Home
last modified time | relevance | path

Searched refs:size_t (Results 1 – 25 of 85) sorted by relevance

1234

/security/keys/
Dbig_key.c62 size_t datalen = prep->datalen; in big_key_preparse()
63 size_t enclen = datalen + CHACHA20POLY1305_AUTHTAG_SIZE; in big_key_preparse()
170 (size_t)key->payload.data[big_key_len] > BIG_KEY_FILE_THRESHOLD) in big_key_revoke()
179 size_t datalen = (size_t)key->payload.data[big_key_len]; in big_key_destroy()
214 size_t datalen = (size_t)key->payload.data[big_key_len]; in big_key_describe()
228 long big_key_read(const struct key *key, char *buffer, size_t buflen) in big_key_read()
230 size_t datalen = (size_t)key->payload.data[big_key_len]; in big_key_read()
240 size_t enclen = datalen + CHACHA20POLY1305_AUTHTAG_SIZE; in big_key_read()
Dinternal.h161 size_t callout_len,
218 size_t callout_len,
248 extern long keyctl_update_key(key_serial_t, const void __user *, size_t);
254 extern long keyctl_describe_key(key_serial_t, char __user *, size_t);
257 extern long keyctl_read_key(key_serial_t, char __user *, size_t);
261 size_t, key_serial_t);
267 size_t buflen);
289 size_t, struct keyctl_kdf_params __user *);
291 size_t, struct keyctl_kdf_params *);
294 char __user *buffer, size_t buflen,
[all …]
Ddh.c163 size_t chunk = min_t(size_t, zlen, sizeof(tmpbuffer)); in kdf_ctr()
173 chunk = min_t(size_t, zlen, sizeof(tmpbuffer)); in kdf_ctr()
200 char __user *buffer, size_t buflen, in keyctl_dh_compute_kdf()
201 uint8_t *kbuf, size_t kbuflen, size_t lzero) in keyctl_dh_compute_kdf()
205 size_t outbuf_len = roundup(buflen, in keyctl_dh_compute_kdf()
228 char __user *buffer, size_t buflen, in __keyctl_dh_compute()
411 char __user *buffer, size_t buflen, in keyctl_dh_compute()
/security/apparmor/include/
Dcrypto.h17 char *aa_calc_hash(void *data, size_t len);
19 size_t len);
21 static inline char *aa_calc_hash(void *data, size_t len) in aa_calc_hash()
26 void *start, size_t len) in aa_calc_profile_hash()
Dpolicy_ns.h91 struct aa_ns *aa_findn_ns(struct aa_ns *root, const char *name, size_t n);
92 struct aa_ns *__aa_lookupn_ns(struct aa_ns *view, const char *hname, size_t n);
93 struct aa_ns *aa_lookupn_ns(struct aa_ns *view, const char *name, size_t n);
142 const char *name, size_t n) in __aa_findn_ns()
Dpolicy_unpack.h65 size_t size; /* the original size of the payload */
66 size_t compressed_size; /* the compressed size of the payload */
120 struct aa_loaddata *aa_loaddata_alloc(size_t size);
Dmatch.h120 static inline size_t table_size(size_t len, size_t el_size) in table_size()
128 struct aa_dfa *aa_dfa_unpack(void *blob, size_t size, int flags);
/security/integrity/platform_certs/
Dkeyring_handler.c22 size_t len, const char *type, in uefi_blacklist_hash()
23 size_t type_len) in uefi_blacklist_hash()
44 const void *data, size_t len) in uefi_blacklist_x509_tbs()
53 const void *data, size_t len) in uefi_blacklist_binary()
62 const void *data, size_t len) in uefi_revocation_list_x509()
Dkeyring_handler.h9 size_t len, const char *type,
10 size_t type_len);
15 void blacklist_x509_tbs(const char *source, const void *data, size_t len);
20 void blacklist_binary(const char *source, const void *data, size_t len);
/security/keys/encrypted-keys/
Dencrypted.h9 const u8 **master_key, size_t *master_keylen);
13 size_t *master_keylen) in request_trusted_key()
20 static inline void dump_master_key(const u8 *master_key, size_t master_keylen) in dump_master_key()
