/security/apparmor/include/ |
H A D | crypto.h | 21 int aa_calc_profile_hash(struct aa_profile *profile, u32 version, void *start, 25 void *start, size_t len) 24 aa_calc_profile_hash(struct aa_profile *profile, u32 version, void *start, size_t len) argument
|
H A D | apparmor.h | 102 * @start: the state of the dfa to start matching in 109 unsigned int start) 112 return aa_dfa_next(dfa, start, 0); 108 aa_dfa_null_transition(struct aa_dfa *dfa, unsigned int start) argument
|
H A D | file.h | 163 unsigned int start; member in struct:aa_file_rules 170 unsigned int aa_str_perms(struct aa_dfa *dfa, unsigned int start,
|
H A D | policy.h | 145 * start: set of start states for the different classes of data 150 unsigned int start[AA_CLASS_LAST + 1]; member in struct:aa_policydb
|
/security/apparmor/ |
H A D | crypto.c | 32 int aa_calc_profile_hash(struct aa_profile *profile, u32 version, void *start, argument 58 error = crypto_shash_update(&desc.shash, (u8 *) start, len);
|
H A D | match.c | 46 /* loaded td_id's start at 1, subtract 1 now to avoid doing 287 * @start: the state of the dfa to start matching in 293 * label, or as the start state of a continuing match. 300 unsigned int aa_dfa_match_len(struct aa_dfa *dfa, unsigned int start, argument 307 unsigned int state = start, pos; 341 * @start: the state of the dfa to start matching in 346 * label, or as the start state of a continuing match. 350 unsigned int aa_dfa_match(struct aa_dfa *dfa, unsigned int start, argument [all...] |
H A D | file.c | 231 * @state: state to start matching in 236 * Returns: the final state in @dfa when beginning @start and walking @name 238 unsigned int aa_str_perms(struct aa_dfa *dfa, unsigned int start, argument 248 state = aa_dfa_match(dfa, start, name); 298 aa_str_perms(profile->file.dfa, profile->file.start, name, cond, 340 * is done from the point of the link match (not start of DFA) 380 state = aa_str_perms(profile->file.dfa, profile->file.start, lname, 409 aa_str_perms(profile->file.dfa, profile->file.start, tname, &cond,
|
H A D | domain.c | 91 * @start: state to start matching in 98 unsigned int start) 112 aa_str_perms(profile->file.dfa, start, name, &cond, &perms); 118 state = aa_dfa_match(profile->file.dfa, start, ns->base.name); 366 state = profile->file.start; 807 profile->file.start); 95 change_profile_perms(struct aa_profile *profile, struct aa_namespace *ns, const char *name, u32 request, unsigned int start) argument
|
H A D | policy_unpack.c | 63 void *start; member in struct:aa_ext 101 aad.iface.pos = e->pos - e->start; 120 * @chunk: start address for chunk of data (NOT NULL) 339 size_t sz = blob - (char *) e->start - 340 ((e->pos - e->start) & 7); 399 /* verify that name doesn't start with space */ 587 if (!unpack_u32(e, &profile->policy.start[0], "start")) 588 /* default start state */ 589 profile->policy.start[ 762 void *start; local [all...] |
/security/tomoyo/ |
H A D | condition.c | 245 * @start: String to save. 249 static const struct tomoyo_path_info *tomoyo_get_dqword(char *start) argument 251 char *cp = start + strlen(start) - 1; 252 if (cp == start || *start++ != '"' || *cp != '"') 255 if (*start && !tomoyo_correct_word(start)) 257 return tomoyo_get_name(start);
|
H A D | util.c | 171 char *start = param->data; local 172 char *pos = start; 181 if (tomoyo_correct_domain(start)) 182 return tomoyo_get_name(start); 445 const char *const start = string; local 473 if (string - 3 < start || *(string - 3) != '/') 675 * @filename: The start of string to check. 677 * @pattern: The start of pattern to compare. 793 * @filename: The start of string to check. 795 * @pattern: The start o [all...] |
H A D | common.c | 1921 char *start = str; local 1925 return strlen(start) + 1; 2746 char *start = ""; local 2749 start = tomoyo_builtin_profile; 2754 start = tomoyo_builtin_exception_policy; 2759 start = tomoyo_builtin_domain_policy; 2764 start = tomoyo_builtin_manager; 2769 start = tomoyo_builtin_stat; 2775 char *end = strchr(start, '\n'); 2779 tomoyo_normalize_line(start); [all...] |