/fs/ksmbd/ |
D | transport_ipc.c | 58 unsigned char payload[]; member 248 static int handle_response(int type, void *payload, size_t sz) in handle_response() argument 250 unsigned int handle = *(unsigned int *)payload; in handle_response() 276 memcpy(entry->response, payload, sz); in handle_response() 396 void *payload; in handle_generic_event() local 416 payload = nla_data(info->attrs[info->genlhdr->cmd]); in handle_generic_event() 418 return handle_response(type, payload, sz); in handle_generic_event() 438 ret = nla_put(skb, msg->type, msg->sz, msg->payload); in ipc_msg_send() 515 req = (struct ksmbd_login_request *)msg->payload; in ksmbd_ipc_login_request() 538 req = (struct ksmbd_spnego_authen_request *)msg->payload; in ksmbd_ipc_spnego_authen_request() [all …]
|
D | transport_ipc.h | 38 void *payload, size_t payload_sz); 41 void *payload, size_t payload_sz); 42 struct ksmbd_rpc_command *ksmbd_rpc_rap(struct ksmbd_session *sess, void *payload,
|
D | ksmbd_netlink.h | 239 __u8 payload[]; member 271 __u8 payload[]; /* session key + AP_REP */ member
|
D | auth.c | 549 memcpy(sess->sess_key, resp->payload, resp->session_key_len); in ksmbd_krb5_authenticate() 550 memcpy(out_blob, resp->payload + resp->session_key_len, in ksmbd_krb5_authenticate()
|
D | smb2pdu.c | 6172 memcpy(aux_payload_buf, rpc_resp->payload, rpc_resp->payload_sz); in smb2_read_pipe() 7568 memcpy((char *)rsp->Buffer, rpc_resp->payload, nbytes); in fsctl_pipe_transceive()
|
/fs/crypto/ |
D | keysetup_v1.c | 100 const struct fscrypt_key *payload; in find_and_lock_process_key() local 118 payload = (const struct fscrypt_key *)ukp->data; in find_and_lock_process_key() 121 payload->size < 1 || payload->size > FSCRYPT_MAX_KEY_SIZE) { in find_and_lock_process_key() 128 if (payload->size < min_keysize) { in find_and_lock_process_key() 131 key->description, payload->size, min_keysize); in find_and_lock_process_key() 135 *payload_ret = payload; in find_and_lock_process_key() 302 const struct fscrypt_key *payload; in fscrypt_setup_v1_file_key_via_subscribed_keyrings() local 307 ci->ci_mode->keysize, &payload); in fscrypt_setup_v1_file_key_via_subscribed_keyrings() 311 ci->ci_mode->keysize, &payload); in fscrypt_setup_v1_file_key_via_subscribed_keyrings() 316 err = fscrypt_setup_v1_file_key(ci, payload->raw); in fscrypt_setup_v1_file_key_via_subscribed_keyrings()
|
D | keyring.c | 575 const struct fscrypt_provisioning_key_payload *payload = prep->data; in fscrypt_provisioning_key_preparse() local 579 if (prep->datalen < sizeof(*payload) + FSCRYPT_MIN_KEY_SIZE || in fscrypt_provisioning_key_preparse() 580 prep->datalen > sizeof(*payload) + FSCRYPT_MAX_HW_WRAPPED_KEY_SIZE) in fscrypt_provisioning_key_preparse() 583 if (payload->type != FSCRYPT_KEY_SPEC_TYPE_DESCRIPTOR && in fscrypt_provisioning_key_preparse() 584 payload->type != FSCRYPT_KEY_SPEC_TYPE_IDENTIFIER) in fscrypt_provisioning_key_preparse() 587 if (payload->__reserved) in fscrypt_provisioning_key_preparse() 590 prep->payload.data[0] = kmemdup(payload, prep->datalen, GFP_KERNEL); in fscrypt_provisioning_key_preparse() 591 if (!prep->payload.data[0]) in fscrypt_provisioning_key_preparse() 601 kfree_sensitive(prep->payload.data[0]); in fscrypt_provisioning_key_free_preparse() 609 const struct fscrypt_provisioning_key_payload *payload = in fscrypt_provisioning_key_describe() local [all …]
|
/fs/cifs/ |
D | cifs_spnego.c | 27 char *payload; in cifs_spnego_key_instantiate() local 31 payload = kmemdup(prep->data, prep->datalen, GFP_KERNEL); in cifs_spnego_key_instantiate() 32 if (!payload) in cifs_spnego_key_instantiate() 36 key->payload.data[0] = payload; in cifs_spnego_key_instantiate() 46 kfree(key->payload.data[0]); in cifs_spnego_key_destroy() 166 struct cifs_spnego_msg *msg = spnego_key->payload.data[0]; in cifs_get_spnego_key()
