Home
last modified time | relevance | path

Searched full:prep (Results 1 – 25 of 447) sorted by relevance

12345678910>>...18

/kernel/linux/linux-6.6/io_uring/
Dopdef.c53 .prep = io_nop_prep,
66 .prep = io_prep_rw,
79 .prep = io_prep_rw,
85 .prep = io_fsync_prep,
97 .prep = io_prep_rw,
110 .prep = io_prep_rw,
117 .prep = io_poll_add_prep,
122 .prep = io_poll_remove_prep,
128 .prep = io_sfr_prep,
138 .prep = io_sendmsg_prep,
[all …]
/kernel/linux/linux-6.6/crypto/asymmetric_keys/
Dpkcs7_key_type.c31 struct key_preparsed_payload *prep = ctx; in pkcs7_view_content() local
36 saved_prep_data = prep->data; in pkcs7_view_content()
37 saved_prep_datalen = prep->datalen; in pkcs7_view_content()
38 prep->data = data; in pkcs7_view_content()
39 prep->datalen = len; in pkcs7_view_content()
41 ret = user_preparse(prep); in pkcs7_view_content()
43 prep->data = saved_prep_data; in pkcs7_view_content()
44 prep->datalen = saved_prep_datalen; in pkcs7_view_content()
51 static int pkcs7_preparse(struct key_preparsed_payload *prep) in pkcs7_preparse() argument
61 prep->data, prep->datalen, in pkcs7_preparse()
[all …]
Dpkcs8_parser.c136 static int pkcs8_key_preparse(struct key_preparsed_payload *prep) in pkcs8_key_preparse() argument
140 pub = pkcs8_parse(prep->data, prep->datalen); in pkcs8_key_preparse()
149 prep->payload.data[asym_subtype] = &public_key_subtype; in pkcs8_key_preparse()
150 prep->payload.data[asym_key_ids] = NULL; in pkcs8_key_preparse()
151 prep->payload.data[asym_crypto] = pub; in pkcs8_key_preparse()
152 prep->payload.data[asym_auth] = NULL; in pkcs8_key_preparse()
153 prep->quotalen = 100; in pkcs8_key_preparse()
Dx509_public_key.c162 static int x509_key_preparse(struct key_preparsed_payload *prep) in x509_key_preparse() argument
171 cert = x509_cert_parse(prep->data, prep->datalen); in x509_key_preparse()
231 prep->payload.data[asym_subtype] = &public_key_subtype; in x509_key_preparse()
232 prep->payload.data[asym_key_ids] = kids; in x509_key_preparse()
233 prep->payload.data[asym_crypto] = cert->pub; in x509_key_preparse()
234 prep->payload.data[asym_auth] = cert->sig; in x509_key_preparse()
235 prep->description = desc; in x509_key_preparse()
236 prep->quotalen = 100; in x509_key_preparse()
/kernel/linux/linux-5.10/crypto/asymmetric_keys/
Dpkcs7_key_type.c31 struct key_preparsed_payload *prep = ctx; in pkcs7_view_content() local
36 saved_prep_data = prep->data; in pkcs7_view_content()
37 saved_prep_datalen = prep->datalen; in pkcs7_view_content()
38 prep->data = data; in pkcs7_view_content()
39 prep->datalen = len; in pkcs7_view_content()
41 ret = user_preparse(prep); in pkcs7_view_content()
43 prep->data = saved_prep_data; in pkcs7_view_content()
44 prep->datalen = saved_prep_datalen; in pkcs7_view_content()
51 static int pkcs7_preparse(struct key_preparsed_payload *prep) in pkcs7_preparse() argument
61 prep->data, prep->datalen, in pkcs7_preparse()
[all …]
Dtpm_parser.c56 static int tpm_key_preparse(struct key_preparsed_payload *prep) in tpm_key_preparse() argument
64 if (prep->datalen > 256 * 4) in tpm_key_preparse()
67 tk = tpm_parse(prep->data, prep->datalen); in tpm_key_preparse()
74 prep->payload.data[asym_subtype] = &asym_tpm_subtype; in tpm_key_preparse()
