/security/integrity/evm/ |
H A D | evm_secfs.c | 38 ssize_t rc; local 44 rc = simple_read_from_buffer(buf, count, ppos, temp, strlen(temp)); 46 return rc;
|
H A D | evm_crypto.c | 37 long rc; local 56 rc = PTR_ERR(*tfm); 57 pr_err("Can not allocate %s (reason: %ld)\n", algo, rc); 60 return ERR_PTR(rc); 63 rc = crypto_shash_setkey(*tfm, evmkey, evmkey_len); 64 if (rc) { 68 return ERR_PTR(rc); 83 rc = crypto_shash_init(desc); 84 if (rc) { 86 return ERR_PTR(rc); 204 int rc = 0; local 243 int rc = 0; local [all...] |
H A D | evm_main.c | 118 int rc, xattr_len; local 126 rc = vfs_getxattr_alloc(dentry, XATTR_NAME_EVM, (char **)&xattr_data, 0, 128 if (rc <= 0) { 130 if (rc == -ENODATA) { 131 rc = evm_find_protected_xattrs(dentry); 132 if (rc > 0) 134 else if (rc == 0) 136 } else if (rc == -EOPNOTSUPP) { 142 xattr_len = rc; 147 rc 436 int rc; local [all...] |
/security/integrity/ima/ |
H A D | ima_init.c | 97 int rc; local 100 rc = tpm_pcr_read(TPM_ANY_NUM, 0, pcr_i); 101 if (rc == 0) 107 rc = ima_init_keyring(INTEGRITY_KEYRING_IMA); 108 if (rc) 109 return rc; 111 rc = ima_init_crypto(); 112 if (rc) 113 return rc; 114 rc [all...] |
H A D | ima_queue.c | 51 int rc; local 56 rc = memcmp(qe->entry->digest, digest_value, TPM_DIGEST_SIZE); 57 if (rc == 0) {
|
H A D | ima_appraise.c | 51 int rc, offset; local 62 rc = __vfs_setxattr_noperm(dentry, XATTR_NAME_IMA, 66 return rc; 195 int rc = xattr_len, hash_start = 0; local 200 if (rc <= 0) { 201 if (rc && rc != -ENODATA) 213 status = evm_verifyxattr(dentry, XATTR_NAME_IMA, xattr_value, rc, iint); 237 rc = memcmp(&xattr_value->digest[hash_start], 241 rc 293 int rc = 0; local 319 int must_appraise, rc; local [all...] |
H A D | ima_main.c | 164 int rc = -ENOMEM, action, must_appraise; local 200 rc = 0; 216 rc = ima_get_cache_status(iint, function); 225 rc = ima_collect_measurement(iint, file, xattr_ptr, &xattr_len); 226 if (rc != 0) { 228 rc = (iint->flags & IMA_PERMIT_DIRECTIO) ? 0 : -EACCES; 239 rc = ima_appraise_measurement(function, iint, file, pathname, 246 rc = -EACCES; 252 if ((rc && must_appraise) && (ima_appraise & IMA_APPRAISE_ENFORCE))
|
H A D | ima_template_lib.c | 333 int rc = 0; local 338 rc = ima_write_template_field_data(xattr_value, xattr_len, fmt, 341 return rc;
|
H A D | ima_crypto.c | 102 long rc; local 106 rc = PTR_ERR(ima_shash_tfm); 108 hash_algo_name[ima_hash_algo], rc); 109 return rc; 117 int rc; local 125 rc = PTR_ERR(tfm); 127 hash_algo_name[algo], rc); 204 int rc; local 215 rc = PTR_ERR(tfm); 217 hash_algo_name[algo], rc); 263 int rc, read = 0, rbuf_len, active = 0, ahash_rc = 0; local 369 int rc; local 388 int rc, read = 0; local 442 int rc; local 471 int rc; local 494 int rc, i; local 537 int rc; local 567 int rc, i; local 591 int rc; local [all...] |
H A D | ima_policy.c | 190 int rc = 0; local 202 rc = security_filter_rule_match(osid, 212 rc = security_filter_rule_match(sid, 220 if ((rc < 0) && (!retried)) { 225 if (!rc)
|
/security/selinux/ss/ |
H A D | context.h | 42 int rc; local 45 rc = ebitmap_cpy(&dst->range.level[0].cat, &src->range.level[0].cat); 46 if (rc) 50 rc = ebitmap_cpy(&dst->range.level[1].cat, &src->range.level[1].cat); 51 if (rc) 54 return rc; 62 int rc; local 65 rc = ebitmap_cpy(&dst->range.level[0].cat, &src->range.level[0].cat); 66 if (rc) 70 rc 82 int rc; local 119 int rc; local [all...] |
H A D | sidtab.c | 35 int hvalue, rc = 0; local 39 rc = -ENOMEM; 52 rc = -EEXIST; 58 rc = -ENOMEM; 64 rc = -ENOMEM; 82 return rc; 131 int i, rc = 0; local 140 rc = apply(cur->sid, &cur->context, args); 141 if (rc) 147 return rc; [all...] |
H A D | avtab.c | 364 int i, rc; local 371 rc = next_entry(buf32, fp, sizeof(u32)); 372 if (rc) { 374 return rc; 382 rc = next_entry(buf32, fp, sizeof(u32)*items2); 383 if (rc) { 385 return rc; 429 rc = insertf(a, &key, &datum, p); 430 if (rc) 431 return rc; 510 int rc; local 556 int rc; local 587 int rc = 0; local [all...] |
