/security/apparmor/include/ |
H A D | procattr.h | 21 int aa_getprocattr(struct aa_profile *profile, char **string);
|
H A D | apparmorfs.h | 35 char *string; member in union:aa_fs_entry::__anon2 50 .v_type = AA_FS_TYPE_STRING, .v.string = (_value), \
|
/security/smack/ |
H A D | smack_access.c | 280 * readable string 281 * @string : the string to fill 285 static inline void smack_str_from_perm(char *string, int access) argument 290 string[i++] = 'r'; 292 string[i++] = 'w'; 294 string[i++] = 'x'; 296 string[i++] = 'a'; 298 string[i++] = 't'; 300 string[ 407 smk_find_entry(const char *string) argument 430 smk_parse_smack(const char *string, int len) argument 506 smk_import_entry(const char *string, int len) argument [all...] |
H A D | smack.h | 242 char *smk_parse_smack(const char *string, int len);
|
H A D | smackfs.c | 272 * smk_perm_from_str - parse smack accesses from a text string 273 * @string: a text string that contains a Smack accesses code 277 static int smk_perm_from_str(const char *string) argument 282 for (cp = string; ; cp++) 321 * @subject: subject label string 322 * @object: object label string 323 * @access1: access string 324 * @access2: string with permissions to be removed 378 * smk_parse_rule - parse Smack rule from load string [all...] |
/security/selinux/ss/ |
H A D | symtab.c | 7 #include <linux/string.h>
|
H A D | conditional.c | 12 #include <linux/string.h>
|
H A D | mls.c | 23 #include <linux/string.h> 33 * security context string representation of `context'. 84 * Write the security context string representation of 85 * the MLS fields of `context' into the string `*scontext'. 218 * `context' based on the string representation in 219 * the string `*scontext'. Update `*scontext' to 220 * point to the end of the string representation of 223 * This function modifies the string in place, inserting 373 * `context' based on the string representation in 374 * the string `st [all...] |
H A D | services.c | 44 #include <linux/string.h> 139 /* An empty class string skips ahead */ 159 /* An empty permission string skips ahead */ 1168 * Write the security context string representation of 1170 * allocated string of the correct size. Set `*scontext' 1171 * to point to this string and set `*scontext_len' to 1172 * the length of the string. 1290 * Write the string representation of the context associated with @sid 1291 * into a dynamically allocated string of the correct size. Set @scontext 1292 * to point to this string an [all...] |
H A D | policydb.c | 31 #include <linux/string.h> 322 * structures into string representations. The 1941 /* length of the path component string */ 1947 /* path component string */ 2245 /* Read the magic number and string length. */ 2261 printk(KERN_ERR "SELinux: policydb string length %d does not " 2271 "string of length %d\n", len); 2277 printk(KERN_ERR "SELinux: truncated policydb string identifier\n"); 2285 printk(KERN_ERR "SELinux: policydb string %s does not match " 2286 "my string [all...] |
/security/tomoyo/ |
H A D | util.c | 124 * @string: String representation for permissions in foo/bar/buz format. 125 * @keyword: Keyword to find from @string/ 127 * Returns ture if @keyword was found in @string, false otherwise. 131 bool tomoyo_permstr(const char *string, const char *keyword) argument 133 const char *cp = strstr(string, keyword); 135 return cp == string || *(cp - 1) == '/'; 190 * @str: Pointer to string to parse. 315 * tomoyo_byte_range - Check whether the string is a \ooo style octal value. 317 * @str: Pointer to the string. 382 * tomoyo_str_starts - Check whether the given string start 443 tomoyo_correct_word2(const char *string, size_t len) argument 520 tomoyo_correct_word(const char *string) argument [all...] |
H A D | gc.c | 63 * tomoyo_name_used_by_io_buffer - Check whether the string is used by /sys/kernel/security/tomoyo/ users or not. 65 * @string: String to check. 67 * Returns true if @string is used by /sys/kernel/security/tomoyo/ users, 70 static bool tomoyo_name_used_by_io_buffer(const char *string) argument 73 const size_t size = strlen(string) + 1; 84 if (w < string || w > string + size)
|
H A D | common.h | 13 #include <linux/string.h> 40 * TOMOYO uses this hash only when appending a string into the string 508 /* Structure for holding string data. */ 924 bool tomoyo_correct_word(const char *string); 941 bool tomoyo_permstr(const char *string, const char *keyword);
|
H A D | common.c | 191 * @fmt: The printf()'s format string, followed by parameters. 205 * tomoyo_flush - Flush queued string to userspace's buffer. 247 * tomoyo_set_string - Queue string to "struct tomoyo_io_buffer" structure. 250 * @string: String to print. 252 * Note that @string has to be kept valid until @head is kfree()d. 256 static void tomoyo_set_string(struct tomoyo_io_buffer *head, const char *string) argument 259 head->r.w[head->r.w_pos++] = string; 272 * @fmt: The printf()'s format string, followed by parameters. 540 * @string: String to check. 545 static s8 tomoyo_find_yesno(const char *string, cons argument 567 tomoyo_set_uint(unsigned int *i, const char *string, const char *find) argument [all...] |
/security/apparmor/ |
H A D | procattr.c | 25 * @string: Returns - string containing the profile info (NOT NULL) 27 * Returns: length of @string on success else error on failure 31 * Creates a string containing the namespace_name://profile_name for 34 * Returns: size of string placed in @string else error code on failure 36 int aa_getprocattr(struct aa_profile *profile, char **string) argument 56 /* unconfined profiles don't have a mode string appended */ 72 /* mode string not being appended */ 76 *string [all...] |
H A D | lib.c | 17 #include <linux/string.h> 27 * @ns_name: pointer to portion of the string containing the ns name (NOT NULL) 35 * NOTE: may modify the @fqname string. The pointers returned point 36 * into the @fqname string.
|
H A D | policy_unpack.c | 35 * which has a name (AA_NAME typecode followed by name string) followed by 46 AA_NAME, /* same as string except it is items name */ 252 static int unpack_str(struct aa_ext *e, const char **string, const char *name) argument 257 *string = NULL; 264 *string = src_str; 274 static int unpack_strdup(struct aa_ext *e, char **string, const char *name) argument 279 *string = NULL; 284 *string = kmemdup(tmp, res, GFP_KERNEL); 285 if (!*string) { 496 /* attachment string i [all...] |
H A D | apparmorfs.c | 169 * aa_remove_profile needs a null terminated string so 1 extra 201 seq_printf(seq, "%s\n", fs_file->v.string);
|
H A D | policy.c | 78 #include <linux/string.h> 195 * @str: string to search for (NOT NULL) 1036 * @info - Returns: info string on why lookup failed
|
/security/ |
H A D | Kconfig | 162 string
|
/security/keys/encrypted-keys/ |
H A D | encrypted.c | 22 #include <linux/string.h> 273 * datablob_format - format as an ascii string, before copying to userspace
|
/security/keys/ |
H A D | keyctl.c | 21 #include <linux/string.h> 52 * If the description is NULL or an empty string, the key type is asked to 160 * non-NULL in an attempt to create a key. The _callout_info string will be 162 * _callout_info string is "" then it will be changed to "-". 1455 * string */
|
H A D | trusted.c | 19 #include <linux/string.h>
|
/security/selinux/ |
H A D | selinuxfs.c | 24 #include <linux/string.h>
|
H A D | hooks.c | 78 #include <linux/string.h> 931 /* Standard string-based options. */ 1042 * string mount options parsing and call set the sbsec
|