75 prep->payload.data[asym_key_ids] = NULL; in tpm_key_preparse()
76 prep->payload.data[asym_crypto] = tk; in tpm_key_preparse()
77 prep->payload.data[asym_auth] = NULL; in tpm_key_preparse()
78 prep->quotalen = 100; in tpm_key_preparse()
Dpkcs8_parser.c136 static int pkcs8_key_preparse(struct key_preparsed_payload *prep) in pkcs8_key_preparse() argument
140 pub = pkcs8_parse(prep->data, prep->datalen); in pkcs8_key_preparse()
149 prep->payload.data[asym_subtype] = &public_key_subtype; in pkcs8_key_preparse()
150 prep->payload.data[asym_key_ids] = NULL; in pkcs8_key_preparse()
151 prep->payload.data[asym_crypto] = pub; in pkcs8_key_preparse()
152 prep->payload.data[asym_auth] = NULL; in pkcs8_key_preparse()
153 prep->quotalen = 100; in pkcs8_key_preparse()
Dx509_public_key.c160 static int x509_key_preparse(struct key_preparsed_payload *prep) in x509_key_preparse() argument
169 cert = x509_cert_parse(prep->data, prep->datalen); in x509_key_preparse()
228 prep->payload.data[asym_subtype] = &public_key_subtype; in x509_key_preparse()
229 prep->payload.data[asym_key_ids] = kids; in x509_key_preparse()
230 prep->payload.data[asym_crypto] = cert->pub; in x509_key_preparse()
231 prep->payload.data[asym_auth] = cert->sig; in x509_key_preparse()
232 prep->description = desc; in x509_key_preparse()
233 prep->quotalen = 100; in x509_key_preparse()
/kernel/linux/linux-5.10/security/keys/
Dbig_key.c56 int big_key_preparse(struct key_preparsed_payload *prep) in big_key_preparse() argument
58 struct path *path = (struct path *)&prep->payload.data[big_key_path]; in big_key_preparse()
62 size_t datalen = prep->datalen; in big_key_preparse()
66 if (datalen <= 0 || datalen > 1024 * 1024 || !prep->data) in big_key_preparse()
70 prep->quotalen = 16; in big_key_preparse()
72 prep->payload.data[big_key_len] = (void *)(unsigned long)datalen; in big_key_preparse()
99 chacha20poly1305_encrypt(buf, prep->data, datalen, NULL, 0, in big_key_preparse()
120 prep->payload.data[big_key_data] = enckey; in big_key_preparse()
133 prep->payload.data[big_key_data] = data; in big_key_preparse()
134 memcpy(data, prep->data, prep->datalen); in big_key_preparse()
[all …]
Duser_defined.c59 int user_preparse(struct key_preparsed_payload *prep) in user_preparse() argument
62 size_t datalen = prep->datalen; in user_preparse()
64 if (datalen <= 0 || datalen > 32767 || !prep->data) in user_preparse()
72 prep->quotalen = datalen; in user_preparse()
73 prep->payload.data[0] = upayload; in user_preparse()
75 memcpy(upayload->data, prep->data, datalen); in user_preparse()
83 void user_free_preparse(struct key_preparsed_payload *prep) in user_free_preparse() argument
85 kfree_sensitive(prep->payload.data[0]); in user_free_preparse()
101 int user_update(struct key *key, struct key_preparsed_payload *prep) in user_update() argument
107 ret = key_payload_reserve(key, prep->datalen); in user_update()
[all …]
Dkey.c426 struct key_preparsed_payload *prep, in __key_instantiate_and_link() argument
444 ret = key->type->instantiate(key, prep); in __key_instantiate_and_link()
467 if (prep->expiry != TIME64_MAX) in __key_instantiate_and_link()
468 key_set_expiry(key, prep->expiry); in __key_instantiate_and_link()
503 struct key_preparsed_payload prep; in key_instantiate_and_link() local
