/security/keys/trusted-keys/ |
D | trusted_tpm2.c | 79 work1 = payload->blob; in tpm2_key_encode() 80 work1 = asn1_encode_sequence(work1, work1 + sizeof(payload->blob), in tpm2_key_encode() 85 return work1 - payload->blob; in tpm2_key_encode() 102 u8 *blob; in tpm2_key_decode() local 106 ret = asn1_ber_decoder(&tpm2key_decoder, &ctx, payload->blob, in tpm2_key_decode() 114 blob = kmalloc(ctx.priv_len + ctx.pub_len + 4, GFP_KERNEL); in tpm2_key_decode() 115 if (!blob) in tpm2_key_decode() 118 *buf = blob; in tpm2_key_decode() 121 memcpy(blob, ctx.priv, ctx.priv_len); in tpm2_key_decode() 122 blob += ctx.priv_len; in tpm2_key_decode() [all …]
|
D | trusted_tee.c | 81 reg_shm_out = tee_shm_register(pvt_data.ctx, (unsigned long)p->blob, in trusted_tee_seal() 82 sizeof(p->blob), TEE_SHM_DMA_BUF | in trusted_tee_seal() 100 param[1].u.memref.size = sizeof(p->blob); in trusted_tee_seal() 134 reg_shm_in = tee_shm_register(pvt_data.ctx, (unsigned long)p->blob, in trusted_tee_unseal()
|
D | trusted_tpm1.c | 460 unsigned char *blob, uint32_t *bloblen, in tpm_seal() argument 564 memcpy(blob, tb->data + TPM_DATA_OFFSET, storedsize); in tpm_seal() 577 const unsigned char *blob, int bloblen, in tpm_unseal() argument 615 &ordinal, bloblen, blob, 0, 0); in tpm_unseal() 620 &ordinal, bloblen, blob, 0, 0); in tpm_unseal() 627 tpm_buf_append(tb, blob, bloblen); in tpm_unseal() 675 p->key, p->key_len + 1, p->blob, &p->blob_len, in key_seal() 697 ret = tpm_unseal(&tb, o->keyhandle, o->keyauth, p->blob, p->blob_len, in key_unseal()
|
D | trusted_core.c | 102 ret = hex2bin(p->blob, c, p->blob_len); in datablob_parse() 296 bufp = hex_byte_pack(bufp, p->blob[i]); in trusted_read()
|
/security/apparmor/include/ |
D | cred.h | 24 struct aa_label **blob = cred->security + apparmor_blob_sizes.lbs_cred; in cred_label() local 26 AA_BUG(!blob); in cred_label() 27 return *blob; in cred_label() 33 struct aa_label **blob = cred->security + apparmor_blob_sizes.lbs_cred; in set_cred_label() local 35 AA_BUG(!blob); in set_cred_label() 36 *blob = label; in set_cred_label()
|
D | match.h | 128 struct aa_dfa *aa_dfa_unpack(void *blob, size_t size, int flags);
|
/security/apparmor/ |
D | match.c | 77 static struct table_header *unpack_table(char *blob, size_t bsize) in unpack_table() argument 89 th.td_id = be16_to_cpu(*(__be16 *) (blob)) - 1; in unpack_table() 92 th.td_flags = be16_to_cpu(*(__be16 *) (blob + 2)); in unpack_table() 93 th.td_lolen = be32_to_cpu(*(__be32 *) (blob + 8)); in unpack_table() 94 blob += sizeof(struct table_header); in unpack_table() 113 UNPACK_ARRAY(table->td_data, blob, th.td_lolen, in unpack_table() 116 UNPACK_ARRAY(table->td_data, blob, th.td_lolen, in unpack_table() 119 UNPACK_ARRAY(table->td_data, blob, th.td_lolen, in unpack_table() 306 struct aa_dfa *aa_dfa_unpack(void *blob, size_t size, int flags) in aa_dfa_unpack() argument 310 char *data = blob; in aa_dfa_unpack()
|
D | policy_unpack_test.c | 188 char *blob = NULL; in policy_unpack_test_unpack_blob_with_null_name() local 192 size = unpack_blob(puf->e, &blob, NULL); in policy_unpack_test_unpack_blob_with_null_name() 196 memcmp(blob, TEST_BLOB_DATA, TEST_BLOB_DATA_SIZE) == 0); in policy_unpack_test_unpack_blob_with_null_name() 202 char *blob = NULL; in policy_unpack_test_unpack_blob_with_name() local 206 size = unpack_blob(puf->e, &blob, TEST_BLOB_NAME); in policy_unpack_test_unpack_blob_with_name() 210 memcmp(blob, TEST_BLOB_DATA, TEST_BLOB_DATA_SIZE) == 0); in policy_unpack_test_unpack_blob_with_name() 216 char *blob = NULL; in policy_unpack_test_unpack_blob_out_of_bounds() local 225 size = unpack_blob(puf->e, &blob, TEST_BLOB_NAME); in policy_unpack_test_unpack_blob_out_of_bounds()
|
D | policy_unpack.c | 371 static size_t unpack_blob(struct aa_ext *e, char **blob, const char *name) in unpack_blob() argument 382 *blob = e->pos; in unpack_blob() 444 char *blob = NULL; in unpack_dfa() local 448 size = unpack_blob(e, &blob, "aadfa"); in unpack_dfa() 455 size_t sz = blob - (char *) e->start - in unpack_dfa() 460 dfa = aa_dfa_unpack(blob + pad, size - pad, flags); in unpack_dfa()
|
/security/smack/ |
D | smack_lsm.c | 1539 struct smack_known **blob = smack_file(file); in smack_file_alloc_security() local 1541 *blob = smk_of_current(); in smack_file_alloc_security() 1769 struct smack_known **blob = smack_file(file); in smack_file_set_fowner() local 1771 *blob = smk_of_current(); in smack_file_set_fowner() 1788 struct smack_known **blob; in smack_file_send_sigiotask() local 1802 blob = smack_file(file); in smack_file_send_sigiotask() 1803 skp = *blob; in smack_file_send_sigiotask() 2923 struct smack_known **blob = smack_msg_msg(msg); in smack_msg_msg_alloc_security() local 2925 *blob = smk_of_current(); in smack_msg_msg_alloc_security() 2937 struct smack_known **blob = smack_ipc(isp); in smack_of_ipc() local [all …]
|
/security/ |
D | security.c | 1543 void *blob; in security_file_free() local 1547 blob = file->f_security; in security_file_free() 1548 if (blob) { in security_file_free() 1550 kmem_cache_free(lsm_file_cache, blob); in security_file_free()
|