Home
last modified time | relevance | path

Searched refs:info (Results 1 – 25 of 34) sorted by relevance

12

/security/ipe/
A Ddigest.c31 info = kzalloc(sizeof(*info), GFP_KERNEL); in ipe_digest_parse()
32 if (!info) in ipe_digest_parse()
63 info->alg = alg; in ipe_digest_parse()
64 info->digest = digest; in ipe_digest_parse()
65 return info; in ipe_digest_parse()
70 kfree(info); in ipe_digest_parse()
97 if (IS_ERR_OR_NULL(info)) in ipe_digest_free()
100 kfree(info->alg); in ipe_digest_free()
101 kfree(info->digest); in ipe_digest_free()
102 kfree(info); in ipe_digest_free()
[all …]
A Dhooks.c243 struct digest_info *info = NULL; in ipe_bdev_setintegrity() local
262 info = kzalloc(sizeof(*info), GFP_KERNEL); in ipe_bdev_setintegrity()
263 if (!info) in ipe_bdev_setintegrity()
266 info->digest = kmemdup(digest->digest, digest->digest_len, GFP_KERNEL); in ipe_bdev_setintegrity()
267 if (!info->digest) in ipe_bdev_setintegrity()
270 info->alg = kstrdup(digest->alg, GFP_KERNEL); in ipe_bdev_setintegrity()
271 if (!info->alg) in ipe_bdev_setintegrity()
274 info->digest_len = digest->digest_len; in ipe_bdev_setintegrity()
277 blob->root_hash = info; in ipe_bdev_setintegrity()
281 ipe_digest_free(info); in ipe_bdev_setintegrity()
A Deval.c203 struct digest_info info; in evaluate_fsv_digest() local
213 info.alg = hash_algo_name[alg]; in evaluate_fsv_digest()
214 info.digest = digest; in evaluate_fsv_digest()
215 info.digest_len = hash_digest_size[alg]; in evaluate_fsv_digest()
217 return ipe_digest_eval(p->value, &info); in evaluate_fsv_digest()
/security/yama/
A Dyama_lsm.c63 info->access, target_cmd, info->target->pid, agent_cmd, in __report_access()
64 info->agent->pid); in __report_access()
69 put_task_struct(info->agent); in __report_access()
70 put_task_struct(info->target); in __report_access()
71 kfree(info); in __report_access()
92 info = kmalloc(sizeof(*info), GFP_ATOMIC); in report_access()
93 if (!info) in report_access()
98 info->access = access; in report_access()
99 info->target = target; in report_access()
100 info->agent = agent; in report_access()
[all …]
/security/apparmor/
A Ddomain.c50 const char **info) in may_change_ptraced_domain() argument
572 const char **info) in x_to_label() argument
601 name, info); in x_to_label()
605 name, info); in x_to_label()
619 old_info = *info; in x_to_label()
629 old_info = *info; in x_to_label()
699 if (info) { in profile_transition()
708 info, error); in profile_transition()
723 &info); in profile_transition()
735 if (info) { in profile_transition()
[all …]
A Dmount.c181 ad.info = info; in audit_mount()
331 info = devinfo; in match_mnt_path_str()
340 info = mnt_info_table[pos]; in match_mnt_path_str()
384 devbuffer, &devname, &info, in match_mnt()
391 type, flags, data, binary, info); in match_mnt()
607 const char *name = NULL, *info = NULL; in profile_umount() local
618 &info, profile->disconnected); in profile_umount()
684 old_buffer, &old_name, &info, in build_pivotroot()
689 new_buffer, &new_name, &info, in build_pivotroot()
709 &perms, info, error); in build_pivotroot()
[all …]
A Dpolicy_unpack.c76 ad.info = info; in audit_iface()
714 const char **info) in unpack_pdb() argument
755 *info = "missing required dfa"; in unpack_pdb()
871 info = "empty profile name"; in unpack_profile()
876 info = "out of memory"; in unpack_profile()
885 info = "out of memory"; in unpack_profile()
900 info = "bad xmatch"; in unpack_profile()
907 info = "missing xmatch len"; in unpack_profile()
933 info = "profile missing flags"; in unpack_profile()
1032 &info); in unpack_profile()
[all …]
A Dpath.c198 const char **name, const char **info, const char *disconnected) in aa_path_name() argument
203 if (info && error) { in aa_path_name()
205 *info = "Failed name lookup - deleted entry"; in aa_path_name()
207 *info = "Failed name lookup - disconnected path"; in aa_path_name()
209 *info = "Failed name lookup - name too long"; in aa_path_name()
211 *info = "Failed name lookup"; in aa_path_name()
A Dpolicy.c764 const char **info) in replacement_allowed() argument
771 *info = "profile already exists"; in replacement_allowed()
803 const char *info, int error) in audit_policy() argument
809 ad.info = info; in audit_policy()
1031 const char **info) in __lookup_replace() argument
1171 &ent->old, &info); in aa_replace_profiles()
1178 &ent->rename, &info); in aa_replace_profiles()
1246 info = "failed to create"; in aa_replace_profiles()
1315 info, error); in aa_replace_profiles()
1360 info = "no profile specified"; in aa_remove_profiles()
[all …]
A Daf_unix.c89 const char **info) in match_to_local() argument
92 protocol, NULL, info); in match_to_local()
99 *info = "failed local label match"; in match_to_local()
125 const char **info) in match_to_sk() argument
141 const char **info) in match_to_cmd() argument