507 memset(&prep, 0, sizeof(prep)); in key_instantiate_and_link()
508 prep.data = data; in key_instantiate_and_link()
509 prep.datalen = datalen; in key_instantiate_and_link()
510 prep.quotalen = key->type->def_datalen; in key_instantiate_and_link()
511 prep.expiry = TIME64_MAX; in key_instantiate_and_link()
[all …]
/kernel/linux/linux-6.6/security/keys/
Duser_defined.c59 int user_preparse(struct key_preparsed_payload *prep) in user_preparse() argument
62 size_t datalen = prep->datalen; in user_preparse()
64 if (datalen <= 0 || datalen > 32767 || !prep->data) in user_preparse()
72 prep->quotalen = datalen; in user_preparse()
73 prep->payload.data[0] = upayload; in user_preparse()
75 memcpy(upayload->data, prep->data, datalen); in user_preparse()
83 void user_free_preparse(struct key_preparsed_payload *prep) in user_free_preparse() argument
85 kfree_sensitive(prep->payload.data[0]); in user_free_preparse()
101 int user_update(struct key *key, struct key_preparsed_payload *prep) in user_update() argument
107 ret = key_payload_reserve(key, prep->datalen); in user_update()
[all …]
Dkey.c426 struct key_preparsed_payload *prep, in __key_instantiate_and_link() argument
444 ret = key->type->instantiate(key, prep); in __key_instantiate_and_link()
467 if (prep->expiry != TIME64_MAX) in __key_instantiate_and_link()
468 key_set_expiry(key, prep->expiry); in __key_instantiate_and_link()
503 struct key_preparsed_payload prep; in key_instantiate_and_link() local
507 memset(&prep, 0, sizeof(prep)); in key_instantiate_and_link()
508 prep.orig_description = key->description; in key_instantiate_and_link()
509 prep.data = data; in key_instantiate_and_link()
510 prep.datalen = datalen; in key_instantiate_and_link()
511 prep.quotalen = key->type->def_datalen; in key_instantiate_and_link()
[all …]
Dbig_key.c57 int big_key_preparse(struct key_preparsed_payload *prep) in big_key_preparse() argument
59 struct big_key_payload *payload = to_big_key_payload(prep->payload); in big_key_preparse()
63 size_t datalen = prep->datalen; in big_key_preparse()
67 BUILD_BUG_ON(sizeof(*payload) != sizeof(prep->payload.data)); in big_key_preparse()
69 if (datalen <= 0 || datalen > 1024 * 1024 || !prep->data) in big_key_preparse()
73 prep->quotalen = 16; in big_key_preparse()
102 chacha20poly1305_encrypt(buf, prep->data, datalen, NULL, 0, in big_key_preparse()
136 memcpy(data, prep->data, prep->datalen); in big_key_preparse()
152 void big_key_free_preparse(struct key_preparsed_payload *prep) in big_key_free_preparse() argument
154 struct big_key_payload *payload = to_big_key_payload(prep->payload); in big_key_free_preparse()
[all …]
/kernel/linux/linux-6.6/net/rxrpc/
Dkey.c52 static int rxrpc_preparse_xdr_rxkad(struct key_preparsed_payload *prep, in rxrpc_preparse_xdr_rxkad() argument
75 prep->quotalen = datalen + plen; in rxrpc_preparse_xdr_rxkad()
116 prep->payload.data[1] = (void *)((unsigned long)prep->payload.data[1] + 1); in rxrpc_preparse_xdr_rxkad()
119 for (pptoken = (struct rxrpc_key_token **)&prep->payload.data[0]; in rxrpc_preparse_xdr_rxkad()
125 if (expiry < prep->expiry) in rxrpc_preparse_xdr_rxkad()
126 prep->expiry = expiry; in rxrpc_preparse_xdr_rxkad()
136 static int rxrpc_preparse_xdr(struct key_preparsed_payload *prep) in rxrpc_preparse_xdr() argument
