| /security/ipe/ |
| A D | hooks.c | 205 struct ipe_bdev *blob = ipe_bdev(bdev); in ipe_bdev_free_security() local 207 ipe_digest_free(blob->root_hash); in ipe_bdev_free_security() 211 static void ipe_set_dmverity_signature(struct ipe_bdev *blob, in ipe_set_dmverity_signature() argument 215 blob->dm_verity_signed = size > 0 && value; in ipe_set_dmverity_signature() 218 static inline void ipe_set_dmverity_signature(struct ipe_bdev *blob, in ipe_set_dmverity_signature() argument 242 struct ipe_bdev *blob = ipe_bdev(bdev); in ipe_bdev_setintegrity() local 246 ipe_set_dmverity_signature(blob, value, size); in ipe_bdev_setintegrity() 255 ipe_digest_free(blob->root_hash); in ipe_bdev_setintegrity() 256 blob->root_hash = NULL; in ipe_bdev_setintegrity() 276 ipe_digest_free(blob->root_hash); in ipe_bdev_setintegrity() [all …]
|
| /security/keys/trusted-keys/ |
| A D | trusted_tpm2.c | 84 work1 = payload->blob; in tpm2_key_encode() 94 return work1 - payload->blob; in tpm2_key_encode() 115 u8 *blob; in tpm2_key_decode() local 128 if (!blob) in tpm2_key_decode() 131 *buf = blob; in tpm2_key_decode() 135 blob += ctx.priv_len; in tpm2_key_decode() 137 memcpy(blob, ctx.pub, ctx.pub_len); in tpm2_key_decode() 394 u8 *blob, *pub; in tpm2_load_cmd() local 401 blob = payload->blob; in tpm2_load_cmd() 467 if (blob != payload->blob) in tpm2_load_cmd() [all …]
|
| A D | trusted_caam.c | 24 .output = p->blob, .output_len = MAX_BLOB_SIZE, in trusted_caam_seal() 40 .input = p->blob, .input_len = p->blob_len, in trusted_caam_unseal()
|
| A D | trusted_tee.c | 74 sizeof(p->key) + sizeof(p->blob)); in trusted_tee_seal() 90 param[1].u.memref.size = sizeof(p->blob); in trusted_tee_seal() 121 sizeof(p->key) + sizeof(p->blob)); in trusted_tee_unseal()
|
| A D | trusted_tpm1.c | 471 unsigned char *blob, uint32_t *bloblen, in tpm_seal() argument 575 memcpy(blob, tb->data + TPM_DATA_OFFSET, storedsize); in tpm_seal() 588 const unsigned char *blob, int bloblen, in tpm_unseal() argument 626 &ordinal, bloblen, blob, 0, 0); in tpm_unseal() 631 &ordinal, bloblen, blob, 0, 0); in tpm_unseal() 638 tpm_buf_append(tb, blob, bloblen); in tpm_unseal() 686 p->key, p->key_len + 1, p->blob, &p->blob_len, in key_seal() 708 ret = tpm_unseal(&tb, o->keyhandle, o->keyauth, p->blob, p->blob_len, in key_unseal()
|
| A D | trusted_dcp.c | 202 struct dcp_blob_fmt *b = (struct dcp_blob_fmt *)p->blob; in trusted_dcp_seal() 244 struct dcp_blob_fmt *b = (struct dcp_blob_fmt *)p->blob; in trusted_dcp_unseal()
|
| A D | trusted_core.c | 110 ret = hex2bin(p->blob, c, p->blob_len); in datablob_parse() 304 bufp = hex_byte_pack(bufp, p->blob[i]); in trusted_read()
|
| /security/apparmor/include/ |
| A D | cred.h | 24 struct aa_label **blob = cred->security + apparmor_blob_sizes.lbs_cred; in cred_label() local 26 AA_BUG(!blob); in cred_label() 27 return *blob; in cred_label() 33 struct aa_label **blob = cred->security + apparmor_blob_sizes.lbs_cred; in set_cred_label() local 35 AA_BUG(!blob); in set_cred_label() 36 *blob = label; in set_cred_label()
