Searched defs:ctx (Results 1 - 14 of 14) sorted by relevance

/security/apparmor/
H A Dcrypto.c37 char ctx[crypto_shash_descsize(apparmor_tfm)]; member in struct:__anon1
/security/keys/
H A Drequest_key_auth.c245 struct keyring_search_context ctx = { local
259 authkey_ref = search_process_keyrings(&ctx);
H A Dproc.c193 struct keyring_search_context ctx = { local
209 skey_ref = search_my_process_keyrings(&ctx);
221 rc = key_task_permission(key_ref, ctx.cred, KEY_NEED_VIEW);
H A Dprocess_keys.c322 key_ref_t search_my_process_keyrings(struct keyring_search_context *ctx) argument
338 if (ctx->cred->thread_keyring) {
340 make_key_ref(ctx->cred->thread_keyring, 1), ctx);
356 if (ctx->cred->process_keyring) {
358 make_key_ref(ctx->cred->process_keyring, 1), ctx);
376 if (ctx->cred->session_keyring) {
379 make_key_ref(rcu_dereference(ctx->cred->session_keyring), 1),
380 ctx);
434 search_process_keyrings(struct keyring_search_context *ctx) argument
519 struct keyring_search_context ctx = { local
[all...]
H A Drequest_key.c330 static int construct_alloc_key(struct keyring_search_context *ctx, argument
343 ctx->index_key.type->name, ctx->index_key.description);
350 if (ctx->index_key.type->read)
352 if (ctx->index_key.type == &key_type_keyring ||
353 ctx->index_key.type->update)
356 key = key_alloc(ctx->index_key.type, ctx->index_key.description,
357 ctx->cred->fsuid, ctx
429 construct_key_and_link(struct keyring_search_context *ctx, const char *callout_info, size_t callout_len, void *aux, struct key *dest_keyring, unsigned long flags) argument
512 struct keyring_search_context ctx = { local
[all...]
H A Dkeyring.c426 struct keyring_read_iterator_context *ctx = data; local
431 key->type->name, key->serial, ctx->count, ctx->qty);
433 if (ctx->count >= ctx->qty)
436 ret = put_user(key->serial, ctx->buffer);
439 ctx->buffer++;
440 ctx->count += sizeof(key->serial);
454 struct keyring_read_iterator_context ctx; local
468 ctx
527 struct keyring_search_context *ctx = iterator_data; local
595 search_keyring(struct key *keyring, struct keyring_search_context *ctx) argument
612 search_nested_keyrings(struct key *keyring, struct keyring_search_context *ctx) argument
850 keyring_search_aux(key_ref_t keyring_ref, struct keyring_search_context *ctx) argument
893 struct keyring_search_context ctx = { local
1028 struct keyring_search_context *ctx = iterator_data; local
1051 struct keyring_search_context ctx = { local
[all...]
H A Dtrusted.c39 char ctx[]; member in struct:sdesc
/security/selinux/
H A Dxfrm.c61 static inline int selinux_authorizable_ctx(struct xfrm_sec_ctx *ctx) argument
63 return (ctx &&
64 (ctx->ctx_doi == XFRM_SC_DOI_LSM) &&
65 (ctx->ctx_alg == XFRM_SC_ALG_SELINUX));
86 struct xfrm_sec_ctx *ctx = NULL; local
98 ctx = kmalloc(sizeof(*ctx) + str_len + 1, gfp);
99 if (!ctx)
102 ctx->ctx_doi = XFRM_SC_DOI_LSM;
103 ctx
128 selinux_xfrm_free(struct xfrm_sec_ctx *ctx) argument
140 selinux_xfrm_delete(struct xfrm_sec_ctx *ctx) argument
156 selinux_xfrm_policy_lookup(struct xfrm_sec_ctx *ctx, u32 fl_secid, u8 dir) argument
239 struct xfrm_sec_ctx *ctx = x->security; local
317 selinux_xfrm_policy_free(struct xfrm_sec_ctx *ctx) argument
325 selinux_xfrm_policy_delete(struct xfrm_sec_ctx *ctx) argument
348 struct xfrm_sec_ctx *ctx; local
416 struct xfrm_sec_ctx *ctx = x->security; local
[all...]