138 const __be32 *xdr = prep->data, *token, *p; in rxrpc_preparse_xdr()
141 size_t datalen = prep->datalen; in rxrpc_preparse_xdr()
146 prep->datalen); in rxrpc_preparse_xdr()
[all …]
Dserver_key.c67 static int rxrpc_preparse_s(struct key_preparsed_payload *prep) in rxrpc_preparse_s() argument
73 _enter("%zu", prep->datalen); in rxrpc_preparse_s()
75 if (!prep->orig_description) in rxrpc_preparse_s()
78 if (sscanf(prep->orig_description, "%u:%u%n", &service, &sec_class, &n) != 2) in rxrpc_preparse_s()
85 prep->payload.data[1] = (struct rxrpc_security *)sec; in rxrpc_preparse_s()
90 return sec->preparse_server_key(prep); in rxrpc_preparse_s()
93 static void rxrpc_free_preparse_s(struct key_preparsed_payload *prep) in rxrpc_free_preparse_s() argument
95 const struct rxrpc_security *sec = prep->payload.data[1]; in rxrpc_free_preparse_s()
98 sec->free_preparse_server_key(prep); in rxrpc_free_preparse_s()
/kernel/linux/linux-5.10/net/rxrpc/
Dkey.c88 static int rxrpc_preparse_xdr_rxkad(struct key_preparsed_payload *prep, in rxrpc_preparse_xdr_rxkad() argument
111 prep->quotalen = datalen + plen; in rxrpc_preparse_xdr_rxkad()
152 prep->payload.data[1] = (void *)((unsigned long)prep->payload.data[1] + 1); in rxrpc_preparse_xdr_rxkad()
155 for (pptoken = (struct rxrpc_key_token **)&prep->payload.data[0]; in rxrpc_preparse_xdr_rxkad()
161 if (expiry < prep->expiry) in rxrpc_preparse_xdr_rxkad()
162 prep->expiry = expiry; in rxrpc_preparse_xdr_rxkad()
429 static int rxrpc_preparse_xdr_rxk5(struct key_preparsed_payload *prep, in rxrpc_preparse_xdr_rxk5() argument
445 prep->quotalen = datalen + toklen; in rxrpc_preparse_xdr_rxk5()
532 for (pptoken = (struct rxrpc_key_token **)&prep->payload.data[0]; in rxrpc_preparse_xdr_rxk5()
538 if (expiry < prep->expiry) in rxrpc_preparse_xdr_rxk5()
[all …]
/kernel/linux/linux-5.10/net/dns_resolver/
Ddns_key.c92 dns_resolver_preparse(struct key_preparsed_payload *prep) in dns_resolver_preparse() argument
97 int datalen = prep->datalen, result_len = 0; in dns_resolver_preparse()
98 const char *data = prep->data, *end, *opt; in dns_resolver_preparse()
128 if (prep->expiry == TIME64_MAX) in dns_resolver_preparse()
129 prep->expiry = ktime_get_real_seconds() + 1; in dns_resolver_preparse()
196 prep->payload.data[dns_key_error] = ERR_PTR(-derrno); in dns_resolver_preparse()
209 if (prep->payload.data[dns_key_error]) { in dns_resolver_preparse()
210 kleave(" = 0 [h_error %ld]", PTR_ERR(prep->payload.data[dns_key_error])); in dns_resolver_preparse()
216 prep->quotalen = result_len; in dns_resolver_preparse()
228 prep->payload.data[dns_key_data] = upayload; in dns_resolver_preparse()
[all …]
/kernel/linux/linux-6.6/net/dns_resolver/
Ddns_key.c92 dns_resolver_preparse(struct key_preparsed_payload *prep) in dns_resolver_preparse() argument
97 int datalen = prep->datalen, result_len = 0; in dns_resolver_preparse()
98 const char *data = prep->data, *end, *opt; in dns_resolver_preparse()
128 if (prep->expiry == TIME64_MAX) in dns_resolver_preparse()
129 prep->expiry = ktime_get_real_seconds() + 1; in dns_resolver_preparse()
196 prep->payload.data[dns_key_error] = ERR_PTR(-derrno); in dns_resolver_preparse()
209 if (prep->payload.data[dns_key_error]) { in dns_resolver_preparse()
