| /security/selinux/ss/ |
| A D | sidtab.c | 39 memset(s->roots, 0, sizeof(s->roots)); in sidtab_init() 42 s->isids[i].set = 0; in sidtab_init() 44 s->frozen = false; in sidtab_init() 45 s->count = 0; in sidtab_init() 46 s->convert = NULL; in sidtab_init() 179 s->roots[l].ptr_inner->entries[0] = s->roots[l - 1]; in sidtab_alloc_roots() 238 return s->isids[sid - 1].set ? &s->isids[sid - 1].entry : NULL; in sidtab_lookup_initial() 297 count = s->count; in sidtab_context_to_sid() 435 if (s->convert) { in sidtab_convert() 440 count = s->count; in sidtab_convert() [all …]
|
| A D | sidtab.h | 107 int sidtab_init(struct sidtab *s); 114 struct sidtab_entry *entry = sidtab_search_entry(s, sid); in sidtab_search() 121 struct sidtab_entry *entry = sidtab_search_entry_force(s, sid); in sidtab_search_force() 128 void sidtab_cancel_convert(struct sidtab *s); 130 void sidtab_freeze_begin(struct sidtab *s, unsigned long *flags) 131 __acquires(&s->lock); 132 void sidtab_freeze_end(struct sidtab *s, unsigned long *flags) 133 __releases(&s->lock); 137 void sidtab_destroy(struct sidtab *s); 147 static inline void sidtab_sid2str_put(struct sidtab *s, in sidtab_sid2str_put() argument [all …]
|
| A D | symtab.c | 42 int symtab_init(struct symtab *s, u32 size) in symtab_init() argument 44 s->nprim = 0; in symtab_init() 45 return hashtab_init(&s->table, size); in symtab_init() 48 int symtab_insert(struct symtab *s, char *name, void *datum) in symtab_insert() argument 50 return hashtab_insert(&s->table, name, datum, symtab_key_params); in symtab_insert() 53 void *symtab_search(struct symtab *s, const char *name) in symtab_search() argument 55 return hashtab_search(&s->table, name, symtab_key_params); in symtab_search()
|
| A D | symtab.h | 21 int symtab_init(struct symtab *s, u32 size); 23 int symtab_insert(struct symtab *s, char *name, void *datum); 24 void *symtab_search(struct symtab *s, const char *name);
|
| A D | conditional.c | 26 int s[COND_EXPR_MAXDEPTH]; in cond_evaluate_expr() local 40 s[sp] = p->bool_val_to_struct[node->boolean - 1]->state; in cond_evaluate_expr() 45 s[sp] = !s[sp]; in cond_evaluate_expr() 51 s[sp] |= s[sp + 1]; in cond_evaluate_expr() 57 s[sp] &= s[sp + 1]; in cond_evaluate_expr() 63 s[sp] ^= s[sp + 1]; in cond_evaluate_expr() 69 s[sp] = (s[sp] == s[sp + 1]); in cond_evaluate_expr() 75 s[sp] = (s[sp] != s[sp + 1]); in cond_evaluate_expr() 81 return s[0]; in cond_evaluate_expr() 209 int cond_read_bool(struct policydb *p, struct symtab *s, struct policy_file *fp) in cond_read_bool() argument [all …]
|
| A D | services.c | 283 s[sp] = !s[sp]; in constraint_expr_eval() 288 s[sp] &= s[sp + 1]; in constraint_expr_eval() 293 s[sp] |= s[sp + 1]; in constraint_expr_eval() 1386 if (!s) in security_sid_to_context_core() 1578 if (s && !strcmp(s, scontext2)) { in security_context_to_sid_core() 1715 kfree(s); in compute_sid_handle_invalid_context() 2030 char *s; in convert_context_handle_invalid_context() local 2038 s); in convert_context_handle_invalid_context() 2064 char *s; in services_convert_context() local 2070 if (!s) in services_convert_context() [all …]
|
| A D | policydb.c | 874 rc = sidtab_init(s); in policydb_load_isids() 890 sidtab_destroy(s); in policydb_load_isids() 909 sidtab_destroy(s); in policydb_load_isids() 927 sidtab_destroy(s); in policydb_load_isids() 1149 rc = symtab_insert(s, key, perdatum); in perm_read() 1196 rc = symtab_insert(s, key, comdatum); in common_read() 1411 rc = symtab_insert(s, key, cladatum); in class_read() 1469 rc = symtab_insert(s, key, role); in role_read() 1517 rc = symtab_insert(s, key, typdatum); in type_read() 1594 rc = symtab_insert(s, key, usrdatum); in user_read() [all …]
|
| A D | conditional.h | 71 int cond_read_bool(struct policydb *p, struct symtab *s, struct policy_file *fp);
|
| A D | ebitmap.c | 288 u32 s; in ebitmap_set_bit() local 292 s = find_first_bit(n->maps, EBITMAP_SIZE); in ebitmap_set_bit() 293 if (s < EBITMAP_SIZE) in ebitmap_set_bit()
|
| A D | mls.h | 35 struct context *context, struct sidtab *s, u32 def_sid);
|
