalen < sizeof(*payload) + FSCRYPT_MIN_KEY_SIZE || in fscrypt_provisioning_key_preparse() 567 prep->datalen > sizeof(*payload) + FSCRYPT_MAX_KEY_SIZE) in fscrypt_provisioning_key_preparse() 577 prep->payload.data[0] = kmemdup(payload, prep->datalen, GFP_KERNEL); in fscrypt_provisioning_key_preparse() 578 if (!prep->payload.data[0]) in fscrypt_provisioning_key_preparse() 581 prep->quotalen = prep->datalen; in fscrypt_provisioning_key_preparse() 586 struct key_preparsed_payload *prep) in fscrypt_provisioning_key_free_preparse() argument 588 kfree_sensitive(prep->payload.data[0]); in fscrypt_provisioning_key_free_preparse()
|
/linux-6.1.9/fs/cifs/ |
D | cifs_spnego.c | 25 cifs_spnego_key_instantiate(struct key *key, struct key_preparsed_payload *prep) in cifs_spnego_key_instantiate() argument 31 payload = kmemdup(prep->data, prep->datalen, GFP_KERNEL); in cifs_spnego_key_instantiate()
|
/linux-6.1.9/arch/loongarch/kernel/ |
D | genex.S | 67 .macro BUILD_HANDLER exception handler prep argument 72 build_prep_\prep
|
/linux-6.1.9/drivers/net/wwan/iosm/ |
D | iosm_ipc_protocol.c | 56 enum ipc_msg_prep_type prep, in ipc_protocol_msg_send() argument 75 send_args.msg_type = prep; in ipc_protocol_msg_send() 88 dev_err(ipc_protocol->dev, "msg %d failed", prep); in ipc_protocol_msg_send()
|
/linux-6.1.9/security/keys/encrypted-keys/ |
D | encrypted.c | 814 struct key_preparsed_payload *prep) in encrypted_instantiate() argument 823 size_t datalen = prep->datalen; in encrypted_instantiate() 826 if (datalen <= 0 || datalen > 32767 || !prep->data) in encrypted_instantiate() 833 memcpy(datablob, prep->data, datalen); in encrypted_instantiate() 875 static int encrypted_update(struct key *key, struct key_preparsed_payload *prep) in encrypted_update() argument 882 size_t datalen = prep->datalen; in encrypted_update() 887 if (datalen <= 0 || datalen > 32767 || !prep->data) in encrypted_update() 895 memcpy(buf, prep->data, datalen); in encrypted_update()
|