Home
last modified time | relevance | path

Searched refs:string (Results 1 – 23 of 23) sorted by relevance

/security/smack/
A Dsmack_access.c292 string[i++] = 'r'; in smack_str_from_perm()
294 string[i++] = 'w'; in smack_str_from_perm()
296 string[i++] = 'x'; in smack_str_from_perm()
298 string[i++] = 'a'; in smack_str_from_perm()
300 string[i++] = 't'; in smack_str_from_perm()
302 string[i++] = 'l'; in smack_str_from_perm()
304 string[i++] = 'b'; in smack_str_from_perm()
307 string[i] = '\0'; in smack_str_from_perm()
435 hash = full_name_hash(NULL, string, strlen(string)); in smk_find_entry()
469 if (string[i] > '~' || string[i] <= ' ' || string[i] == '/' || in smk_parse_smack()
[all …]
A Dsmack.h287 int smack_str_from_perm(char *string, int access);
289 char *smk_parse_smack(const char *string, int len);
A Dsmackfs.c261 static int smk_perm_from_str(const char *string) in smk_perm_from_str() argument
266 for (cp = string; ; cp++) in smk_perm_from_str()
A Dsmack_lsm.c718 rc = smack_add_opt(opt, param->string, &fc->security); in smack_fs_context_parse_param()
720 param->string = NULL; in smack_fs_context_parse_param()
/security/apparmor/
A Dprocattr.c31 int aa_getprocattr(struct aa_label *label, char **string, bool newline) in aa_getprocattr() argument
47 *string = kmalloc(len + 2, GFP_KERNEL); in aa_getprocattr()
48 if (!*string) { in aa_getprocattr()
53 len = aa_label_snxprint(*string, len + 2, current_ns, label, in aa_getprocattr()
62 (*string)[len++] = '\n'; in aa_getprocattr()
63 (*string)[len] = 0; in aa_getprocattr()
A Dpolicy_unpack_test.c234 const char *string = NULL; in policy_unpack_test_unpack_str_with_null_name() local
238 size = aa_unpack_str(puf->e, &string, NULL); in policy_unpack_test_unpack_str_with_null_name()
247 const char *string = NULL; in policy_unpack_test_unpack_str_with_name() local
259 const char *string = NULL; in policy_unpack_test_unpack_str_out_of_bounds() local
275 char *string = NULL; in policy_unpack_test_unpack_strdup_with_null_name() local
287 kfree(string); in policy_unpack_test_unpack_strdup_with_null_name()
293 char *string = NULL; in policy_unpack_test_unpack_strdup_with_name() local
304 kfree(string); in policy_unpack_test_unpack_strdup_with_name()
311 char *string = NULL; in policy_unpack_test_unpack_strdup_out_of_bounds() local
320 KUNIT_EXPECT_NULL(test, string); in policy_unpack_test_unpack_strdup_out_of_bounds()
[all …]
A Dpolicy_unpack.c373 VISIBLE_IF_KUNIT int aa_unpack_str(struct aa_ext *e, const char **string, const char *name) in aa_unpack_str() argument
378 *string = NULL; in aa_unpack_str()
385 *string = src_str; in aa_unpack_str()
397 VISIBLE_IF_KUNIT int aa_unpack_strdup(struct aa_ext *e, char **string, const char *name) in aa_unpack_strdup() argument
402 *string = NULL; in aa_unpack_strdup()
407 *string = kmemdup(tmp, res, GFP_KERNEL); in aa_unpack_strdup()
408 if (!*string) { in aa_unpack_strdup()
A Dapparmorfs.c1011 seq_printf(seq, "%s\n", fs_file->v.string); in aa_sfs_seq_show()
/security/tomoyo/
A Dutil.c116 const char *cp = strstr(string, keyword); in tomoyo_permstr()
119 return cp == string || *(cp - 1) == '/'; in tomoyo_permstr()
438 const char *const start = string; in tomoyo_correct_word2()
444 unsigned char c = *string++; in tomoyo_correct_word2()
449 c = *string++; in tomoyo_correct_word2()
456 d = *string++; in tomoyo_correct_word2()
457 e = *string++; in tomoyo_correct_word2()
484 if (string - 3 < start || *(string - 3) != '/') in tomoyo_correct_word2()
489 if (*string != '/') in tomoyo_correct_word2()
518 bool tomoyo_correct_word(const char *string) in tomoyo_correct_word() argument
[all …]
A Dgc.c71 static bool tomoyo_name_used_by_io_buffer(const char *string) in tomoyo_name_used_by_io_buffer() argument
74 const size_t size = strlen(string) + 1; in tomoyo_name_used_by_io_buffer()
87 if (w < string || w > string + size) in tomoyo_name_used_by_io_buffer()
A DKconfig57 string "Location of userspace policy loader"
67 string "Trigger for calling userspace policy loader"
A Dcommon.c251 static void tomoyo_set_string(struct tomoyo_io_buffer *head, const char *string) in tomoyo_set_string() argument
254 head->r.w[head->r.w_pos++] = string; in tomoyo_set_string()
545 static s8 tomoyo_find_yesno(const char *string, const char *find) in tomoyo_find_yesno() argument
547 const char *cp = strstr(string, find); in tomoyo_find_yesno()
568 static void tomoyo_set_uint(unsigned int *i, const char *string, in tomoyo_set_uint() argument
571 const char *cp = strstr(string, find); in tomoyo_set_uint()
A Dcommon.h935 bool tomoyo_correct_word(const char *string);
952 bool tomoyo_permstr(const char *string, const char *keyword);
/security/apparmor/include/
A Dpolicy_unpack.h177 int aa_unpack_str(struct aa_ext *e, const char **string, const char *name);
178 int aa_unpack_strdup(struct aa_ext *e, char **string, const char *name);
A Dapparmorfs.h33 char *string; member
48 .v_type = AA_SFS_TYPE_STRING, .v.string = (_value), \
A Dprocattr.h14 int aa_getprocattr(struct aa_label *label, char **string, bool newline);
/security/selinux/
A DKconfig62 int "SELinux SID to context string translation cache size"
66 This option defines the size of the internal SID -> context string
67 cache, which improves the performance of context to string
A Dhooks.c2855 return selinux_add_opt(opt, param->string, &fc->security); in selinux_fs_context_parse_param()
/security/
A DKconfig208 STATIC_USERMODEHELPER_PATH to an empty string.
211 string "Path to the static usermode helper binary"
221 specify an empty string here (i.e. "").
271 string "Ordered list of enabled LSMs"
A DKconfig.hardening222 Detect overflows of buffers in common string and memory functions
/security/integrity/evm/
A DKconfig72 string "EVM X509 certificate path"
/security/integrity/ima/
A DKconfig83 string
118 string
287 string "IMA X509 certificate path"
/security/ipe/
A DKconfig26 string "Integrity policy to apply on system startup"

Completed in 772 milliseconds