| /security/tomoyo/ |
| A D | realpath.c | 95 const int buflen) in tomoyo_get_absolute_path() argument 99 if (buflen >= 256) { in tomoyo_get_absolute_path() 101 pos = d_absolute_path(path, buffer, buflen - 1); in tomoyo_get_absolute_path() 106 buffer[buflen - 2] = '/'; in tomoyo_get_absolute_path() 107 buffer[buflen - 1] = '\0'; in tomoyo_get_absolute_path() 126 const int buflen) in tomoyo_get_dentry_path() argument 130 if (buflen >= 256) { in tomoyo_get_dentry_path() 131 pos = dentry_path_raw(dentry, buffer, buflen - 1); in tomoyo_get_dentry_path() 136 buffer[buflen - 2] = '/'; in tomoyo_get_dentry_path() 137 buffer[buflen - 1] = '\0'; in tomoyo_get_dentry_path() [all …]
|
| /security/keys/ |
| A D | dh.c | 95 char __user *buffer, size_t buflen, in keyctl_dh_compute_kdf() argument 113 ret = buflen; in keyctl_dh_compute_kdf() 114 if (copy_to_user(buffer, outbuf, buflen) != 0) in keyctl_dh_compute_kdf() 123 char __user *buffer, size_t buflen, in __keyctl_dh_compute() argument 140 if (!params || (!buffer && buflen)) { in __keyctl_dh_compute() 157 if (buflen > KEYCTL_KDF_MAX_OUTPUT_LEN || in __keyctl_dh_compute() 227 if (buflen == 0) { in __keyctl_dh_compute() 230 } else if (outlen > buflen) { in __keyctl_dh_compute() 277 ret = keyctl_dh_compute_kdf(hash, buffer, buflen, outbuf, in __keyctl_dh_compute() 301 char __user *buffer, size_t buflen, in keyctl_dh_compute() argument [all …]
|
| A D | compat_dh.c | 17 char __user *buffer, size_t buflen, in compat_keyctl_dh_compute() argument 24 return __keyctl_dh_compute(params, buffer, buflen, NULL); in compat_keyctl_dh_compute() 35 return __keyctl_dh_compute(params, buffer, buflen, &kdfcopy); in compat_keyctl_dh_compute()
|
| A D | user_defined.c | 171 long user_read(const struct key *key, char *buffer, size_t buflen) in user_read() argument 180 if (buffer && buflen > 0) { in user_read() 181 if (buflen > upayload->datalen) in user_read() 182 buflen = upayload->datalen; in user_read() 184 memcpy(buffer, upayload->data, buflen); in user_read()
|
| A D | request_key_auth.c | 83 char *buffer, size_t buflen) in request_key_auth_read() argument 96 if (buffer && buflen > 0) { in request_key_auth_read() 97 if (buflen > datalen) in request_key_auth_read() 98 buflen = datalen; in request_key_auth_read() 100 memcpy(buffer, rka->callout_info, buflen); in request_key_auth_read()
|
| A D | keyctl.c | 646 size_t buflen) in keyctl_describe_key() argument 692 if (buffer && buflen >= ret) { in keyctl_describe_key() 869 if (!buffer || !buflen) { in keyctl_read_key() 890 key_data_len = (buflen <= PAGE_SIZE) ? buflen : 0; in keyctl_read_key() 1563 size_t buflen) in keyctl_get_security() argument 1594 if (buffer && buflen > 0 && in keyctl_get_security() 1599 if (buffer && buflen > 0) { in keyctl_get_security() 1600 if (buflen > ret) in keyctl_get_security() 1601 buflen = ret; in keyctl_get_security() 1856 size_t size = buflen; in keyctl_capabilities() [all …]
|
| A D | internal.h | 258 size_t buflen); 285 char __user *buffer, size_t buflen, 292 char __user *buffer, size_t buflen, in keyctl_dh_compute() argument 301 char __user *buffer, size_t buflen, in compat_keyctl_dh_compute() argument 348 extern long keyctl_capabilities(unsigned char __user *_buffer, size_t buflen);
|
| A D | keyring.c | 82 char *buffer, size_t buflen); 453 size_t buflen; member 464 key->type->name, key->serial, ctx->count, ctx->buflen); in keyring_read_iterator() 466 if (ctx->count >= ctx->buflen) in keyring_read_iterator() 482 char *buffer, size_t buflen) in keyring_read() argument 487 kenter("{%d},,%zu", key_serial(keyring), buflen); in keyring_read() 489 if (buflen & (sizeof(key_serial_t) - 1)) in keyring_read() 493 if (buffer && buflen) { in keyring_read() 495 ctx.buflen = buflen; in keyring_read() 507 if (ret <= buflen) in keyring_read()
|
| A D | big_key.c | 227 long big_key_read(const struct key *key, char *buffer, size_t buflen) in big_key_read() argument 233 if (!buffer || buflen < datalen) in big_key_read()
|
| /security/apparmor/ |
| A D | path.c | 25 static int prepend(char **buffer, int buflen, const char *str, int namelen) in prepend() argument 27 buflen -= namelen; in prepend() 28 if (buflen < 0) in prepend() 95 int buflen = aa_g_path_max - isdir; in d_namespace_path() local 99 res = dentry_path(path->dentry, buf, buflen); in d_namespace_path() 122 res = __d_path(path, &root, buf, buflen); in d_namespace_path() 125 res = d_absolute_path(path, buf, buflen); in d_namespace_path() 140 res = dentry_path_raw(path->dentry, buf, buflen); in d_namespace_path()
|
| A D | apparmorfs.c | 2624 int buflen) in policy_readlink() argument 2632 res = readlink_copy(buffer, buflen, name, strlen(name)); in policy_readlink()
|
| /security/integrity/ima/ |
| A D | ima_template_lib.c | 50 u32 buflen = datalen; in ima_write_template_field_data() local 53 buflen = datalen + 1; in ima_write_template_field_data() 55 buf = kzalloc(buflen, GFP_KERNEL); in ima_write_template_field_data() 75 field_data->len = buflen; in ima_write_template_field_data() 85 u32 buflen = field_data->len; in ima_show_template_data_ascii() local 96 buflen -= buf_ptr - field_data->data; in ima_show_template_data_ascii() 100 if (!buflen) in ima_show_template_data_ascii() 102 ima_print_digest(m, buf_ptr, buflen); in ima_show_template_data_ascii()
|
| /security/keys/trusted-keys/ |
| A D | trusted_core.c | 291 size_t buflen) in trusted_read() argument 301 if (buffer && buflen >= 2 * p->blob_len) { in trusted_read()
|
| A D | trusted_tpm1.c | 357 int trusted_tpm_send(unsigned char *cmd, size_t buflen) in trusted_tpm_send() argument 370 buf.length = buflen; in trusted_tpm_send()
|
| /security/keys/encrypted-keys/ |
| A D | encrypted.c | 333 const u8 *buf, unsigned int buflen) in calc_hmac() argument 347 err = crypto_shash_tfm_digest(tfm, buf, buflen, digest); in calc_hmac() 934 size_t buflen) in encrypted_read() argument 952 if (!buffer || buflen < asciiblob_len) in encrypted_read()
|