H A D | ebitmap.c | 95 int rc; local 111 rc = netlbl_catmap_setlong(catmap, 115 if (rc != 0) 143 int rc; local 150 rc = netlbl_catmap_getlong(catmap, &offset, &bitmap); 151 if (rc < 0) 343 int rc, i; local 347 rc = next_entry(buf, fp, sizeof buf); 348 if (rc < 0) 372 rc 445 int bit, last_bit, last_startbit, rc; local [all...] |
H A D | conditional.c | 121 int rc; local 126 rc = avtab_init(&p->te_cond_avtab); 127 if (rc) 128 return rc; 227 int rc; local 233 rc = next_entry(buf, fp, sizeof buf); 234 if (rc) 240 rc = -EINVAL; 246 rc = -ENOMEM; 250 rc 278 int rc = -EINVAL; local 354 int i, rc; local 403 int rc; local 458 int rc; local 501 int rc; local 531 int rc; local 559 int rc; local 598 int rc; local [all...] |
H A D | mls.c | 246 int l, rc = -EINVAL; local 268 rc = mls_context_cpy(context, defcon); 284 rc = -EINVAL; 310 rc = -EINVAL; 314 rc = ebitmap_set_bit(&context->range.level[l].cat, 316 if (rc) 325 rc = -EINVAL; 330 rc = -EINVAL; 335 rc = ebitmap_set_bit(&context->range.level[l].cat, i, 1); 336 if (rc) 380 int rc; local 405 int l, rc = 0; local 486 int rc; local 622 int rc; local 650 int rc; local [all...] |
/security/selinux/ |
H A D | netlabel.c | 60 int rc; local 62 rc = security_netlbl_secattr_to_sid(secattr, sid); 63 if (rc == 0 && 68 return rc; 83 int rc; local 93 rc = security_netlbl_sid_to_secattr(sksec->sid, secattr); 94 if (rc != 0) { 206 int rc; local 215 rc = netlbl_skbuff_getattr(skb, family, &secattr); 216 if (rc 241 int rc; local 284 int rc; local 332 int rc; local 374 int rc; local 429 int rc = 0; local 466 int rc; local [all...] |
H A D | xfrm.c | 84 int rc; local 107 rc = security_context_to_sid(ctx->ctx_str, str_len, &ctx->ctx_sid, gfp); 108 if (rc) 111 rc = avc_has_perm(tsec->sid, ctx->ctx_sid, 113 if (rc) 122 return rc; 158 int rc; local 169 rc = avc_has_perm(fl_secid, ctx->ctx_sid, 171 return (rc == -EACCES ? -ESRCH : rc); 273 int rc; local 347 int rc; local [all...] |
/security/keys/ |
H A D | proc.c | 191 int rc; local 221 rc = key_task_permission(key_ref, ctx.cred, KEY_NEED_VIEW); 222 if (rc < 0)
|
H A D | trusted.c | 360 int rc; local 363 rc = tpm_send(chip_num, cmd, buflen); 365 if (rc > 0) 367 rc = -EPERM; 368 return rc;
|
/security/smack/ |
H A D | smack_access.c | 129 int rc = 0; local 137 rc = -EACCES; 182 rc = -EACCES; 192 rc = MAY_BRINGUP; 199 request, rc, a); 202 return rc; 222 int rc; local 227 rc = smk_access(sbj_known, obj_known, mode, NULL); 228 if (rc >= 0) { 240 rc 476 int rc; local 511 int rc; local [all...] |
/security/yama/ |
H A D | yama_lsm.c | 157 int rc; local 160 rc = cap_task_prctl(option, arg2, arg3, arg4, arg5); 161 if (rc != -ENOSYS) 162 return rc; 180 rc = 0; 182 rc = yama_ptracer_add(NULL, myself); 191 rc = -EINVAL; 195 rc = yama_ptracer_add(tracer, myself); 204 return rc; 217 int rc local 250 int rc = 0; local 285 int rc; local 338 int rc; local 382 int rc; local [all...] |
/security/tomoyo/ |
H A D | tomoyo.c | 75 int rc; local 77 rc = cap_bprm_set_creds(bprm); 78 if (rc) 79 return rc;
|
/security/ |
H A D | commoncap.c | 449 int rc = 0; local 462 rc = get_vfs_caps_from_disk(dentry, &vcaps); 463 if (rc < 0) { 464 if (rc == -EINVAL) 466 __func__, rc, bprm->filename); 467 else if (rc == -ENODATA) 468 rc = 0; 472 rc = bprm_caps_from_vfs_caps(&vcaps, bprm, effective, has_cap); 473 if (rc == -EINVAL) 475 __func__, rc, bpr [all...] |
H A D | device_cgroup.c | 545 int rc = 0; local 569 rc = dev_exception_add(devcg, ex); 570 if (rc) 587 return rc; 608 int count, rc = 0; local 632 rc = dev_exceptions_copy(&devcgroup->exceptions, 634 if (rc) 635 return rc; 672 rc = kstrtou32(temp, 10, &ex.major); 673 if (rc) 816 bool rc; local [all...] |