/security/keys/ |
H A D | sysctl.c | 21 .data = &key_quota_maxkeys, 30 .data = &key_quota_maxbytes, 39 .data = &key_quota_root_maxkeys, 48 .data = &key_quota_root_maxbytes, 57 .data = &key_gc_delay, 67 .data = &persistent_keyring_expiry,
|
H A D | user_defined.c | 25 * arbitrary blob of data as the payload 68 if (datalen <= 0 || datalen > 32767 || !prep->data) 75 /* attach the data */ 79 memcpy(upayload->data, prep->data, datalen); 104 if (datalen <= 0 || datalen > 32767 || !prep->data) 114 memcpy(upayload->data, prep->data, datalen); 116 /* check the quota and attach the new data */ 122 /* attach the new data, displacin [all...] |
H A D | big_key.c | 24 * If the data is under this limit, there's no point creating a shm file to 26 * least as large as the data. 32 * arbitrary blob of data as the payload 57 if (datalen <= 0 || datalen > 1024 * 1024 || !prep->data) 66 /* Create a shmem file to store the data in. This will permit the data 69 * TODO: Encrypt the stored data with a temporary key. 77 written = kernel_write(file, prep->data, prep->datalen, 0); 92 /* Just store the data in a buffer */ 93 void *data local [all...] |
H A D | trusted.h | 22 unsigned char data[MAX_BUF_SIZE]; member in struct:tpm_buf 113 buf->data[buf->len++] = value; 118 *(uint16_t *) & buf->data[buf->len] = htons(value); 124 *(uint32_t *) & buf->data[buf->len] = htonl(value); 131 memcpy(buf->data + buf->len, in, len);
|
H A D | trusted.c | 59 static int TSS_sha1(const unsigned char *data, unsigned int datalen, argument 71 ret = crypto_shash_digest(&sdesc->shash, data, datalen, digest); 82 unsigned char *data; local 103 data = va_arg(argp, unsigned char *); 104 if (data == NULL) { 108 ret = crypto_shash_update(&sdesc->shash, data, dlen); 130 unsigned char *data; local 150 data = va_arg(argp, unsigned char *); 151 if (!data) { 155 ret = crypto_shash_update(&sdesc->shash, data, dle 458 tpm_seal(struct tpm_buf *tb, uint16_t keytype, uint32_t keyhandle, const unsigned char *keyauth, const unsigned char *data, uint32_t datalen, unsigned char *blob, uint32_t *bloblen, const unsigned char *blobauth, const unsigned char *pcrinfo, uint32_t pcrinfosize) argument 573 tpm_unseal(struct tpm_buf *tb, uint32_t keyhandle, const unsigned char *keyauth, const unsigned char *blob, int bloblen, const unsigned char *blobauth, unsigned char *data, unsigned int *datalen) argument [all...] |
H A D | request_key_auth.c | 62 key->payload.data = (struct request_key_auth *)prep->data; 72 struct request_key_auth *rka = key->payload.data; 81 * Read the callout_info data (retrieves the callout information). 87 struct request_key_auth *rka = key->payload.data; 94 /* we can return the data as is */ 113 struct request_key_auth *rka = key->payload.data; 128 struct request_key_auth *rka = key->payload.data; 145 * access to the caller's security data. 182 irka = cred->request_key_auth->payload.data; [all...] |
/security/selinux/ |
H A D | netlink.c | 46 static void selnl_add_payload(struct nlmsghdr *nlh, int len, int msgtype, void *data) argument 53 msg->val = *((int *)data); 61 msg->seqno = *((u32 *)data); 70 static void selnl_notify(int msgtype, void *data) argument 87 selnl_add_payload(nlh, len, msgtype, data);
|
/security/tomoyo/ |
H A D | environ.c | 97 const char *data = tomoyo_read_token(param); local 99 if (!tomoyo_correct_word(data) || strchr(data, '=')) 101 e.env = tomoyo_get_name(data); 119 if (tomoyo_str_starts(¶m->data, "env "))
|
H A D | securityfs_if.c | 42 char *data; local 46 data = kzalloc(count + 1, GFP_NOFS); 47 if (!data) 49 if (copy_from_user(data, buf, count)) { 53 tomoyo_normalize_line(data); 54 if (tomoyo_correct_domain(data)) { 58 name.name = data; 69 tomoyo_assign_domain(data, true); 91 kfree(data);
