/security/apparmor/ |
H A D | crypto.c | 37 char ctx[crypto_shash_descsize(apparmor_tfm)]; member in struct:__anon1
|
/security/keys/ |
H A D | request_key_auth.c | 245 struct keyring_search_context ctx = { local 259 authkey_ref = search_process_keyrings(&ctx);
|
H A D | proc.c | 193 struct keyring_search_context ctx = { local 209 skey_ref = search_my_process_keyrings(&ctx); 221 rc = key_task_permission(key_ref, ctx.cred, KEY_NEED_VIEW);
|
H A D | process_keys.c | 322 key_ref_t search_my_process_keyrings(struct keyring_search_context *ctx) argument 338 if (ctx->cred->thread_keyring) { 340 make_key_ref(ctx->cred->thread_keyring, 1), ctx); 356 if (ctx->cred->process_keyring) { 358 make_key_ref(ctx->cred->process_keyring, 1), ctx); 376 if (ctx->cred->session_keyring) { 379 make_key_ref(rcu_dereference(ctx->cred->session_keyring), 1), 380 ctx); 434 search_process_keyrings(struct keyring_search_context *ctx) argument 519 struct keyring_search_context ctx = { local [all...] |
H A D | request_key.c | 330 static int construct_alloc_key(struct keyring_search_context *ctx, argument 343 ctx->index_key.type->name, ctx->index_key.description); 350 if (ctx->index_key.type->read) 352 if (ctx->index_key.type == &key_type_keyring || 353 ctx->index_key.type->update) 356 key = key_alloc(ctx->index_key.type, ctx->index_key.description, 357 ctx->cred->fsuid, ctx 429 construct_key_and_link(struct keyring_search_context *ctx, const char *callout_info, size_t callout_len, void *aux, struct key *dest_keyring, unsigned long flags) argument 512 struct keyring_search_context ctx = { local [all...] |
H A D | keyring.c | 426 struct keyring_read_iterator_context *ctx = data; local 431 key->type->name, key->serial, ctx->count, ctx->qty); 433 if (ctx->count >= ctx->qty) 436 ret = put_user(key->serial, ctx->buffer); 439 ctx->buffer++; 440 ctx->count += sizeof(key->serial); 454 struct keyring_read_iterator_context ctx; local 468 ctx 527 struct keyring_search_context *ctx = iterator_data; local 595 search_keyring(struct key *keyring, struct keyring_search_context *ctx) argument 612 search_nested_keyrings(struct key *keyring, struct keyring_search_context *ctx) argument 850 keyring_search_aux(key_ref_t keyring_ref, struct keyring_search_context *ctx) argument 893 struct keyring_search_context ctx = { local 1028 struct keyring_search_context *ctx = iterator_data; local 1051 struct keyring_search_context ctx = { local [all...] |
H A D | trusted.c | 39 char ctx[]; member in struct:sdesc
|
/security/selinux/ |
H A D | xfrm.c | 61 static inline int selinux_authorizable_ctx(struct xfrm_sec_ctx *ctx) argument 63 return (ctx && 64 (ctx->ctx_doi == XFRM_SC_DOI_LSM) && 65 (ctx->ctx_alg == XFRM_SC_ALG_SELINUX)); 86 struct xfrm_sec_ctx *ctx = NULL; local 98 ctx = kmalloc(sizeof(*ctx) + str_len + 1, gfp); 99 if (!ctx) 102 ctx->ctx_doi = XFRM_SC_DOI_LSM; 103 ctx 128 selinux_xfrm_free(struct xfrm_sec_ctx *ctx) argument 140 selinux_xfrm_delete(struct xfrm_sec_ctx *ctx) argument 156 selinux_xfrm_policy_lookup(struct xfrm_sec_ctx *ctx, u32 fl_secid, u8 dir) argument 239 struct xfrm_sec_ctx *ctx = x->security; local 317 selinux_xfrm_policy_free(struct xfrm_sec_ctx *ctx) argument 325 selinux_xfrm_policy_delete(struct xfrm_sec_ctx *ctx) argument 348 struct xfrm_sec_ctx *ctx; local 416 struct xfrm_sec_ctx *ctx = x->security; local [all...] |