|
| A D | policy_unpack.h | 176 size_t aa_unpack_blob(struct aa_ext *e, char **blob, const char *name);
|
| A D | match.h | 126 struct aa_dfa *aa_dfa_unpack(void *blob, size_t size, int flags);
|
| /security/apparmor/ |
| A D | match.c | 33 static struct table_header *unpack_table(char *blob, size_t bsize) in unpack_table() argument 45 th.td_id = be16_to_cpu(*(__be16 *) (blob)) - 1; in unpack_table() 48 th.td_flags = be16_to_cpu(*(__be16 *) (blob + 2)); in unpack_table() 49 th.td_lolen = be32_to_cpu(*(__be32 *) (blob + 8)); in unpack_table() 50 blob += sizeof(struct table_header); in unpack_table() 69 UNPACK_ARRAY(table->td_data, blob, th.td_lolen, in unpack_table() 72 UNPACK_ARRAY(table->td_data, blob, th.td_lolen, in unpack_table() 75 UNPACK_ARRAY(table->td_data, blob, th.td_lolen, in unpack_table() 298 struct aa_dfa *aa_dfa_unpack(void *blob, size_t size, int flags) in aa_dfa_unpack() argument 302 char *data = blob; in aa_dfa_unpack()
|
| A D | policy_unpack_test.c | 188 char *blob = NULL; in policy_unpack_test_unpack_blob_with_null_name() local 192 size = aa_unpack_blob(puf->e, &blob, NULL); in policy_unpack_test_unpack_blob_with_null_name() 196 memcmp(blob, TEST_BLOB_DATA, TEST_BLOB_DATA_SIZE) == 0); in policy_unpack_test_unpack_blob_with_null_name() 202 char *blob = NULL; in policy_unpack_test_unpack_blob_with_name() local 206 size = aa_unpack_blob(puf->e, &blob, TEST_BLOB_NAME); in policy_unpack_test_unpack_blob_with_name() 210 memcmp(blob, TEST_BLOB_DATA, TEST_BLOB_DATA_SIZE) == 0); in policy_unpack_test_unpack_blob_with_name() 216 char *blob = NULL; in policy_unpack_test_unpack_blob_out_of_bounds() local 225 size = aa_unpack_blob(puf->e, &blob, TEST_BLOB_NAME); in policy_unpack_test_unpack_blob_out_of_bounds()
|
| A D | policy_unpack.c | 350 VISIBLE_IF_KUNIT size_t aa_unpack_blob(struct aa_ext *e, char **blob, const char *name) in aa_unpack_blob() argument 361 *blob = e->pos; in aa_unpack_blob() 427 char *blob = NULL; in unpack_dfa() local 431 size = aa_unpack_blob(e, &blob, "aadfa"); in unpack_dfa() 438 size_t sz = blob - (char *) e->start - in unpack_dfa() 443 dfa = aa_dfa_unpack(blob + pad, size - pad, flags); in unpack_dfa()
|
| /security/smack/ |
| A D | smack_lsm.c | 1675 *blob = smk_of_current(); in smack_file_alloc_security() 1906 *blob = smk_of_current(); in smack_file_set_fowner() 1923 struct smack_known **blob; in smack_file_send_sigiotask() local 1937 blob = smack_file(file); in smack_file_send_sigiotask() 1938 skp = *blob; in smack_file_send_sigiotask() 3093 *blob = smk_of_current(); in smack_msg_msg_alloc_security() 3107 return *blob; in smack_of_ipc() 3120 *blob = smk_of_current(); in smack_ipc_alloc_security() 4481 *blob = skp; in smack_key_alloc() 4537 blob = smack_key(keyp); in smack_key_permission() [all …]
|
| /security/ |
| A D | security.c | 2917 void *blob; in security_file_free() local 2921 blob = file->f_security; in security_file_free() 2922 if (blob) { in security_file_free() 2924 kmem_cache_free(lsm_file_cache, blob); in security_file_free()
|