Searched refs:data (Results 1 - 25 of 58) sorted by relevance

123

/security/keys/
H A Dsysctl.c21 .data = &key_quota_maxkeys,
30 .data = &key_quota_maxbytes,
39 .data = &key_quota_root_maxkeys,
48 .data = &key_quota_root_maxbytes,
57 .data = &key_gc_delay,
67 .data = &persistent_keyring_expiry,
H A Duser_defined.c25 * arbitrary blob of data as the payload
68 if (datalen <= 0 || datalen > 32767 || !prep->data)
75 /* attach the data */
79 memcpy(upayload->data, prep->data, datalen);
104 if (datalen <= 0 || datalen > 32767 || !prep->data)
114 memcpy(upayload->data, prep->data, datalen);
116 /* check the quota and attach the new data */
122 /* attach the new data, displacin
[all...]
H A Dbig_key.c24 * If the data is under this limit, there's no point creating a shm file to
26 * least as large as the data.
32 * arbitrary blob of data as the payload
57 if (datalen <= 0 || datalen > 1024 * 1024 || !prep->data)
66 /* Create a shmem file to store the data in. This will permit the data
69 * TODO: Encrypt the stored data with a temporary key.
77 written = kernel_write(file, prep->data, prep->datalen, 0);
92 /* Just store the data in a buffer */
93 void *data local
[all...]
H A Dtrusted.h22 unsigned char data[MAX_BUF_SIZE]; member in struct:tpm_buf
113 buf->data[buf->len++] = value;
118 *(uint16_t *) & buf->data[buf->len] = htons(value);
124 *(uint32_t *) & buf->data[buf->len] = htonl(value);
131 memcpy(buf->data + buf->len, in, len);
H A Dtrusted.c59 static int TSS_sha1(const unsigned char *data, unsigned int datalen, argument
71 ret = crypto_shash_digest(&sdesc->shash, data, datalen, digest);
82 unsigned char *data; local
103 data = va_arg(argp, unsigned char *);
104 if (data == NULL) {
108 ret = crypto_shash_update(&sdesc->shash, data, dlen);
130 unsigned char *data; local
150 data = va_arg(argp, unsigned char *);
151 if (!data) {
155 ret = crypto_shash_update(&sdesc->shash, data, dle
458 tpm_seal(struct tpm_buf *tb, uint16_t keytype, uint32_t keyhandle, const unsigned char *keyauth, const unsigned char *data, uint32_t datalen, unsigned char *blob, uint32_t *bloblen, const unsigned char *blobauth, const unsigned char *pcrinfo, uint32_t pcrinfosize) argument
573 tpm_unseal(struct tpm_buf *tb, uint32_t keyhandle, const unsigned char *keyauth, const unsigned char *blob, int bloblen, const unsigned char *blobauth, unsigned char *data, unsigned int *datalen) argument
[all...]
H A Drequest_key_auth.c62 key->payload.data = (struct request_key_auth *)prep->data;
72 struct request_key_auth *rka = key->payload.data;
81 * Read the callout_info data (retrieves the callout information).
87 struct request_key_auth *rka = key->payload.data;
94 /* we can return the data as is */
113 struct request_key_auth *rka = key->payload.data;
128 struct request_key_auth *rka = key->payload.data;
145 * access to the caller's security data.
182 irka = cred->request_key_auth->payload.data;
[all...]
/security/selinux/
H A Dnetlink.c46 static void selnl_add_payload(struct nlmsghdr *nlh, int len, int msgtype, void *data) argument
53 msg->val = *((int *)data);
61 msg->seqno = *((u32 *)data);
70 static void selnl_notify(int msgtype, void *data) argument
87 selnl_add_payload(nlh, len, msgtype, data);
/security/tomoyo/
H A Denviron.c97 const char *data = tomoyo_read_token(param); local
99 if (!tomoyo_correct_word(data) || strchr(data, '='))
101 e.env = tomoyo_get_name(data);
119 if (tomoyo_str_starts(&param->data, "env "))
H A Dsecurityfs_if.c42 char *data; local
46 data = kzalloc(count + 1, GFP_NOFS);
47 if (!data)
49 if (copy_from_user(data, buf, count)) {
53 tomoyo_normalize_line(data);
54 if (tomoyo_correct_domain(data)) {
58 name.name = data;
69 tomoyo_assign_domain(data, true);
91 kfree(data);
H A Dutil.c151 char *pos = param->data;
157 param->data = del;
171 char *start = param->data;
180 param->data = pos;
261 if (param->data[0] == '@') {
262 param->data++;
284 char *data; local
288 if (param->data[0] == '@') {
289 param->data++;
293 data
[all...]