166 *info = "failed peer address match"; in match_to_peer()
215 &ad->info); in profile_create_perm()
245 &p, &ad->info); in profile_sk_perm()
276 &p, &ad->info); in profile_bind_perm()
342 unix_sk(sk), &p, &ad->info); in profile_accept_perm()
[all …]
A Dfile.c99 kuid_t ouid, const char *info, int error) in aa_audit_file() argument
110 ad.info = info; in aa_audit_file()
154 const char *info = NULL; in path_name() local
157 error = aa_path_name(path, flags, buffer, name, &info, in path_name()
163 NULL, NULL, cond->uid, info, error)); in path_name()
328 const char *info = NULL; in profile_path_link() local
367 info = "target restricted"; in profile_path_link()
393 info = "link not subset of target"; in profile_path_link()
403 NULL, cond->uid, info, error); in profile_path_link()
A Dresource.c59 const char *info, int error) in audit_resource() argument
68 ad.info = info; in audit_resource()
A Dnet.c226 struct aa_perms **p, const char **info) in aa_match_to_prot() argument
230 *info = "failed af match"; in aa_match_to_prot()
240 *info = "failed protocol match"; in aa_match_to_prot()
243 *info = "failed type match"; in aa_match_to_prot()
268 protocol, &p, &ad->info); in aa_profile_af_perm()
A Daudit.c110 if (ad->info) { in audit_pre()
111 audit_log_format(ab, " info=\"%s\"", ad->info); in audit_pre()
A Dcapability.c141 ad->info = "optional: no audit"; in profile_capable()
162 ad->info = "optional: no audit"; in profile_capable()
/security/keys/
A Dkeyctl_pkey.c19 kfree(params->info); in keyctl_pkey_params_free()
42 char *c = params->info, *p, *q; in keyctl_pkey_params_parse()
92 params->info = p; in keyctl_pkey_params_get()
119 struct kernel_pkey_query info; in keyctl_pkey_params_get_2() local
138 if (uparams.in_len > info.max_dec_size || in keyctl_pkey_params_get_2()
139 uparams.out_len > info.max_enc_size) in keyctl_pkey_params_get_2()
143 if (uparams.in_len > info.max_enc_size || in keyctl_pkey_params_get_2()
144 uparams.out_len > info.max_dec_size) in keyctl_pkey_params_get_2()
148 if (uparams.in_len > info.max_data_size || in keyctl_pkey_params_get_2()
149 uparams.out_len > info.max_sig_size) in keyctl_pkey_params_get_2()
[all …]
A Drequest_key.c80 static int umh_keys_init(struct subprocess_info *info, struct cred *cred) in umh_keys_init() argument
82 struct key *keyring = info->data; in umh_keys_init()
90 static void umh_keys_cleanup(struct subprocess_info *info) in umh_keys_cleanup() argument
92 struct key *keyring = info->data; in umh_keys_cleanup()
102 struct subprocess_info *info; in call_usermodehelper_keys() local
104 info = call_usermodehelper_setup(path, argv, envp, GFP_KERNEL, in call_usermodehelper_keys()
107 if (!info) in call_usermodehelper_keys()
111 return call_usermodehelper_exec(info, wait); in call_usermodehelper_keys()
/security/keys/trusted-keys/
A Dtrusted_caam.c22 struct caam_blob_info info = { in trusted_caam_seal() local
28 ret = caam_encap_blob(blobifier, &info); in trusted_caam_seal()
32 p->blob_len = info.output_len; in trusted_caam_seal()
39 struct caam_blob_info info = { in trusted_caam_unseal() local
45 ret = caam_decap_blob(blobifier, &info); in trusted_caam_unseal()
49 p->key_len = info.output_len; in trusted_caam_unseal()
/security/integrity/
A Dintegrity.h208 const char *cause, int result, int info);
212 const char *cause, int result, int info,
225 int result, int info) in integrity_audit_msg() argument
233 int result, int info, int errno) in integrity_audit_message() argument
/security/selinux/ss/
A Dhashtab.c108 void hashtab_stat(struct hashtab *h, struct hashtab_info *info) in hashtab_stat() argument
134 info->slots_used = slots_used; in hashtab_stat()
135 info->max_chain_len = max_chain_len; in hashtab_stat()
136 info->chain2_len_sum = chain2_len_sum; in hashtab_stat()
A Dhashtab.h146 void hashtab_stat(struct hashtab *h, struct hashtab_info *info);
148 static inline void hashtab_stat(struct hashtab *h, struct hashtab_info *info) in hashtab_stat() argument
A Dpolicydb.c687 struct hashtab_info info; in hash_eval() local
689 hashtab_stat(h, &info); in hash_eval()
693 info.slots_used, h->size, info.max_chain_len, in hash_eval()
694 info.chain2_len_sum); in hash_eval()
2556 if (!info) { in policydb_read()
2569 info->ocon_num); in policydb_read()
2716 rc = ocontext_read(p, info, fp); in policydb_read()
3711 if (!info) { in policydb_write()
3720 buf[2] = cpu_to_le32(info->sym_num); in policydb_write()
3745 num_syms = info->sym_num; in policydb_write()
[all …]
/security/apparmor/include/
A Dpath.h26 const char **name, const char **info,
A Dfile.h78 const char *info, int error);
/security/integrity/evm/
A DKconfig28 additional info to the calculation, requires existing EVM
45 additional info to the calculation, requires existing EVM

Completed in 42 milliseconds

12