| /security/ipe/ |
| A D | policy.h | 80 size_t pkcs7len; 83 size_t textlen; 90 struct ipe_policy *ipe_new_policy(const char *text, size_t textlen, 91 const char *pkcs7, size_t pkcs7len); 93 int ipe_update_policy(struct inode *root, const char *text, size_t textlen, 94 const char *pkcs7, size_t pkcs7len);
|
| A D | policy_fs.c | 48 size_t len, loff_t *offset) in read_pkcs7() 91 size_t len, loff_t *offset) in read_policy() 128 size_t len, loff_t *offset) in read_name() 166 size_t len, loff_t *offset) in read_version() 171 size_t strsize = 0; in read_version() 209 size_t len, loff_t *offset) in setactive() 257 size_t len, loff_t *offset) in getactive() 299 size_t len, loff_t *offset) in update_policy() 348 size_t len, loff_t *offset) in delete_policy() 458 size_t i = 0; in ipe_new_policyfs_node()
|
| A D | policy.c | 64 static int set_pkcs7_data(void *ctx, const void *data, size_t len, in set_pkcs7_data() 65 size_t asn1hdrlen __always_unused) in set_pkcs7_data() 93 int ipe_update_policy(struct inode *root, const char *text, size_t textlen, in ipe_update_policy() 94 const char *pkcs7, size_t pkcs7len) in ipe_update_policy() 159 struct ipe_policy *ipe_new_policy(const char *text, size_t textlen, in ipe_new_policy() 160 const char *pkcs7, size_t pkcs7len) in ipe_new_policy()
|
| A D | fs.c | 30 size_t len, loff_t *offset) in setaudit() 57 size_t len, loff_t *offset) in getaudit() 78 size_t len, loff_t *offset) in setenforce() 109 size_t len, loff_t *offset) in getenforce() 137 size_t len, loff_t *offset) in new_policy()
|
| A D | policy_parser.c | 31 size_t i = 0; in new_parsed_policy() 69 static size_t remove_trailing_spaces(char *line) in remove_trailing_spaces() 71 size_t i = 0; in remove_trailing_spaces() 96 size_t sep_count = 0; in parse_version() 147 size_t idx = 0; in parse_header() 452 size_t i = 0; in ipe_free_parsed_policy() 480 size_t i = 0; in validate_policy() 511 size_t len; in ipe_parse_policy()
|
| A D | hooks.c | 213 size_t size) in ipe_set_dmverity_signature() 220 size_t size) in ipe_set_dmverity_signature() 239 const void *value, size_t size) in ipe_bdev_setintegrity() 303 const void *value, size_t size) in ipe_inode_setintegrity()
|
| /security/apparmor/include/ |
| A D | crypto.h | 17 char *aa_calc_hash(void *data, size_t len); 19 size_t len); 21 static inline char *aa_calc_hash(void *data, size_t len) in aa_calc_hash() 26 void *start, size_t len) in aa_calc_profile_hash()
|
| A D | policy_unpack.h | 106 size_t size; /* the original size of the payload */ 107 size_t compressed_size; /* the compressed size of the payload */ 161 struct aa_loaddata *aa_loaddata_alloc(size_t size); 169 bool aa_inbounds(struct aa_ext *e, size_t size); 170 size_t aa_unpack_u16_chunk(struct aa_ext *e, char **chunk); 176 size_t aa_unpack_blob(struct aa_ext *e, char **blob, const char *name);
|
| A D | policy_ns.h | 90 struct aa_ns *__aa_lookupn_ns(struct aa_ns *view, const char *hname, size_t n); 91 struct aa_ns *aa_lookupn_ns(struct aa_ns *view, const char *name, size_t n); 140 const char *name, size_t n) in __aa_findn_ns()
|
| A D | match.h | 119 static inline size_t table_size(size_t len, size_t el_size) in table_size() 126 struct aa_dfa *aa_dfa_unpack(void *blob, size_t size, int flags);
|
| /security/keys/ |
| A D | internal.h | 154 size_t callout_len, 209 size_t callout_len, 245 extern long keyctl_describe_key(key_serial_t, char __user *, size_t); 248 extern long keyctl_read_key(key_serial_t, char __user *, size_t); 252 size_t, key_serial_t); 258 size_t buflen); 280 size_t, struct keyctl_kdf_params __user *); 282 size_t, struct keyctl_kdf_params *); 285 char __user *buffer, size_t buflen, 292 char __user *buffer, size_t buflen, in keyctl_dh_compute() [all …]
|
| A D | big_key.c | 26 size_t length; 63 size_t datalen = prep->datalen; in big_key_preparse() 64 size_t enclen = datalen + CHACHA20POLY1305_AUTHTAG_SIZE; in big_key_preparse() 227 long big_key_read(const struct key *key, char *buffer, size_t buflen) in big_key_read() 230 size_t datalen = payload->length; in big_key_read() 239 size_t enclen = datalen + CHACHA20POLY1305_AUTHTAG_SIZE; in big_key_read()
|
| /security/integrity/platform_certs/ |
| A D | keyring_handler.h | 9 size_t len, const char *type, 10 size_t type_len); 15 void blacklist_x509_tbs(const char *source, const void *data, size_t len); 20 void blacklist_binary(const char *source, const void *data, size_t len);
|
| A D | keyring_handler.c | 23 const void *data, size_t len) in uefi_blacklist_x509_tbs() 32 const void *data, size_t len) in uefi_blacklist_binary() 41 const void *data, size_t len) in uefi_revocation_list_x509()
|
| /security/keys/encrypted-keys/ |