H A Dcommon.c209 * Returns true if all data was flushed, false otherwise.
662 char *data = head->write_buf; local
666 if (sscanf(data, "PROFILE_VERSION=%u", &head->w.ns->profile_version)
669 i = simple_strtoul(data, &cp, 10);
672 data = cp + 1;
676 cp = strchr(data, '=');
680 if (!strcmp(data, "COMMENT")) {
694 if (!strcmp(data, "PREFERENCE")) {
700 return tomoyo_set_mode(data, cp, profile);
876 char *data local
970 tomoyo_select_domain(struct tomoyo_io_buffer *head, const char *data) argument
1100 tomoyo_write_domain2(struct tomoyo_policy_namespace *ns, struct list_head *list, char *data, const bool is_delete) argument
1148 char *data = head->write_buf; local
1722 char *data; local
2199 char *data = head->write_buf; local
2328 char *data = head->write_buf; local
[all...]
H A Dmemory.c64 * @data: Data to copy from.
68 * @data is zero-cleared on success.
72 void *tomoyo_commit_ok(void *data, const unsigned int size) argument
76 memmove(ptr, data, size);
77 memset(data, 0, size);
133 * tomoyo_name_list is used for holding string data used by TOMOYO.
134 * Since same string data is likely used for multiple times (e.g.
135 * "/lib/libc-2.5.so"), TOMOYO shares string data in the form of
141 * tomoyo_get_name - Allocate permanent memory for string data.
H A Ddomain.c103 if (param->data[0]) {
238 char *program = param->data;
592 /* env_page.data is allocated by tomoyo_dump_page(). */
617 if (!env_page.data[offset++])
625 const unsigned char c = env_page.data[offset++];
662 kfree(env_page.data);
694 /* ee->dump->data is allocated by tomoyo_dump_page(). */
850 kfree(ee->dump.data);
869 /* dump->data is released by tomoyo_find_next_domain(). */
870 if (!dump->data) {
[all...]
H A Dgroup.c90 if (param->data[0] == '@' ||
97 * param->data[0] != '@'.
102 if (param->data[0] == '@' ||
/security/smack/
H A Dsmackfs.c379 * @data: string to be parsed whose size is SMK_LOADLEN
385 static int smk_parse_rule(const char *data, struct smack_parsed_rule *rule, argument
390 rc = smk_fill_rule(data, data + SMK_LABELLEN,
391 data + SMK_LABELLEN + SMK_LABELLEN, NULL, rule,
398 * @data: string to be parsed, null terminated
401 * @tokens: numer of substrings expected in data
405 static ssize_t smk_parse_long_rule(char *data, struct smack_parsed_rule *rule, argument
417 while (isspace(data[cnt]))
418 data[cn
467 char *data; local
870 char *data = NULL; local
1165 char *data; local
1594 char *data; local
1676 char *data; local
1870 char *data; local
2094 char *data = NULL; local
2238 char *data; local
2342 smk_fill_super(struct super_block *sb, void *data, int silent) argument
2414 smk_mount(struct file_system_type *fs_type, int flags, const char *dev_name, void *data) argument
[all...]
/security/integrity/ima/
H A Dima_template_lib.c34 static int ima_write_template_field_data(const void *data, const u32 datalen, argument
48 memcpy(buf, data, datalen);
63 field_data->data = buf;
73 u8 *buf_ptr = field_data->data, buflen = field_data->len;
77 buf_ptr = strnchr(field_data->data, buflen, ':');
78 if (buf_ptr != field_data->data)
79 seq_printf(m, "%s", field_data->data);
83 buflen -= buf_ptr - field_data->data;
104 strlen(field_data->data) : field_data->len;
112 ima_putc(m, field_data->data, le
[all...]
