/security/selinux/ss/ |
D | sidtab.c | 18 int sidtab_init(struct sidtab *s) in sidtab_init() argument 22 s->htable = kmalloc_array(SIDTAB_SIZE, sizeof(*s->htable), GFP_ATOMIC); in sidtab_init() 23 if (!s->htable) in sidtab_init() 26 s->htable[i] = NULL; in sidtab_init() 27 s->nel = 0; in sidtab_init() 28 s->next_sid = 1; in sidtab_init() 29 s->shutdown = 0; in sidtab_init() 30 spin_lock_init(&s->lock); in sidtab_init() 34 int sidtab_insert(struct sidtab *s, u32 sid, struct context *context) in sidtab_insert() argument 39 if (!s) in sidtab_insert() [all …]
|
D | sidtab.h | 35 int sidtab_init(struct sidtab *s); 36 int sidtab_insert(struct sidtab *s, u32 sid, struct context *context); 37 struct context *sidtab_search(struct sidtab *s, u32 sid); 38 struct context *sidtab_search_force(struct sidtab *s, u32 sid); 40 int sidtab_map(struct sidtab *s, 46 int sidtab_context_to_sid(struct sidtab *s, 51 void sidtab_destroy(struct sidtab *s); 53 void sidtab_shutdown(struct sidtab *s);
|
D | symtab.c | 36 int symtab_init(struct symtab *s, unsigned int size) in symtab_init() argument 38 s->table = hashtab_create(symhash, symcmp, size); in symtab_init() 39 if (!s->table) in symtab_init() 41 s->nprim = 0; in symtab_init()
|
D | conditional.c | 30 int s[COND_EXPR_MAXDEPTH]; in cond_evaluate_expr() local 39 s[sp] = p->bool_val_to_struct[cur->bool - 1]->state; in cond_evaluate_expr() 44 s[sp] = !s[sp]; in cond_evaluate_expr() 50 s[sp] |= s[sp + 1]; in cond_evaluate_expr() 56 s[sp] &= s[sp + 1]; in cond_evaluate_expr() 62 s[sp] ^= s[sp + 1]; in cond_evaluate_expr() 68 s[sp] = (s[sp] == s[sp + 1]); in cond_evaluate_expr() 74 s[sp] = (s[sp] != s[sp + 1]); in cond_evaluate_expr() 80 return s[0]; in cond_evaluate_expr()
|
D | services.c | 296 int s[CEXPR_MAXDEPTH]; in constraint_expr_eval() local 303 s[sp] = !s[sp]; in constraint_expr_eval() 308 s[sp] &= s[sp + 1]; in constraint_expr_eval() 313 s[sp] |= s[sp + 1]; in constraint_expr_eval() 334 s[++sp] = ebitmap_get_bit(&r1->dominates, in constraint_expr_eval() 338 s[++sp] = ebitmap_get_bit(&r2->dominates, in constraint_expr_eval() 342 s[++sp] = (!ebitmap_get_bit(&r1->dominates, in constraint_expr_eval() 378 s[++sp] = mls_level_eq(l1, l2); in constraint_expr_eval() 381 s[++sp] = !mls_level_eq(l1, l2); in constraint_expr_eval() 384 s[++sp] = mls_level_dom(l1, l2); in constraint_expr_eval() [all …]
|
D | symtab.h | 20 int symtab_init(struct symtab *s, unsigned int size);
|
D | ebitmap.c | 270 unsigned int s; in ebitmap_set_bit() local 274 s = find_first_bit(n->maps, EBITMAP_SIZE); in ebitmap_set_bit() 275 if (s < EBITMAP_SIZE) in ebitmap_set_bit()
|
D | mls.h | 38 struct sidtab *s,
|
D | mls.c | 239 struct sidtab *s, in mls_context_to_sid() argument 265 defcon = sidtab_search(s, def_sid); in mls_context_to_sid()
|
D | policydb.h | 317 extern int policydb_load_isids(struct policydb *p, struct sidtab *s);
|