| A D | mls.c | 231 struct context *context, struct sidtab *s, u32 def_sid) in mls_context_to_sid() argument 260 defcon = sidtab_search(s, def_sid); in mls_context_to_sid()
|
| A D | policydb.h | 323 extern int policydb_load_isids(struct policydb *p, struct sidtab *s);
|
| /security/tomoyo/ |
| A D | tomoyo.c | 23 s->old_domain_info = NULL; in tomoyo_domain() 25 return s->domain_info; in tomoyo_domain() 45 s->domain_info = s->old_domain_info; in tomoyo_cred_prepare() 46 s->old_domain_info = NULL; in tomoyo_cred_prepare() 62 s->old_domain_info = NULL; in tomoyo_bprm_committed_creds() 100 if (!s->old_domain_info) { in tomoyo_bprm_check_security() 537 if (s->domain_info) { in tomoyo_task_free() 539 s->domain_info = NULL; in tomoyo_task_free() 541 if (s->old_domain_info) { in tomoyo_task_free() 543 s->old_domain_info = NULL; in tomoyo_task_free() [all …]
|
| A D | memory.c | 50 const size_t s = ksize(ptr); in tomoyo_memory_ok() local 52 tomoyo_memory_used[TOMOYO_MEMORY_POLICY] += s; in tomoyo_memory_ok() 57 tomoyo_memory_used[TOMOYO_MEMORY_POLICY] -= s; in tomoyo_memory_ok()
|
| A D | securityfs_if.c | 73 struct tomoyo_task *s = tomoyo_task(current); in tomoyo_write_self() local 75 s->domain_info; in tomoyo_write_self() 77 s->domain_info = new_domain; in tomoyo_write_self()
|
| A D | domain.c | 879 struct tomoyo_task *s = tomoyo_task(current); in tomoyo_find_next_domain() local 881 s->old_domain_info = s->domain_info; in tomoyo_find_next_domain() 882 s->domain_info = domain; in tomoyo_find_next_domain()
|
| /security/selinux/ |
| A D | genheaders.c | 26 static char *stoupperx(const char *s) in stoupperx() argument 28 char *s2 = strdup(s); in stoupperx() 73 const char *s = initial_sid_to_string[i]; in main() local 74 if (s) { in main() 75 char *sidname = stoupperx(s); in main() 87 static char s[] = "SOCKET"; in main() local 92 l = sizeof(s) - 1; in main() 93 if (len >= l && memcmp(name + len - l, s, l) == 0) in main()
|
| /security/smack/ |
| A D | smackfs.c | 582 seq_printf(s, "%s %s %s\n", in smk_rule_show() 610 smk_rule_show(s, srp, SMK_LABELLEN); in load_seq_show() 774 seq_printf(s, "%c%d", sep, i); in cipso_seq_show() 778 seq_putc(s, '\n'); in cipso_seq_show() 974 seq_printf(s, "%c%d", sep, i); in cipso2_seq_show() 978 seq_putc(s, '\n'); in cipso2_seq_show() 1879 seq_putc(s, ' '); in onlycap_seq_show() 2220 smk_rule_show(s, srp, SMK_LABELLEN); in load_self_seq_show() 2352 smk_rule_show(s, srp, SMK_LONGLABEL); in load2_seq_show() 2429 smk_rule_show(s, srp, SMK_LONGLABEL); in load_self2_seq_show() [all …]
|
| A D | smack_lsm.c | 72 #define A(s) {"smack"#s, sizeof("smack"#s) - 1, Opt_##s} argument 91 if (len == l || s[len] != '=') in match_opt_prefix() 93 *arg = s + len + 1; in match_opt_prefix() 109 smack_str_from_perm(s, mode); in smk_bu_mode() 570 if (!s) in smack_add_opt() 573 skp = smk_import_entry(s, 0); in smack_add_opt() 4320 s = skp->smk_secid; in smack_socket_getpeersec_dgram() 4330 s = skp->smk_secid; in smack_socket_getpeersec_dgram() 4336 s = skp->smk_secid; in smack_socket_getpeersec_dgram() 4340 *secid = s; in smack_socket_getpeersec_dgram() [all …]
|
| /security/keys/trusted-keys/ |
| A D | Kconfig | 39 Enable use of NXP's Cryptographic Accelerator and Assurance Module 48 Enable use of NXP's DCP (Data Co-Processor) as trusted key backend.
|
| A D | trusted_tpm1.c | 402 static int osap(struct tpm_buf *tb, struct osapsess *s, in osap() argument 425 s->handle = LOAD32(tb->data, TPM_DATA_OFFSET); in osap() 426 memcpy(s->enonce, &(tb->data[TPM_DATA_OFFSET + sizeof(uint32_t)]), in osap() 430 return TSS_rawhmac(s->secret, key, SHA1_DIGEST_SIZE, TPM_NONCE_SIZE, in osap()
|
| /security/integrity/ |
| A D | digsig_asymmetric.c | 126 pks.s = hdr->sig; in asymmetric_verify()
|
| /security/ |
| A D | device_cgroup.c | 49 static inline struct dev_cgroup *css_to_devcgroup(struct cgroup_subsys_state *s) in css_to_devcgroup() argument 51 return s ? container_of(s, struct dev_cgroup, css) : NULL; in css_to_devcgroup()
|
| /security/integrity/evm/ |
| A D | Kconfig | 12 EVM protects a file's security extended attributes against
|
| /security/ipe/ |
| A D | Kconfig | 62 volume is evaluated, and the volume's root hash matches the value
|