H A Dima_fs.c102 void ima_putc(struct seq_file *m, void *data, int datalen) argument
105 seq_putc(m, *(char *)data++);
114 * eventdata[n]=template specific data
156 /* 6th: template specific data */
219 /* 4th: template specific data */
254 char *data = NULL; local
266 data = kmalloc(datalen + 1, GFP_KERNEL);
267 if (!data)
270 *(data + datalen) = '\0';
273 if (copy_from_user(data, bu
[all...]
/security/keys/encrypted-keys/
H A Dmasterkey_trusted.c29 * data, trusted key type data is not visible decrypted from userspace.
42 tpayload = tkey->payload.data;
/security/
H A Dinode.c33 static int fill_super(struct super_block *sb, void *data, int silent) argument
42 void *data)
44 return mount_single(fs_type, flags, data, fill_super);
62 * @data: a pointer to something that the caller will want to get to later
83 struct dentry *parent, void *data,
126 inode->i_private = data;
40 get_sb(struct file_system_type *fs_type, int flags, const char *dev_name, void *data) argument
82 securityfs_create_file(const char *name, umode_t mode, struct dentry *parent, void *data, const struct file_operations *fops) argument
/security/selinux/ss/
H A Dconditional.c273 struct cond_insertf_data *data = ptr; local
274 struct policydb *p = data->p;
275 struct cond_av_list *other = data->other, *list, *cur;
339 if (!data->head)
340 data->head = list;
342 data->tail->next = list;
343 data->tail = list;
347 cond_av_list_destroy(data->head);
348 data->head = NULL;
357 struct cond_insertf_data data; local
[all...]
H A Dpolicydb.h3 * configuration data for the security policy.
39 * in the configuration data: individual permissions,
148 /* Boolean data type */
157 * type set preserves data needed to determine constraint info from
168 * The configuration data includes security contexts for
171 * relevant data for one such entry. Entries of the same kind
328 char *data; member in struct:policy_file
342 memcpy(buf, fp->data, bytes);
343 fp->data += bytes;
352 memcpy(fp->data, bu
[all...]
/security/integrity/
H A Dintegrity.h86 u8 data[2]; member in union:ima_digest_data::__anon13
103 /* integrity data associated with an inode */
119 * integrity data associated with an inode.
151 int siglen, const char *data, int datalen);
154 int siglen, const char *data, int datalen)
153 asymmetric_verify(struct key *keyring, const char *sig, int siglen, const char *data, int datalen) argument
H A Ddigsig_asymmetric.c68 int siglen, const char *data, int datalen)
93 pks.digest = (u8 *)data;
67 asymmetric_verify(struct key *keyring, const char *sig, int siglen, const char *data, int datalen) argument
/security/apparmor/
H A Dapparmorfs.c75 * @userbuf: user buffer to copy data from (NOT NULL)
77 * @copy_size: size of data to copy from user buffer
80 * Returns: kernel buffer containing copy of user buffer data or an
87 char *data; local
103 data = kvmalloc(alloc_size);
104 if (data == NULL)
107 if (copy_from_user(data, userbuf, copy_size)) {
108 kvfree(data);
112 return data;
120 char *data; local
143 char *data; local
165 char *data; local
[all...]
H A Dmatch.c30 * @blob: data to unpack (NOT NULL)
193 * @blob: aligned serialized stream of data to unpack (NOT NULL)
194 * @size: size of data to unpack
207 char *data = blob; local
221 if (ntohl(*(u32 *) data) != YYTH_MAGIC)
224 hsize = ntohl(*(u32 *) (data + 4));
228 dfa->flags = ntohs(*(u16 *) (data + 12));
229 data += hsize;
233 table = unpack_table(data, size);
267 data
[all...]

Completed in 755 milliseconds

123