|
D | cifsacl.c | 65 char *payload; in cifs_idmap_key_instantiate() local 75 if (prep->datalen <= sizeof(key->payload)) { in cifs_idmap_key_instantiate() 76 key->payload.data[0] = NULL; in cifs_idmap_key_instantiate() 77 memcpy(&key->payload, prep->data, prep->datalen); in cifs_idmap_key_instantiate() 79 payload = kmemdup(prep->data, prep->datalen, GFP_KERNEL); in cifs_idmap_key_instantiate() 80 if (!payload) in cifs_idmap_key_instantiate() 82 key->payload.data[0] = payload; in cifs_idmap_key_instantiate() 92 if (key->datalen > sizeof(key->payload)) in cifs_idmap_key_destroy() 93 kfree(key->payload.data[0]); in cifs_idmap_key_destroy() 309 ksid = sidkey->datalen <= sizeof(sidkey->payload) ? in id_to_sid() [all …]
|
D | connect.c | 1799 const char *delim, *payload; in cifs_set_cifscreds() local 1857 payload = upayload->data; in cifs_set_cifscreds() 1858 delim = strnchr(payload, upayload->datalen, ':'); in cifs_set_cifscreds() 1859 cifs_dbg(FYI, "payload=%s\n", payload); in cifs_set_cifscreds() 1867 len = delim - payload; in cifs_set_cifscreds() 1875 ctx->username = kstrndup(payload, len, GFP_KERNEL); in cifs_set_cifscreds()
|
D | sess.c | 1103 msg = spnego_key->payload.data[0]; in sess_auth_kerberos()
|
D | cifspdu.h | 1759 __u8 payload[]; member
|
D | smb2pdu.c | 1407 msg = spnego_key->payload.data[0]; in SMB2_auth_kerberos()
|
/fs/ecryptfs/ |
D | ecryptfs_kernel.h | 80 struct encrypted_key_payload *payload; in ecryptfs_get_encrypted_key_payload_data() local 85 payload = key->payload.data[0]; in ecryptfs_get_encrypted_key_payload_data() 86 if (!payload) in ecryptfs_get_encrypted_key_payload_data() 89 return (struct ecryptfs_auth_tok *)payload->payload_data; in ecryptfs_get_encrypted_key_payload_data()
|
D | keystore.c | 1133 char *payload = NULL; in decrypt_pki_encrypted_session_key() local 1144 &payload, &payload_len); in decrypt_pki_encrypted_session_key() 1149 rc = ecryptfs_send_message(payload, payload_len, &msg_ctx); in decrypt_pki_encrypted_session_key() 1187 kfree(payload); in decrypt_pki_encrypted_session_key() 1967 char *payload = NULL; in pki_encrypt_session_key() local 1976 crypt_stat, &payload, &payload_len); in pki_encrypt_session_key() 1983 rc = ecryptfs_send_message(payload, payload_len, &msg_ctx); in pki_encrypt_session_key() 2001 kfree(payload); in pki_encrypt_session_key()
|
/fs/nfs/ |
D | nfs4idmap.c | 311 const struct user_key_payload *payload; in nfs_idmap_get_key() local 330 payload = user_key_payload_rcu(rkey); in nfs_idmap_get_key() 331 if (IS_ERR_OR_NULL(payload)) { in nfs_idmap_get_key() 332 ret = PTR_ERR(payload); in nfs_idmap_get_key() 336 ret = payload->datalen; in nfs_idmap_get_key() 338 memcpy(data, payload->data, ret); in nfs_idmap_get_key()
|
/fs/orangefs/ |
D | orangefs-debugfs.c | 256 void *payload = NULL; in help_start() local 263 payload = m->private; in help_start() 265 return payload; in help_start()
|
/fs/nfsd/ |
D | xdr.h | 36 struct xdr_buf payload; member
|
D | xdr3.h | 43 struct xdr_buf payload; member
|
D | nfsxdr.c | 346 if (!xdr_stream_subsegment(xdr, &args->payload, args->len)) in nfssvc_decode_writeargs()
|
D | nfsproc.c | 238 nvecs = svc_fill_write_vector(rqstp, &argp->payload); in nfsd_proc_write()
|
D | nfs3proc.c | 213 nvecs = svc_fill_write_vector(rqstp, &argp->payload); in nfsd3_proc_write()
|
D | nfs3xdr.c | 635 if (!xdr_stream_subsegment(xdr, &args->payload, args->count)) in nfs3svc_decode_writeargs()
|
D | nfs4xdr.c | 2158 struct xdr_buf payload; in nfsd4_decode_setxattr() local 2160 if (!xdr_stream_subsegment(argp->xdr, &payload, size)) in nfsd4_decode_setxattr() 2162 status = nfsd4_vbuf_from_vector(argp, &payload, in nfsd4_decode_setxattr()
|