D | policydb.c | 516 static void symtab_hash_eval(struct symtab *s) in symtab_hash_eval() argument 521 hash_eval(s[i].table, symtab_name[i]); in symtab_hash_eval() 898 int policydb_load_isids(struct policydb *p, struct sidtab *s) in policydb_load_isids() argument 903 rc = sidtab_init(s); in policydb_load_isids() 918 rc = sidtab_insert(s, c->sid[0], &c->context[0]); in policydb_load_isids()
|
/security/smack/ |
D | smackfs.c | 561 static void *smk_seq_start(struct seq_file *s, loff_t *pos, in smk_seq_start() argument 578 static void *smk_seq_next(struct seq_file *s, void *v, loff_t *pos, in smk_seq_next() argument 589 static void smk_seq_stop(struct seq_file *s, void *v) in smk_seq_stop() argument 594 static void smk_rule_show(struct seq_file *s, struct smack_rule *srp, int max) in smk_rule_show() argument 609 seq_printf(s, "%s %s", in smk_rule_show() 613 seq_putc(s, ' '); in smk_rule_show() 616 seq_putc(s, 'r'); in smk_rule_show() 618 seq_putc(s, 'w'); in smk_rule_show() 620 seq_putc(s, 'x'); in smk_rule_show() 622 seq_putc(s, 'a'); in smk_rule_show() [all …]
|
D | smack_lsm.c | 78 static void smk_bu_mode(int mode, char *s) in smk_bu_mode() argument 83 s[i++] = 'r'; in smk_bu_mode() 85 s[i++] = 'w'; in smk_bu_mode() 87 s[i++] = 'x'; in smk_bu_mode() 89 s[i++] = 'a'; in smk_bu_mode() 91 s[i++] = 't'; in smk_bu_mode() 93 s[i++] = 'l'; in smk_bu_mode() 95 s[i++] = '-'; in smk_bu_mode() 96 s[i] = '\0'; in smk_bu_mode() 4109 u32 s = 0; /* 0 is the invalid secid */ in smack_socket_getpeersec_dgram() local [all …]
|
/security/keys/ |
D | trusted.h | 63 static inline void dump_sess(struct osapsess *s) in dump_sess() argument 66 16, 1, &s->handle, 4, 0); in dump_sess() 69 16, 1, &s->secret, SHA1_DIGEST_SIZE, 0); in dump_sess() 72 16, 1, &s->enonce, SHA1_DIGEST_SIZE, 0); in dump_sess() 92 static inline void dump_sess(struct osapsess *s) in dump_sess() argument
|
D | trusted.c | 394 static int osap(struct tpm_buf *tb, struct osapsess *s, in osap() argument 417 s->handle = LOAD32(tb->data, TPM_DATA_OFFSET); in osap() 418 memcpy(s->enonce, &(tb->data[TPM_DATA_OFFSET + sizeof(uint32_t)]), in osap() 422 return TSS_rawhmac(s->secret, key, SHA1_DIGEST_SIZE, TPM_NONCE_SIZE, in osap()
|
/security/tomoyo/ |
D | memory.c | 50 const size_t s = ksize(ptr); in tomoyo_memory_ok() local 51 tomoyo_memory_used[TOMOYO_MEMORY_POLICY] += s; in tomoyo_memory_ok() 56 tomoyo_memory_used[TOMOYO_MEMORY_POLICY] -= s; in tomoyo_memory_ok()
|
/security/integrity/ |
D | digsig_asymmetric.c | 111 pks.s = hdr->sig; in asymmetric_verify()
|
/security/ |
D | Kconfig.hardening | 13 on the function calling complexity of a given workload's
|
D | device_cgroup.c | 55 static inline struct dev_cgroup *css_to_devcgroup(struct cgroup_subsys_state *s) in css_to_devcgroup() argument 57 return s ? container_of(s, struct dev_cgroup, css) : NULL; in css_to_devcgroup()
|
D | Kconfig | 222 program is wish to be run. The "real" application's name will
|
/security/integrity/evm/ |
D | Kconfig | 9 EVM protects a file's security extended attributes against
|
/security/integrity/ima/ |
D | Kconfig | 37 a TPM's quote after a soft boot, the IMA measurement list of the
|