/security/tomoyo/ |
H A D | load_policy.c | 19 * @str: Program to use as a policy loader (e.g. /sbin/tomoyo-init ). 23 static int __init tomoyo_loader_setup(char *str) argument 25 tomoyo_loader = str; 58 * @str: Program to use as an activation trigger (e.g. /sbin/init ). 62 static int __init tomoyo_trigger_setup(char *str) argument 64 tomoyo_trigger = str;
|
H A D | realpath.c | 13 * @str: String in binary format. 14 * @str_len: Size of @str in byte. 16 * Returns pointer to @str in ascii format on success, NULL otherwise. 21 char *tomoyo_encode2(const char *str, int str_len) argument 25 const char *p = str; 47 p = str; 69 * @str: String in binary format. 71 * Returns pointer to @str in ascii format on success, NULL otherwise. 76 char *tomoyo_encode(const char *str) argument 78 return str [all...] |
H A D | util.c | 190 * @str: Pointer to string to parse. 197 u8 tomoyo_parse_ulong(unsigned long *result, char **str) argument 199 const char *cp = *str; 215 *str = ep; 317 * @str: Pointer to the string. 319 * Returns true if @str is a \ooo style octal value, false otherwise. 324 static inline bool tomoyo_byte_range(const char *str) argument 326 return *str >= '0' && *str++ <= '3' && 327 *str > [all...] |
H A D | common.h | 943 char *tomoyo_encode(const char *str); 944 char *tomoyo_encode2(const char *str, int str_len); 1031 u8 tomoyo_parse_ulong(unsigned long *result, char **str);
|
/security/apparmor/include/ |
H A D | apparmor.h | 67 void aa_info_message(const char *str); 87 * aa_strneq - compare null terminated @str to a non null terminated substring 88 * @str: a null terminated string 92 * The @str string must be full consumed for this to be considered a match 94 static inline bool aa_strneq(const char *str, const char *sub, int len) argument 96 return !strncmp(str, sub, len) && !str[len];
|
H A D | match.h | 121 const char *str, int len); 123 const char *str);
|
/security/keys/encrypted-keys/ |
H A D | encrypted.h | 39 static inline void dump_hmac(const char *str, const u8 *digest, argument 42 if (str) 43 pr_info("encrypted_key: %s", str); 61 static inline void dump_hmac(const char *str, const u8 *digest, argument
|
/security/apparmor/ |
H A D | lib.c | 64 * @str: message to log 66 void aa_info_message(const char *str) argument 73 aad.info = str; 76 printk(KERN_INFO "AppArmor: %s\n", str);
|
H A D | procattr.c | 38 char *str; local 62 s = str = kmalloc(len + 1, GFP_KERNEL); /* + 1 \0 */ 63 if (!str) 76 *string = str;
|
H A D | path.c | 30 static int prepend(char **buffer, int buflen, const char *str, int namelen) argument 36 memcpy(*buffer, str, namelen); 210 char *buf, *str = NULL; local 222 error = get_name_to_buffer(path, flags, buf, size, &str, info); 233 *name = str;
|
H A D | match.c | 285 * aa_dfa_match_len - traverse @dfa to find state @str stops at 286 * @dfa: the dfa to match @str against (NOT NULL) 288 * @str: the string of bytes to match against the dfa (NOT NULL) 291 * aa_dfa_match_len will match @str against the dfa and return the state it 301 const char *str, int len) 312 /* current state is <state>, matching character *str */ 318 pos = base_idx(base[state]) + equiv[(u8) *str++]; 327 pos = base_idx(base[state]) + (u8) *str++; 339 * aa_dfa_match - traverse @dfa to find state @str stops at 340 * @dfa: the dfa to match @str agains 300 aa_dfa_match_len(struct aa_dfa *dfa, unsigned int start, const char *str, int len) argument 350 aa_dfa_match(struct aa_dfa *dfa, unsigned int start, const char *str) argument [all...] |
H A D | policy_unpack.c | 391 char *str; local 392 int c, j, size2 = unpack_strdup(e, &str, NULL); 398 profile->file.trans.table[i] = str; 400 if (isspace(*str)) 405 if (!str[j]) 408 if (*str == ':') { 416 if (!str[1])
|
H A D | file.c | 32 char str[10]; local 34 char *m = str; 57 audit_log_string(ab, str);
|
/security/selinux/ss/ |
H A D | context.h | 32 char *str; /* string representation if context cannot be mapped. */ member in struct:context 124 if (src->str) { 125 dst->str = kstrdup(src->str, GFP_ATOMIC); 126 if (!dst->str) 130 dst->str = NULL; 135 kfree(dst->str); 144 kfree(c->str); 145 c->str = NULL; 153 return (c1->len == c2->len && !strcmp(c1->str, c [all...] |
H A D | mls.h | 40 int mls_from_string(char *str, struct context *context, gfp_t gfp_mask);
|
H A D | services.c | 1185 *scontext = kstrdup(context->str, GFP_ATOMIC); 1393 char *scontext2, *str = NULL; local 1425 str = kstrdup(scontext2, gfp_flags); 1426 if (!str) 1434 context.str = str; 1436 str = NULL; 1445 kfree(str); 1858 if (c->str) { 1862 s = kstrdup(c->str, GFP_KERNE [all...] |
H A D | mls.c | 374 * the string `str'. This function will allocate temporary memory with the 377 int mls_from_string(char *str, struct context *context, gfp_t gfp_mask) argument 387 tmpstr = freestr = kstrdup(str, gfp_mask);
|
H A D | sidtab.c | 225 context->str);
|
/security/integrity/ima/ |
H A D | ima_template.c | 45 static int __init ima_template_setup(char *str) argument 48 int template_len = strlen(str); 54 template_desc = lookup_template_desc(str); 62 if (template_len == 3 && strcmp(str, IMA_TEMPLATE_IMA_NAME) == 0 &&
|
H A D | ima_main.c | 42 static int __init hash_setup(char *str) argument 51 if (strncmp(str, "sha1", 4) == 0) 53 else if (strncmp(str, "md5", 3) == 0) 59 if (strcmp(str, hash_algo_name[i]) == 0) {
|
H A D | ima_appraise.c | 22 static int __init default_appraise_setup(char *str) argument 24 if (strncmp(str, "off", 3) == 0) 26 else if (strncmp(str, "log", 3) == 0) 28 else if (strncmp(str, "fix", 3) == 0)
|
H A D | ima_policy.c | 113 static int __init default_measure_policy_setup(char *str) argument 121 static int __init default_appraise_policy_setup(char *str) argument
|
/security/integrity/ |
H A D | integrity_audit.c | 21 static int __init integrity_audit_setup(char *str) argument 25 if (!kstrtoul(str, 0, &audit))
|
/security/integrity/evm/ |
H A D | evm_main.c | 57 static int __init evm_set_fixmode(char *str) argument 59 if (strncmp(str, "fix", 3) == 0)
|
/security/ |
H A D | device_cgroup.c | 267 static void set_majmin(char *str, unsigned m) argument 270 strcpy(str, "*"); 272 sprintf(str, "%u", m);
|