/security/apparmor/ |
D | policy_unpack.c | 63 void *start; member 101 aad.iface.pos = e->pos - e->start; in audit_iface() 339 size_t sz = blob - (char *) e->start - in unpack_dfa() 340 ((e->pos - e->start) & 7); in unpack_dfa() 587 if (!unpack_u32(e, &profile->policy.start[0], "start")) in unpack_profile() 589 profile->policy.start[0] = DFA_START; in unpack_profile() 592 profile->policy.start[i] = in unpack_profile() 594 profile->policy.start[0], in unpack_profile() 609 if (!unpack_u32(e, &profile->file.start, "dfa_start")) in unpack_profile() 611 profile->file.start = DFA_START; in unpack_profile() [all …]
|
D | crypto.c | 32 int aa_calc_profile_hash(struct aa_profile *profile, u32 version, void *start, in aa_calc_profile_hash() argument 58 error = crypto_shash_update(&desc.shash, (u8 *) start, len); in aa_calc_profile_hash()
|
D | file.c | 238 unsigned int aa_str_perms(struct aa_dfa *dfa, unsigned int start, in aa_str_perms() argument 248 state = aa_dfa_match(dfa, start, name); in aa_str_perms() 298 aa_str_perms(profile->file.dfa, profile->file.start, name, cond, in aa_path_perm() 380 state = aa_str_perms(profile->file.dfa, profile->file.start, lname, in aa_path_link() 409 aa_str_perms(profile->file.dfa, profile->file.start, tname, &cond, in aa_path_link()
|
D | match.c | 300 unsigned int aa_dfa_match_len(struct aa_dfa *dfa, unsigned int start, in aa_dfa_match_len() argument 307 unsigned int state = start, pos; in aa_dfa_match_len() 350 unsigned int aa_dfa_match(struct aa_dfa *dfa, unsigned int start, in aa_dfa_match() argument 357 unsigned int state = start, pos; in aa_dfa_match()
|
D | domain.c | 98 unsigned int start) in change_profile_perms() argument 112 aa_str_perms(profile->file.dfa, start, name, &cond, &perms); in change_profile_perms() 118 state = aa_dfa_match(profile->file.dfa, start, ns->base.name); in change_profile_perms() 366 state = profile->file.start; in apparmor_bprm_set_creds() 807 profile->file.start); in aa_change_profile()
|
D | apparmorfs.c | 761 .start = p_start,
|
/security/apparmor/include/ |
D | crypto.h | 21 int aa_calc_profile_hash(struct aa_profile *profile, u32 version, void *start, 25 void *start, size_t len) in aa_calc_profile_hash() argument
|
D | apparmor.h | 109 unsigned int start) in aa_dfa_null_transition() argument 112 return aa_dfa_next(dfa, start, 0); in aa_dfa_null_transition()
|
D | match.h | 120 unsigned int aa_dfa_match_len(struct aa_dfa *dfa, unsigned int start, 122 unsigned int aa_dfa_match(struct aa_dfa *dfa, unsigned int start,
|
D | file.h | 163 unsigned int start; member 170 unsigned int aa_str_perms(struct aa_dfa *dfa, unsigned int start,
|
D | policy.h | 150 unsigned int start[AA_CLASS_LAST + 1]; member
|
/security/tomoyo/ |
D | util.c | 171 char *start = param->data; in tomoyo_get_domainname() local 172 char *pos = start; in tomoyo_get_domainname() 181 if (tomoyo_correct_domain(start)) in tomoyo_get_domainname() 182 return tomoyo_get_name(start); in tomoyo_get_domainname() 445 const char *const start = string; in tomoyo_correct_word2() local 473 if (string - 3 < start || *(string - 3) != '/') in tomoyo_correct_word2()
|
D | condition.c | 249 static const struct tomoyo_path_info *tomoyo_get_dqword(char *start) in tomoyo_get_dqword() argument 251 char *cp = start + strlen(start) - 1; in tomoyo_get_dqword() 252 if (cp == start || *start++ != '"' || *cp != '"') in tomoyo_get_dqword() 255 if (*start && !tomoyo_correct_word(start)) in tomoyo_get_dqword() 257 return tomoyo_get_name(start); in tomoyo_get_dqword()
|
D | common.c | 1921 char *start = str; in tomoyo_truncate() local 1925 return strlen(start) + 1; in tomoyo_truncate() 2746 char *start = ""; in tomoyo_load_builtin_policy() local 2749 start = tomoyo_builtin_profile; in tomoyo_load_builtin_policy() 2754 start = tomoyo_builtin_exception_policy; in tomoyo_load_builtin_policy() 2759 start = tomoyo_builtin_domain_policy; in tomoyo_load_builtin_policy() 2764 start = tomoyo_builtin_manager; in tomoyo_load_builtin_policy() 2769 start = tomoyo_builtin_stat; in tomoyo_load_builtin_policy() 2775 char *end = strchr(start, '\n'); in tomoyo_load_builtin_policy() 2779 tomoyo_normalize_line(start); in tomoyo_load_builtin_policy() [all …]
|
D | Kconfig | 51 loading the variant part of policy. Since you can start using
|
/security/integrity/ima/ |
D | ima_fs.c | 171 .start = ima_measurements_start, 233 .start = ima_measurements_start,
|
/security/keys/ |
D | proc.c | 29 .start = proc_keys_start, 50 .start = proc_key_users_start,
|
/security/smack/ |
D | smackfs.c | 660 .start = load2_seq_start, 830 .start = cipso_seq_start, 1008 .start = cipso_seq_start, 1087 .start = netlbladdr_seq_start, 1815 .start = load_self_seq_start, 1944 .start = load2_seq_start, 2021 .start = load_self2_seq_start,
|
/security/selinux/ |
D | Kconfig | 63 kernel will start in permissive mode (log everything, deny nothing)
|
D | selinuxfs.c | 1443 .start = sel_avc_stats_seq_start,
|