H A Dhooks.c1740 struct task_struct *ctx)
1742 u32 sid = task_sid(ctx);
2722 struct qstr *name, void **ctx,
2752 return security_sid_to_context(newsid, (char **)ctx, ctxlen);
5811 static int selinux_inode_notifysecctx(struct inode *inode, void *ctx, u32 ctxlen) argument
5813 return selinux_inode_setsecurity(inode, XATTR_SELINUX_SUFFIX, ctx, ctxlen, 0);
5819 static int selinux_inode_setsecctx(struct dentry *dentry, void *ctx, u32 ctxlen) argument
5821 return __vfs_setxattr_noperm(dentry, XATTR_NAME_SELINUX, ctx, ctxlen, 0);
5824 static int selinux_inode_getsecctx(struct inode *inode, void **ctx, u32 *ctxlen) argument
5828 ctx, tru
1739 may_create_key(u32 ksid, struct task_struct *ctx) argument
2721 selinux_dentry_init_security(struct dentry *dentry, int mode, struct qstr *name, void **ctx, u32 *ctxlen) argument
[all...]
/security/keys/encrypted-keys/
H A Dencrypted.c59 char ctx[]; member in struct:sdesc
/security/
H A Dcapability.c136 struct qstr *name, void **ctx,
797 static void cap_xfrm_policy_free_security(struct xfrm_sec_ctx *ctx) argument
801 static int cap_xfrm_policy_delete_security(struct xfrm_sec_ctx *ctx) argument
828 static int cap_xfrm_policy_lookup(struct xfrm_sec_ctx *ctx, u32 sk_sid, u8 dir) argument
881 static int cap_inode_notifysecctx(struct inode *inode, void *ctx, u32 ctxlen) argument
886 static int cap_inode_setsecctx(struct dentry *dentry, void *ctx, u32 ctxlen) argument
891 static int cap_inode_getsecctx(struct inode *inode, void **ctx, u32 *ctxlen) argument
135 cap_dentry_init_security(struct dentry *dentry, int mode, struct qstr *name, void **ctx, u32 *ctxlen) argument
H A Dsecurity.c352 struct qstr *name, void **ctx,
356 ctx, ctxlen);
1135 int security_inode_notifysecctx(struct inode *inode, void *ctx, u32 ctxlen) argument
1137 return security_ops->inode_notifysecctx(inode, ctx, ctxlen);
1141 int security_inode_setsecctx(struct dentry *dentry, void *ctx, u32 ctxlen) argument
1143 return security_ops->inode_setsecctx(dentry, ctx, ctxlen);
1147 int security_inode_getsecctx(struct inode *inode, void **ctx, u32 *ctxlen) argument
1149 return security_ops->inode_getsecctx(inode, ctx, ctxlen);
1383 void security_xfrm_policy_free(struct xfrm_sec_ctx *ctx) argument
1385 security_ops->xfrm_policy_free_security(ctx);
351 security_dentry_init_security(struct dentry *dentry, int mode, struct qstr *name, void **ctx, u32 *ctxlen) argument
1389 security_xfrm_policy_delete(struct xfrm_sec_ctx *ctx) argument
1418 security_xfrm_policy_lookup(struct xfrm_sec_ctx *ctx, u32 fl_secid, u8 dir) argument
[all...]
/security/selinux/ss/
H A Dservices.c1311 struct context *ctx,
1320 context_init(ctx);
1341 ctx->user = usrdatum->value;
1356 ctx->role = role->value;
1369 ctx->type = typdatum->value;
1371 rc = mls_context_to_sid(pol, oldc, &p, ctx, sidtabp, def_sid);
1380 if (!policydb_context_isvalid(pol, ctx))
1385 context_destroy(ctx);
1859 struct context ctx; local
1867 c->len, &ctx, SECSID_NUL
1307 string_to_context_struct(struct policydb *pol, struct sidtab *sidtabp, char *scontext, u32 scontext_len, struct context *ctx, u32 def_sid) argument
3318 struct context *ctx; local
3388 struct context *ctx; local
[all...]
/security/smack/
H A Dsmack_lsm.c4061 static int smack_inode_notifysecctx(struct inode *inode, void *ctx, u32 ctxlen) argument
4063 return smack_inode_setsecurity(inode, XATTR_SMACK_SUFFIX, ctx, ctxlen, 0);
4066 static int smack_inode_setsecctx(struct dentry *dentry, void *ctx, u32 ctxlen) argument
4068 return __vfs_setxattr_noperm(dentry, XATTR_NAME_SMACK, ctx, ctxlen, 0);
4071 static int smack_inode_getsecctx(struct inode *inode, void **ctx, u32 *ctxlen) argument
4074 len = smack_inode_getsecurity(inode, XATTR_SMACK_SUFFIX, ctx, true);

Completed in 155 milliseconds