|
H A D | util.c | 151 char *pos = param->data; 157 param->data = del; 171 char *start = param->data; 180 param->data = pos; 261 if (param->data[0] == '@') { 262 param->data++; 284 char *data; local 288 if (param->data[0] == '@') { 289 param->data++; 293 data [all...] |
H A D | common.c | 209 * Returns true if all data was flushed, false otherwise. 662 char *data = head->write_buf; local 666 if (sscanf(data, "PROFILE_VERSION=%u", &head->w.ns->profile_version) 669 i = simple_strtoul(data, &cp, 10); 672 data = cp + 1; 676 cp = strchr(data, '='); 680 if (!strcmp(data, "COMMENT")) { 694 if (!strcmp(data, "PREFERENCE")) { 700 return tomoyo_set_mode(data, cp, profile); 876 char *data local 970 tomoyo_select_domain(struct tomoyo_io_buffer *head, const char *data) argument 1100 tomoyo_write_domain2(struct tomoyo_policy_namespace *ns, struct list_head *list, char *data, const bool is_delete) argument 1148 char *data = head->write_buf; local 1722 char *data; local 2199 char *data = head->write_buf; local 2328 char *data = head->write_buf; local [all...] |
H A D | memory.c | 64 * @data: Data to copy from. 68 * @data is zero-cleared on success. 72 void *tomoyo_commit_ok(void *data, const unsigned int size) argument 76 memmove(ptr, data, size); 77 memset(data, 0, size); 133 * tomoyo_name_list is used for holding string data used by TOMOYO. 134 * Since same string data is likely used for multiple times (e.g. 135 * "/lib/libc-2.5.so"), TOMOYO shares string data in the form of 141 * tomoyo_get_name - Allocate permanent memory for string data.
|
H A D | domain.c | 103 if (param->data[0]) { 238 char *program = param->data; 592 /* env_page.data is allocated by tomoyo_dump_page(). */ 617 if (!env_page.data[offset++]) 625 const unsigned char c = env_page.data[offset++]; 662 kfree(env_page.data); 694 /* ee->dump->data is allocated by tomoyo_dump_page(). */ 850 kfree(ee->dump.data); 869 /* dump->data is released by tomoyo_find_next_domain(). */ 870 if (!dump->data) { [all...] |
H A D | group.c | 90 if (param->data[0] == '@' || 97 * param->data[0] != '@'. 102 if (param->data[0] == '@' ||
|
/security/smack/ |
H A D | smackfs.c | 379 * @data: string to be parsed whose size is SMK_LOADLEN 385 static int smk_parse_rule(const char *data, struct smack_parsed_rule *rule, argument 390 rc = smk_fill_rule(data, data + SMK_LABELLEN, 391 data + SMK_LABELLEN + SMK_LABELLEN, NULL, rule, 398 * @data: string to be parsed, null terminated 401 * @tokens: numer of substrings expected in data 405 static ssize_t smk_parse_long_rule(char *data, struct smack_parsed_rule *rule, argument 417 while (isspace(data[cnt])) 418 data[cn 467 char *data; local 870 char *data = NULL; local 1165 char *data; local 1594 char *data; local 1676 char *data; local 1870 char *data; local 2094 char *data = NULL; local 2238 char *data; local 2342 smk_fill_super(struct super_block *sb, void *data, int silent) argument 2414 smk_mount(struct file_system_type *fs_type, int flags, const char *dev_name, void *data) argument [all...] |
/security/integrity/ima/ |
H A D | ima_template_lib.c | 34 static int ima_write_template_field_data(const void *data, const u32 datalen, argument 48 memcpy(buf, data, datalen); 63 field_data->data = buf; 73 u8 *buf_ptr = field_data->data, buflen = field_data->len; 77 buf_ptr = strnchr(field_data->data, buflen, ':'); 78 if (buf_ptr != field_data->data) 79 seq_printf(m, "%s", field_data->data); 83 buflen -= buf_ptr - field_data->data; 104 strlen(field_data->data) : field_data->len; 112 ima_putc(m, field_data->data, le [all...] |