49 static inline void dump_master_key(const u8 *master_key, size_t master_keylen) in dump_master_key()
Dencrypted.c271 size_t asciiblob_len) in datablob_format()
302 size_t *master_keylen) in request_user_key()
350 const u8 *master_key, size_t master_keylen) in get_derived_key()
411 const u8 **master_key, size_t *master_keylen) in request_master_key()
489 const u8 *master_key, size_t master_keylen) in datablob_hmac_append()
512 size_t master_keylen) in datablob_hmac_verify()
664 size_t master_keylen; in encrypted_key_decrypt()
665 size_t asciilen; in encrypted_key_decrypt()
790 size_t datalen = prep->datalen; in encrypted_instantiate()
849 size_t datalen = prep->datalen; in encrypted_update()
[all …]
/security/landlock/
Dsyscalls.c47 copy_min_struct_from_user(void *const dst, const size_t ksize, in copy_min_struct_from_user()
48 const size_t ksize_min, const void __user *const src, in copy_min_struct_from_user()
49 const size_t usize) in copy_min_struct_from_user()
77 size_t ruleset_size, path_beneath_size; in build_check_abi()
106 const size_t size, loff_t *const ppos) in fop_dummy_read()
113 const char __user *const buf, const size_t size, in fop_dummy_write()
159 const size_t, size, const __u32, flags) in SYSCALL_DEFINE3() argument
/security/integrity/evm/
Devm.h56 size_t req_xattr_value_len);
59 size_t req_xattr_value_len, struct evm_digest *data);
62 size_t req_xattr_value_len, char type,
Devm_crypto.c52 int evm_set_key(void *key, size_t keylen) in evm_set_key()
187 size_t count) in dump_security_xattr()
213 size_t req_xattr_value_len, in evm_calc_hmac_or_hash()
219 size_t xattr_size = 0; in evm_calc_hmac_or_hash()
308 const char *req_xattr_value, size_t req_xattr_value_len, in evm_calc_hmac()
316 const char *req_xattr_value, size_t req_xattr_value_len, in evm_calc_hash()
357 const char *xattr_value, size_t xattr_value_len) in evm_update_evmxattr()
/security/apparmor/
Dpolicy_unpack_test.c48 size_t e_size;
52 struct kunit *test, size_t buf_size) in build_aa_ext_struct()
111 size_t e_size = TEST_ARRAY_BUF_OFFSET + sizeof(u16) + 1; in policy_unpack_test_init()
189 size_t size; in policy_unpack_test_unpack_blob_with_null_name()
203 size_t size; in policy_unpack_test_unpack_blob_with_name()
235 size_t size; in policy_unpack_test_unpack_str_with_null_name()
248 size_t size; in policy_unpack_test_unpack_str_with_name()
276 size_t size; in policy_unpack_test_unpack_strdup_with_null_name()
292 size_t size; in policy_unpack_test_unpack_strdup_with_name()
382 size_t size; in policy_unpack_test_unpack_u16_chunk_basic()
[all …]
Dpolicy_unpack.c182 struct aa_loaddata *aa_loaddata_alloc(size_t size) in aa_loaddata_alloc()
201 static bool inbounds(struct aa_ext *e, size_t size) in inbounds()
206 static void *kvmemdup(const void *src, size_t len) in kvmemdup()
222 static size_t unpack_u16_chunk(struct aa_ext *e, char **chunk) in unpack_u16_chunk()
224 size_t size = 0; in unpack_u16_chunk()
281 size_t size = unpack_u16_chunk(e, &tag); in unpack_nameX()
353 static size_t unpack_array(struct aa_ext *e, const char *name) in unpack_array()
371 static size_t unpack_blob(struct aa_ext *e, char **blob, const char *name) in unpack_blob()
381 if (inbounds(e, (size_t) size)) { in unpack_blob()
396 size_t size = 0; in unpack_str()
[all …]
/security/selinux/
Dselinuxfs.c126 size_t count, loff_t *ppos) in sel_read_enforce()
139 size_t count, loff_t *ppos) in sel_write_enforce()
