Home
last modified time | relevance | path

Searched refs:end (Results 1 – 10 of 10) sorted by relevance

/security/integrity/platform_certs/
Dload_ipl_s390.c20 void *ptr, *end; in load_ipl_certs() local
27 end = ptr + ipl_cert_list_size; in load_ipl_certs()
28 while ((void *) ptr < end) { in load_ipl_certs()
/security/tomoyo/
Dnetwork.c56 const char *end; in tomoyo_parse_ipaddr_union() local
59 in4_pton(address, -1, min, '-', &end) > 0) { in tomoyo_parse_ipaddr_union()
61 if (!*end) in tomoyo_parse_ipaddr_union()
63 else if (*end++ != '-' || in tomoyo_parse_ipaddr_union()
64 in4_pton(end, -1, max, '\0', &end) <= 0 || *end) in tomoyo_parse_ipaddr_union()
68 if (in6_pton(address, -1, min, '-', &end) > 0) { in tomoyo_parse_ipaddr_union()
70 if (!*end) in tomoyo_parse_ipaddr_union()
72 else if (*end++ != '-' || in tomoyo_parse_ipaddr_union()
73 in6_pton(end, -1, max, '\0', &end) <= 0 || *end) in tomoyo_parse_ipaddr_union()
Dcommon.c2865 char *end = strchr(start, '\n'); in tomoyo_load_builtin_policy() local
2867 if (!end) in tomoyo_load_builtin_policy()
2869 *end = '\0'; in tomoyo_load_builtin_policy()
2873 start = end + 1; in tomoyo_load_builtin_policy()
/security/apparmor/
Dpolicy_unpack_test.c64 e->end = e->start + buf_size; in build_aa_ext_struct()
176 puf->e->end = puf->e->start + TEST_ARRAY_BUF_OFFSET + sizeof(u16); in policy_unpack_test_unpack_array_out_of_bounds()
222 puf->e->end = puf->e->start + TEST_BLOB_BUF_OFFSET in policy_unpack_test_unpack_blob_out_of_bounds()
263 puf->e->end = puf->e->pos + TEST_STRING_BUF_OFFSET in policy_unpack_test_unpack_str_out_of_bounds()
284 && ((uintptr_t)string <= (uintptr_t)puf->e->end)); in policy_unpack_test_unpack_strdup_with_null_name()
299 && ((uintptr_t)string <= (uintptr_t)puf->e->end)); in policy_unpack_test_unpack_strdup_with_name()
310 puf->e->end = puf->e->pos + TEST_STRING_BUF_OFFSET in policy_unpack_test_unpack_strdup_out_of_bounds()
390 puf->e->end += TEST_U16_DATA; in policy_unpack_test_unpack_u16_chunk_basic()
407 puf->e->pos = puf->e->end - 1; in policy_unpack_test_unpack_u16_chunk_out_of_bounds_1()
413 KUNIT_EXPECT_PTR_EQ(test, puf->e->pos, puf->e->end - 1); in policy_unpack_test_unpack_u16_chunk_out_of_bounds_1()
[all …]
Dlib.c86 const char *end = fqname + n; in aa_splitn_fqname() local
96 char *split = strnchr(&name[1], end - &name[1], ':'); in aa_splitn_fqname()
97 *ns_name = skipn_spaces(&name[1], end - &name[1]); in aa_splitn_fqname()
105 if (end - split > 1 && strncmp(split, "//", 2) == 0) in aa_splitn_fqname()
107 name = skipn_spaces(split, end - split); in aa_splitn_fqname()
111 *ns_len = end - *ns_name; in aa_splitn_fqname()
Dprocattr.c125 char *end = args + size; in aa_setprocattr_changehat() local
126 for (count = 0; (hat < end) && count < 16; ++count) { in aa_setprocattr_changehat()
Dlabel.c1838 const char *end = str + n; in label_count_strn_entries() local
1844 for (split = aa_label_strn_split(str, end - str); in label_count_strn_entries()
1846 split = aa_label_strn_split(str, end - str)) { in label_count_strn_entries()
1892 const char *end = str + n; in aa_label_strn_parse() local
1903 len = label_count_strn_entries(str, end - str); in aa_label_strn_parse()
1919 for (split = aa_label_strn_split(str, end - str), i = stack; in aa_label_strn_parse()
1931 split = aa_label_strn_split(str, end - str); in aa_label_strn_parse()
1935 vec[i] = fqlookupn_profile(base, currbase, str, end - str); in aa_label_strn_parse()
Dpolicy_unpack.c72 void *end; member
203 return (size <= e->end - e->pos); in inbounds()
1182 .end = udata->data + udata->size, in aa_unpack()
1187 while (e.pos < e.end) { in aa_unpack()
/security/safesetid/
Dsecurityfs.c143 char *buf, *p, *end; in handle_policy_update() local
168 end = strchr(p, '\n'); in handle_policy_update()
169 if (end == NULL) { in handle_policy_update()
173 *end = '\0'; in handle_policy_update()
193 p = end + 1; in handle_policy_update()
/security/
DKconfig105 Intel TXT also helps solve real end user concerns about having