H A D | hooks.c | 1740 struct task_struct *ctx) 1742 u32 sid = task_sid(ctx); 2722 struct qstr *name, void **ctx, 2752 return security_sid_to_context(newsid, (char **)ctx, ctxlen); 5811 static int selinux_inode_notifysecctx(struct inode *inode, void *ctx, u32 ctxlen) argument 5813 return selinux_inode_setsecurity(inode, XATTR_SELINUX_SUFFIX, ctx, ctxlen, 0); 5819 static int selinux_inode_setsecctx(struct dentry *dentry, void *ctx, u32 ctxlen) argument 5821 return __vfs_setxattr_noperm(dentry, XATTR_NAME_SELINUX, ctx, ctxlen, 0); 5824 static int selinux_inode_getsecctx(struct inode *inode, void **ctx, u32 *ctxlen) argument 5828 ctx, tru 1739 may_create_key(u32 ksid, struct task_struct *ctx) argument 2721 selinux_dentry_init_security(struct dentry *dentry, int mode, struct qstr *name, void **ctx, u32 *ctxlen) argument [all...] |
/security/keys/encrypted-keys/ |
H A D | encrypted.c | 59 char ctx[]; member in struct:sdesc
|
/security/ |
H A D | capability.c | 136 struct qstr *name, void **ctx, 797 static void cap_xfrm_policy_free_security(struct xfrm_sec_ctx *ctx) argument 801 static int cap_xfrm_policy_delete_security(struct xfrm_sec_ctx *ctx) argument 828 static int cap_xfrm_policy_lookup(struct xfrm_sec_ctx *ctx, u32 sk_sid, u8 dir) argument 881 static int cap_inode_notifysecctx(struct inode *inode, void *ctx, u32 ctxlen) argument 886 static int cap_inode_setsecctx(struct dentry *dentry, void *ctx, u32 ctxlen) argument 891 static int cap_inode_getsecctx(struct inode *inode, void **ctx, u32 *ctxlen) argument 135 cap_dentry_init_security(struct dentry *dentry, int mode, struct qstr *name, void **ctx, u32 *ctxlen) argument
|
H A D | security.c | 352 struct qstr *name, void **ctx, 356 ctx, ctxlen); 1135 int security_inode_notifysecctx(struct inode *inode, void *ctx, u32 ctxlen) argument 1137 return security_ops->inode_notifysecctx(inode, ctx, ctxlen); 1141 int security_inode_setsecctx(struct dentry *dentry, void *ctx, u32 ctxlen) argument 1143 return security_ops->inode_setsecctx(dentry, ctx, ctxlen); 1147 int security_inode_getsecctx(struct inode *inode, void **ctx, u32 *ctxlen) argument 1149 return security_ops->inode_getsecctx(inode, ctx, ctxlen); 1383 void security_xfrm_policy_free(struct xfrm_sec_ctx *ctx) argument 1385 security_ops->xfrm_policy_free_security(ctx); 351 security_dentry_init_security(struct dentry *dentry, int mode, struct qstr *name, void **ctx, u32 *ctxlen) argument 1389 security_xfrm_policy_delete(struct xfrm_sec_ctx *ctx) argument 1418 security_xfrm_policy_lookup(struct xfrm_sec_ctx *ctx, u32 fl_secid, u8 dir) argument [all...] |
/security/selinux/ss/ |
H A D | services.c | 1311 struct context *ctx, 1320 context_init(ctx); 1341 ctx->user = usrdatum->value; 1356 ctx->role = role->value; 1369 ctx->type = typdatum->value; 1371 rc = mls_context_to_sid(pol, oldc, &p, ctx, sidtabp, def_sid); 1380 if (!policydb_context_isvalid(pol, ctx)) 1385 context_destroy(ctx); 1859 struct context ctx; local 1867 c->len, &ctx, SECSID_NUL 1307 string_to_context_struct(struct policydb *pol, struct sidtab *sidtabp, char *scontext, u32 scontext_len, struct context *ctx, u32 def_sid) argument 3318 struct context *ctx; local 3388 struct context *ctx; local [all...] |
/security/smack/ |
H A D | smack_lsm.c | 4061 static int smack_inode_notifysecctx(struct inode *inode, void *ctx, u32 ctxlen) argument 4063 return smack_inode_setsecurity(inode, XATTR_SMACK_SUFFIX, ctx, ctxlen, 0); 4066 static int smack_inode_setsecctx(struct dentry *dentry, void *ctx, u32 ctxlen) argument 4068 return __vfs_setxattr_noperm(dentry, XATTR_NAME_SMACK, ctx, ctxlen, 0); 4071 static int smack_inode_getsecctx(struct inode *inode, void **ctx, u32 *ctxlen) argument 4074 len = smack_inode_getsecurity(inode, XATTR_SMACK_SUFFIX, ctx, true);
|