205 size_t count, loff_t *ppos) in sel_read_handle_unknown()
239 size_t count, loff_t *ppos) in sel_read_handle_status()
281 size_t count, loff_t *ppos) in sel_write_disable()
340 size_t count, loff_t *ppos) in sel_read_policyvers()
374 size_t count, loff_t *ppos) in sel_read_mls()
391 size_t len;
425 if ((size_t)i_size_read(inode) != plm->len) { in sel_open_policy()
463 size_t count, loff_t *ppos) in sel_read_policy()
[all …]
/security/smack/
Dsmackfs.c444 size_t count, loff_t *ppos, in smk_write_rules_list()
658 size_t count, loff_t *ppos) in smk_write_load()
830 size_t count, loff_t *ppos, int format) in smk_set_cipso()
951 size_t count, loff_t *ppos) in smk_write_cipso()
1025 size_t count, loff_t *ppos) in smk_write_cipso2()
1144 size_t count, loff_t *ppos) in smk_write_net4addr()
1407 size_t count, loff_t *ppos) in smk_write_net6addr()
1571 size_t count, loff_t *ppos) in smk_read_doi()
1595 size_t count, loff_t *ppos) in smk_write_doi()
1637 size_t count, loff_t *ppos) in smk_read_direct()
[all …]
/security/selinux/ss/
Dpolicydb.h309 size_t len;
354 size_t len;
362 static inline int next_entry(void *buf, struct policy_file *fp, size_t bytes) in next_entry()
373 static inline int put_entry(const void *buf, size_t bytes, int num, struct policy_file *fp) in put_entry()
375 size_t len = bytes * num; in put_entry()
/security/keys/trusted-keys/
Dtrusted_tpm2.c129 int tpm2_key_parent(void *context, size_t hdrlen, in tpm2_key_parent()
131 const void *value, size_t vlen) in tpm2_key_parent()
146 int tpm2_key_type(void *context, size_t hdrlen, in tpm2_key_type()
148 const void *value, size_t vlen) in tpm2_key_type()
164 int tpm2_key_pub(void *context, size_t hdrlen, in tpm2_key_pub()
166 const void *value, size_t vlen) in tpm2_key_pub()
176 int tpm2_key_priv(void *context, size_t hdrlen, in tpm2_key_priv()
178 const void *value, size_t vlen) in tpm2_key_priv()
Dtrusted_core.c146 size_t datalen = prep->datalen; in trusted_instantiate()
150 size_t key_len; in trusted_instantiate()
226 size_t datalen = prep->datalen; in trusted_update()
283 size_t buflen) in trusted_read()
319 static int kernel_get_random(unsigned char *key, size_t key_len) in kernel_get_random()
326 int (*get_random)(unsigned char *key, size_t key_len); in init_trusted()
/security/tomoyo/
Dsecurityfs_if.c42 size_t count, loff_t *ppos) in tomoyo_write_self()
101 size_t count, loff_t *ppos) in tomoyo_read_self()
176 static ssize_t tomoyo_read(struct file *file, char __user *buf, size_t count, in tomoyo_read()
193 size_t count, loff_t *ppos) in tomoyo_write()
/security/safesetid/
Dsecurityfs.c140 const char __user *ubuf, size_t len, enum setid_type policy_type) in handle_policy_update()
237 size_t len, in safesetid_uid_file_write()
251 size_t len, in safesetid_gid_file_write()
264size_t len, loff_t *ppos, struct mutex *policy_update_lock, struct __rcu setid_ruleset* ruleset) in safesetid_file_read()
283 size_t len, loff_t *ppos) in safesetid_uid_file_read()
290 size_t len, loff_t *ppos) in safesetid_gid_file_read()
/security/integrity/
Dintegrity.h171 const void *data, size_t len, key_perm_t perm);
194 const void *data, size_t len, in integrity_load_cert()
281 size_t len);
284 const void *data, size_t len) in add_to_platform_keyring()
/security/integrity/ima/
Dima_kexec.c91 size_t kexec_buffer_size; in ima_add_kexec_buffer()
92 size_t kexec_segment_size; in ima_add_kexec_buffer()
143 size_t kexec_buffer_size = 0; in ima_load_kexec_buffer()

1234