| A D | encrypted.h | 9 const u8 **master_key, size_t *master_keylen); 13 size_t *master_keylen) in request_trusted_key() 20 static inline void dump_master_key(const u8 *master_key, size_t master_keylen) in dump_master_key() 49 static inline void dump_master_key(const u8 *master_key, size_t master_keylen) in dump_master_key()
|
| /security/integrity/ |
| A D | integrity.h | 137 const void *data, size_t len, key_perm_t perm); 160 const void *data, size_t len, in integrity_load_cert() 247 size_t len); 250 const void *data, size_t len) in add_to_platform_keyring() 256 void __init add_to_machine_keyring(const char *source, const void *data, size_t len); 260 const void *data, size_t len) in add_to_machine_keyring()
|
| /security/integrity/ima/ |
| A D | ima_kexec.c | 24 static size_t kexec_segment_size; 39 size_t buf_size = 0; in ima_measure_kexec_event() 54 static int ima_alloc_kexec_file_buf(size_t segment_size) in ima_alloc_kexec_file_buf() 145 size_t kexec_buffer_size = 0; in ima_add_kexec_buffer() 206 size_t buf_size = 0; in ima_update_kexec_buffer() 275 size_t kexec_buffer_size = 0; in ima_load_kexec_buffer()
|
| /security/selinux/ |
| A D | selinuxfs.c | 124 size_t count, loff_t *ppos) in sel_read_enforce() 136 size_t count, loff_t *ppos) in sel_write_enforce() 200 size_t count, loff_t *ppos) in sel_read_handle_unknown() 272 size_t count, loff_t *ppos) in sel_write_disable() 312 size_t count, loff_t *ppos) in sel_read_policyvers() 343 size_t count, loff_t *ppos) in sel_read_mls() 359 size_t len; 730 size_t count, loff_t *ppos) in sel_write_validatetrans() 1655 size_t count, loff_t *ppos) in sel_read_initcon() 1726 size_t count, loff_t *ppos) in sel_read_class() [all …]
|
| /security/integrity/evm/ |
| A D | evm.h | 75 size_t req_xattr_value_len); 78 size_t req_xattr_value_len, struct evm_digest *data, 82 size_t req_xattr_value_len, char type,
|
| A D | evm_crypto.c | 52 int evm_set_key(void *key, size_t keylen) in evm_set_key() 187 size_t count) in dump_security_xattr_l() 204 size_t value_len) in dump_security_xattr() 223 size_t req_xattr_value_len, in evm_calc_hmac_or_hash() 230 size_t xattr_size = 0; in evm_calc_hmac_or_hash() 316 const char *req_xattr_value, size_t req_xattr_value_len, in evm_calc_hmac() 325 const char *req_xattr_value, size_t req_xattr_value_len, in evm_calc_hash() 367 const char *xattr_value, size_t xattr_value_len) in evm_update_evmxattr()
|
| /security/landlock/ |
| A D | domain.c | 41 size_t *const exe_size) in get_current_exe() 43 const size_t buffer_size = LANDLOCK_PATH_MAX_SIZE; in get_current_exe() 84 size_t path_size = sizeof(null_path); in get_current_details() 138 const unsigned long access_bit, const size_t layer) in get_layer_deny_mask() 186 const size_t layer_masks_size) in landlock_get_deny_masks()
|
| A D | audit.c | 137 get_hierarchy(const struct landlock_ruleset *const domain, const size_t layer) in get_hierarchy() 183 static size_t get_denied_layer(const struct landlock_ruleset *const domain, in get_denied_layer() 186 const size_t layer_masks_size) in get_denied_layer() 273 static size_t 281 size_t youngest_layer = 0; in get_layer_from_deny_masks() 282 size_t access_index = 0; in get_layer_from_deny_masks() 291 const size_t layer = in get_layer_from_deny_masks() 395 size_t youngest_layer; in landlock_log_denial()
|
| A D | syscalls.c | 64 copy_min_struct_from_user(void *const dst, const size_t ksize, in copy_min_struct_from_user() 65 const size_t ksize_min, const void __user *const src, in copy_min_struct_from_user() 66 const size_t usize) in copy_min_struct_from_user() 95 size_t ruleset_size, path_beneath_size, net_port_size; in build_check_abi() 131 const size_t size, loff_t *const ppos) in fop_dummy_read() 138 const char __user *const buf, const size_t size, in fop_dummy_write() 197 const size_t, size, const __u32, flags) in SYSCALL_DEFINE3() argument
|
| /security/apparmor/ |
| A D | lib.c | 51 const char *name, size_t len) in val_table_find_ent() 70 size_t n = strcspn(str, "\r\n,"); in aa_parse_debug_params() 91 static int val_mask_to_str(char *str, size_t size, in val_mask_to_str() 171 const char *skipn_spaces(const char *str, size_t n) in skipn_spaces() 180 const char *aa_splitn_fqname(const char *fqname, size_t n, const char **ns_name, in aa_splitn_fqname() 181 size_t *ns_len) in aa_splitn_fqname() 300 void aa_perm_mask_to_str(char *str, size_t str_size, const char *chrs, u32 mask) in aa_perm_mask_to_str() 303 size_t num_chrs = strlen(chrs); in aa_perm_mask_to_str()
|
| /security/selinux/ss/ |
| A D | policydb.h | 306 size_t len; 319 size_t len; 357 static inline int next_entry(void *buf, struct policy_file *fp, size_t bytes) in next_entry() 368 static inline int put_entry(const void *buf, size_t bytes, size_t num, in put_entry() 371 size_t len; in put_entry()
|