H A D | ima_fs.c | 102 void ima_putc(struct seq_file *m, void *data, int datalen) argument 105 seq_putc(m, *(char *)data++); 114 * eventdata[n]=template specific data 156 /* 6th: template specific data */ 219 /* 4th: template specific data */ 254 char *data = NULL; local 266 data = kmalloc(datalen + 1, GFP_KERNEL); 267 if (!data) 270 *(data + datalen) = '\0'; 273 if (copy_from_user(data, bu [all...] |
/security/keys/encrypted-keys/ |
H A D | masterkey_trusted.c | 29 * data, trusted key type data is not visible decrypted from userspace. 42 tpayload = tkey->payload.data;
|
/security/ |
H A D | inode.c | 33 static int fill_super(struct super_block *sb, void *data, int silent) argument 42 void *data) 44 return mount_single(fs_type, flags, data, fill_super); 62 * @data: a pointer to something that the caller will want to get to later 83 struct dentry *parent, void *data, 126 inode->i_private = data; 40 get_sb(struct file_system_type *fs_type, int flags, const char *dev_name, void *data) argument 82 securityfs_create_file(const char *name, umode_t mode, struct dentry *parent, void *data, const struct file_operations *fops) argument
|
/security/selinux/ss/ |
H A D | conditional.c | 273 struct cond_insertf_data *data = ptr; local 274 struct policydb *p = data->p; 275 struct cond_av_list *other = data->other, *list, *cur; 339 if (!data->head) 340 data->head = list; 342 data->tail->next = list; 343 data->tail = list; 347 cond_av_list_destroy(data->head); 348 data->head = NULL; 357 struct cond_insertf_data data; local [all...] |
H A D | policydb.h | 3 * configuration data for the security policy. 39 * in the configuration data: individual permissions, 148 /* Boolean data type */ 157 * type set preserves data needed to determine constraint info from 168 * The configuration data includes security contexts for 171 * relevant data for one such entry. Entries of the same kind 328 char *data; member in struct:policy_file 342 memcpy(buf, fp->data, bytes); 343 fp->data += bytes; 352 memcpy(fp->data, bu [all...] |
/security/integrity/ |
H A D | integrity.h | 86 u8 data[2]; member in union:ima_digest_data::__anon13 103 /* integrity data associated with an inode */ 119 * integrity data associated with an inode. 151 int siglen, const char *data, int datalen); 154 int siglen, const char *data, int datalen) 153 asymmetric_verify(struct key *keyring, const char *sig, int siglen, const char *data, int datalen) argument
|
H A D | digsig_asymmetric.c | 68 int siglen, const char *data, int datalen) 93 pks.digest = (u8 *)data; 67 asymmetric_verify(struct key *keyring, const char *sig, int siglen, const char *data, int datalen) argument
|
/security/apparmor/ |
H A D | apparmorfs.c | 75 * @userbuf: user buffer to copy data from (NOT NULL) 77 * @copy_size: size of data to copy from user buffer 80 * Returns: kernel buffer containing copy of user buffer data or an 87 char *data; local 103 data = kvmalloc(alloc_size); 104 if (data == NULL) 107 if (copy_from_user(data, userbuf, copy_size)) { 108 kvfree(data); 112 return data; 120 char *data; local 143 char *data; local 165 char *data; local [all...] |
H A D | match.c | 30 * @blob: data to unpack (NOT NULL) 193 * @blob: aligned serialized stream of data to unpack (NOT NULL) 194 * @size: size of data to unpack 207 char *data = blob; local 221 if (ntohl(*(u32 *) data) != YYTH_MAGIC) 224 hsize = ntohl(*(u32 *) (data + 4)); 228 dfa->flags = ntohs(*(u16 *) (data + 12)); 229 data += hsize; 233 table = unpack_table(data, size); 267 data [all...] |