Searched refs:string (Results 1 - 25 of 25) sorted by relevance

/security/apparmor/include/
H A Dprocattr.h21 int aa_getprocattr(struct aa_profile *profile, char **string);
H A Dapparmorfs.h35 char *string; member in union:aa_fs_entry::__anon2
50 .v_type = AA_FS_TYPE_STRING, .v.string = (_value), \
/security/smack/
H A Dsmack_access.c280 * readable string
281 * @string : the string to fill
285 static inline void smack_str_from_perm(char *string, int access) argument
290 string[i++] = 'r';
292 string[i++] = 'w';
294 string[i++] = 'x';
296 string[i++] = 'a';
298 string[i++] = 't';
300 string[
407 smk_find_entry(const char *string) argument
430 smk_parse_smack(const char *string, int len) argument
506 smk_import_entry(const char *string, int len) argument
[all...]
H A Dsmack.h242 char *smk_parse_smack(const char *string, int len);
H A Dsmackfs.c272 * smk_perm_from_str - parse smack accesses from a text string
273 * @string: a text string that contains a Smack accesses code
277 static int smk_perm_from_str(const char *string) argument
282 for (cp = string; ; cp++)
321 * @subject: subject label string
322 * @object: object label string
323 * @access1: access string
324 * @access2: string with permissions to be removed
378 * smk_parse_rule - parse Smack rule from load string
[all...]
/security/selinux/ss/
H A Dsymtab.c7 #include <linux/string.h>
H A Dconditional.c12 #include <linux/string.h>
H A Dmls.c23 #include <linux/string.h>
33 * security context string representation of `context'.
84 * Write the security context string representation of
85 * the MLS fields of `context' into the string `*scontext'.
218 * `context' based on the string representation in
219 * the string `*scontext'. Update `*scontext' to
220 * point to the end of the string representation of
223 * This function modifies the string in place, inserting
373 * `context' based on the string representation in
374 * the string `st
[all...]
H A Dservices.c44 #include <linux/string.h>
139 /* An empty class string skips ahead */
159 /* An empty permission string skips ahead */
1168 * Write the security context string representation of
1170 * allocated string of the correct size. Set `*scontext'
1171 * to point to this string and set `*scontext_len' to
1172 * the length of the string.
1290 * Write the string representation of the context associated with @sid
1291 * into a dynamically allocated string of the correct size. Set @scontext
1292 * to point to this string an
[all...]
H A Dpolicydb.c31 #include <linux/string.h>
322 * structures into string representations. The
1941 /* length of the path component string */
1947 /* path component string */
2245 /* Read the magic number and string length. */
2261 printk(KERN_ERR "SELinux: policydb string length %d does not "
2271 "string of length %d\n", len);
2277 printk(KERN_ERR "SELinux: truncated policydb string identifier\n");
2285 printk(KERN_ERR "SELinux: policydb string %s does not match "
2286 "my string
[all...]
/security/tomoyo/
H A Dutil.c124 * @string: String representation for permissions in foo/bar/buz format.
125 * @keyword: Keyword to find from @string/
127 * Returns ture if @keyword was found in @string, false otherwise.
131 bool tomoyo_permstr(const char *string, const char *keyword) argument
133 const char *cp = strstr(string, keyword);
135 return cp == string || *(cp - 1) == '/';
190 * @str: Pointer to string to parse.
315 * tomoyo_byte_range - Check whether the string is a \ooo style octal value.
317 * @str: Pointer to the string.
382 * tomoyo_str_starts - Check whether the given string start
443 tomoyo_correct_word2(const char *string, size_t len) argument
520 tomoyo_correct_word(const char *string) argument
[all...]
H A Dgc.c63 * tomoyo_name_used_by_io_buffer - Check whether the string is used by /sys/kernel/security/tomoyo/ users or not.
65 * @string: String to check.
67 * Returns true if @string is used by /sys/kernel/security/tomoyo/ users,
70 static bool tomoyo_name_used_by_io_buffer(const char *string) argument
73 const size_t size = strlen(string) + 1;
84 if (w < string || w > string + size)
H A Dcommon.h13 #include <linux/string.h>
40 * TOMOYO uses this hash only when appending a string into the string
508 /* Structure for holding string data. */
924 bool tomoyo_correct_word(const char *string);
941 bool tomoyo_permstr(const char *string, const char *keyword);
H A Dcommon.c191 * @fmt: The printf()'s format string, followed by parameters.
205 * tomoyo_flush - Flush queued string to userspace's buffer.
247 * tomoyo_set_string - Queue string to "struct tomoyo_io_buffer" structure.
250 * @string: String to print.
252 * Note that @string has to be kept valid until @head is kfree()d.
256 static void tomoyo_set_string(struct tomoyo_io_buffer *head, const char *string) argument
259 head->r.w[head->r.w_pos++] = string;
272 * @fmt: The printf()'s format string, followed by parameters.
540 * @string: String to check.
545 static s8 tomoyo_find_yesno(const char *string, cons argument
567 tomoyo_set_uint(unsigned int *i, const char *string, const char *find) argument
[all...]
/security/apparmor/
H A Dprocattr.c25 * @string: Returns - string containing the profile info (NOT NULL)
27 * Returns: length of @string on success else error on failure
31 * Creates a string containing the namespace_name://profile_name for
34 * Returns: size of string placed in @string else error code on failure
36 int aa_getprocattr(struct aa_profile *profile, char **string) argument
56 /* unconfined profiles don't have a mode string appended */
72 /* mode string not being appended */
76 *string
[all...]
H A Dlib.c17 #include <linux/string.h>
27 * @ns_name: pointer to portion of the string containing the ns name (NOT NULL)
35 * NOTE: may modify the @fqname string. The pointers returned point
36 * into the @fqname string.
H A Dpolicy_unpack.c35 * which has a name (AA_NAME typecode followed by name string) followed by
46 AA_NAME, /* same as string except it is items name */
252 static int unpack_str(struct aa_ext *e, const char **string, const char *name) argument
257 *string = NULL;
264 *string = src_str;
274 static int unpack_strdup(struct aa_ext *e, char **string, const char *name) argument
279 *string = NULL;
284 *string = kmemdup(tmp, res, GFP_KERNEL);
285 if (!*string) {
496 /* attachment string i
[all...]
H A Dapparmorfs.c169 * aa_remove_profile needs a null terminated string so 1 extra
201 seq_printf(seq, "%s\n", fs_file->v.string);
H A Dpolicy.c78 #include <linux/string.h>
195 * @str: string to search for (NOT NULL)
1036 * @info - Returns: info string on why lookup failed
/security/
H A DKconfig162 string
/security/keys/encrypted-keys/
H A Dencrypted.c22 #include <linux/string.h>
273 * datablob_format - format as an ascii string, before copying to userspace
/security/keys/
H A Dkeyctl.c21 #include <linux/string.h>
52 * If the description is NULL or an empty string, the key type is asked to
160 * non-NULL in an attempt to create a key. The _callout_info string will be
162 * _callout_info string is "" then it will be changed to "-".
1455 * string */
H A Dtrusted.c19 #include <linux/string.h>
/security/selinux/
H A Dselinuxfs.c24 #include <linux/string.h>
H A Dhooks.c78 #include <linux/string.h>
931 /* Standard string-based options. */
1042 * string mount options parsing and call set the sbsec

Completed in 1988 milliseconds