210 kleave(" = 0 [h_error %ld]", PTR_ERR(prep->payload.data[dns_key_error])); in dns_resolver_preparse()
216 prep->quotalen = result_len; in dns_resolver_preparse()
228 prep->payload.data[dns_key_data] = upayload; in dns_resolver_preparse()
[all …]
/kernel/linux/linux-5.10/net/ceph/
Dcrypto.c297 static int ceph_key_preparse(struct key_preparsed_payload *prep) in ceph_key_preparse() argument
300 size_t datalen = prep->datalen; in ceph_key_preparse()
305 if (datalen <= 0 || datalen > 32767 || !prep->data) in ceph_key_preparse()
314 p = (void *)prep->data; in ceph_key_preparse()
315 ret = ceph_crypto_key_decode(ckey, &p, (char*)prep->data+datalen); in ceph_key_preparse()
319 prep->payload.data[0] = ckey; in ceph_key_preparse()
320 prep->quotalen = datalen; in ceph_key_preparse()
329 static void ceph_key_free_preparse(struct key_preparsed_payload *prep) in ceph_key_free_preparse() argument
331 struct ceph_crypto_key *ckey = prep->payload.data[0]; in ceph_key_free_preparse()
/kernel/linux/linux-6.6/net/ceph/
Dcrypto.c298 static int ceph_key_preparse(struct key_preparsed_payload *prep) in ceph_key_preparse() argument
301 size_t datalen = prep->datalen; in ceph_key_preparse()
306 if (datalen <= 0 || datalen > 32767 || !prep->data) in ceph_key_preparse()
315 p = (void *)prep->data; in ceph_key_preparse()
316 ret = ceph_crypto_key_decode(ckey, &p, (char*)prep->data+datalen); in ceph_key_preparse()
320 prep->payload.data[0] = ckey; in ceph_key_preparse()
321 prep->quotalen = datalen; in ceph_key_preparse()
330 static void ceph_key_free_preparse(struct key_preparsed_payload *prep) in ceph_key_free_preparse() argument
332 struct ceph_crypto_key *ckey = prep->payload.data[0]; in ceph_key_free_preparse()
/kernel/linux/linux-6.6/include/keys/
Dbig_key-type.h15 extern int big_key_preparse(struct key_preparsed_payload *prep);
16 extern void big_key_free_preparse(struct key_preparsed_payload *prep);
21 extern int big_key_update(struct key *key, struct key_preparsed_payload *prep);
/kernel/linux/linux-5.10/include/keys/
Dbig_key-type.h15 extern int big_key_preparse(struct key_preparsed_payload *prep);
16 extern void big_key_free_preparse(struct key_preparsed_payload *prep);
21 extern int big_key_update(struct key *key, struct key_preparsed_payload *prep);
/kernel/linux/linux-6.6/security/keys/trusted-keys/
Dtrusted_core.c147 struct key_preparsed_payload *prep) in trusted_instantiate() argument
150 size_t datalen = prep->datalen; in trusted_instantiate()
156 if (datalen <= 0 || datalen > 32767 || !prep->data) in trusted_instantiate()
162 memcpy(datablob, prep->data, datalen); in trusted_instantiate()
226 static int trusted_update(struct key *key, struct key_preparsed_payload *prep) in trusted_update() argument
230 size_t datalen = prep->datalen; in trusted_update()
239 if (datalen <= 0 || datalen > 32767 || !prep->data) in trusted_update()
252 memcpy(datablob, prep->data, datalen); in trusted_update()
/kernel/linux/linux-6.6/net/smc/
Dsmc_tx.h23 union smc_host_cursor sent, prep; in smc_tx_prepared_sends() local
26 smc_curs_copy(&prep, &conn->tx_curs_prep, conn); in smc_tx_prepared_sends()
27 return smc_curs_diff(conn->sndbuf_desc->len, &sent, &prep); in smc_tx_prepared_sends()

12345678910>>...18