/security/keys/ |
D | big_key.c | 62 size_t datalen = prep->datalen; in big_key_preparse() 63 size_t enclen = datalen + CHACHA20POLY1305_AUTHTAG_SIZE; in big_key_preparse() 170 (size_t)key->payload.data[big_key_len] > BIG_KEY_FILE_THRESHOLD) in big_key_revoke() 179 size_t datalen = (size_t)key->payload.data[big_key_len]; in big_key_destroy() 214 size_t datalen = (size_t)key->payload.data[big_key_len]; in big_key_describe() 228 long big_key_read(const struct key *key, char *buffer, size_t buflen) in big_key_read() 230 size_t datalen = (size_t)key->payload.data[big_key_len]; in big_key_read() 240 size_t enclen = datalen + CHACHA20POLY1305_AUTHTAG_SIZE; in big_key_read()
|
D | internal.h | 161 size_t callout_len, 218 size_t callout_len, 248 extern long keyctl_update_key(key_serial_t, const void __user *, size_t); 254 extern long keyctl_describe_key(key_serial_t, char __user *, size_t); 257 extern long keyctl_read_key(key_serial_t, char __user *, size_t); 261 size_t, key_serial_t); 267 size_t buflen); 289 size_t, struct keyctl_kdf_params __user *); 291 size_t, struct keyctl_kdf_params *); 294 char __user *buffer, size_t buflen, [all …]
|
D | dh.c | 163 size_t chunk = min_t(size_t, zlen, sizeof(tmpbuffer)); in kdf_ctr() 173 chunk = min_t(size_t, zlen, sizeof(tmpbuffer)); in kdf_ctr() 200 char __user *buffer, size_t buflen, in keyctl_dh_compute_kdf() 201 uint8_t *kbuf, size_t kbuflen, size_t lzero) in keyctl_dh_compute_kdf() 205 size_t outbuf_len = roundup(buflen, in keyctl_dh_compute_kdf() 228 char __user *buffer, size_t buflen, in __keyctl_dh_compute() 411 char __user *buffer, size_t buflen, in keyctl_dh_compute()
|
/security/apparmor/include/ |
D | crypto.h | 17 char *aa_calc_hash(void *data, size_t len); 19 size_t len); 21 static inline char *aa_calc_hash(void *data, size_t len) in aa_calc_hash() 26 void *start, size_t len) in aa_calc_profile_hash()
|
D | policy_ns.h | 91 struct aa_ns *aa_findn_ns(struct aa_ns *root, const char *name, size_t n); 92 struct aa_ns *__aa_lookupn_ns(struct aa_ns *view, const char *hname, size_t n); 93 struct aa_ns *aa_lookupn_ns(struct aa_ns *view, const char *name, size_t n); 142 const char *name, size_t n) in __aa_findn_ns()
|
D | policy_unpack.h | 65 size_t size; /* the original size of the payload */ 66 size_t compressed_size; /* the compressed size of the payload */ 120 struct aa_loaddata *aa_loaddata_alloc(size_t size);
|
D | match.h | 120 static inline size_t table_size(size_t len, size_t el_size) in table_size() 128 struct aa_dfa *aa_dfa_unpack(void *blob, size_t size, int flags);
|
/security/integrity/platform_certs/ |
D | keyring_handler.c | 22 size_t len, const char *type, in uefi_blacklist_hash() 23 size_t type_len) in uefi_blacklist_hash() 44 const void *data, size_t len) in uefi_blacklist_x509_tbs() 53 const void *data, size_t len) in uefi_blacklist_binary() 62 const void *data, size_t len) in uefi_revocation_list_x509()
|
D | keyring_handler.h | 9 size_t len, const char *type, 10 size_t type_len); 15 void blacklist_x509_tbs(const char *source, const void *data, size_t len); 20 void blacklist_binary(const char *source, const void *data, size_t len);
|
/security/keys/encrypted-keys/ |
D | encrypted.h | 9 const u8 **master_key, size_t *master_keylen); 13 size_t *master_keylen) in request_trusted_key() 20 static inline void dump_master_key(const u8 *master_key, size_t master_keylen) in dump_master_key() 49 static inline void dump_master_key(const u8 *master_key, size_t master_keylen) in dump_master_key()
|
D | encrypted.c | 271 size_t asciiblob_len) in datablob_format() 302 size_t *master_keylen) in request_user_key() 350 const u8 *master_key, size_t master_keylen) in get_derived_key() 411 const u8 **master_key, size_t *master_keylen) in request_master_key() 489 const u8 *master_key, size_t master_keylen) in datablob_hmac_append() 512 size_t master_keylen) in datablob_hmac_verify() 664 size_t master_keylen; in encrypted_key_decrypt() 665 size_t asciilen; in encrypted_key_decrypt() 790 size_t datalen = prep->datalen; in encrypted_instantiate() 849 size_t datalen = prep->datalen; in encrypted_update() [all …]
|
/security/landlock/ |
D | syscalls.c | 47 copy_min_struct_from_user(void *const dst, const size_t ksize, in copy_min_struct_from_user() 48 const size_t ksize_min, const void __user *const src, in copy_min_struct_from_user() 49 const size_t usize) in copy_min_struct_from_user() 77 size_t ruleset_size, path_beneath_size; in build_check_abi() 106 const size_t size, loff_t *const ppos) in fop_dummy_read() 113 const char __user *const buf, const size_t size, in fop_dummy_write() 159 const size_t, size, const __u32, flags) in SYSCALL_DEFINE3() argument
|
/security/integrity/evm/ |
D | evm.h | 56 size_t req_xattr_value_len); 59 size_t req_xattr_value_len, struct evm_digest *data); 62 size_t req_xattr_value_len, char type,
|
D | evm_crypto.c | 52 int evm_set_key(void *key, size_t keylen) in evm_set_key() 187 size_t count) in dump_security_xattr() 213 size_t req_xattr_value_len, in evm_calc_hmac_or_hash() 219 size_t xattr_size = 0; in evm_calc_hmac_or_hash() 308 const char *req_xattr_value, size_t req_xattr_value_len, in evm_calc_hmac() 316 const char *req_xattr_value, size_t req_xattr_value_len, in evm_calc_hash() 357 const char *xattr_value, size_t xattr_value_len) in evm_update_evmxattr()
|
/security/apparmor/ |
D | policy_unpack_test.c | 48 size_t e_size; 52 struct kunit *test, size_t buf_size) in build_aa_ext_struct() 111 size_t e_size = TEST_ARRAY_BUF_OFFSET + sizeof(u16) + 1; in policy_unpack_test_init() 189 size_t size; in policy_unpack_test_unpack_blob_with_null_name() 203 size_t size; in policy_unpack_test_unpack_blob_with_name() 235 size_t size; in policy_unpack_test_unpack_str_with_null_name() 248 size_t size; in policy_unpack_test_unpack_str_with_name() 276 size_t size; in policy_unpack_test_unpack_strdup_with_null_name() 292 size_t size; in policy_unpack_test_unpack_strdup_with_name() 382 size_t size; in policy_unpack_test_unpack_u16_chunk_basic() [all …]
|
D | policy_unpack.c | 182 struct aa_loaddata *aa_loaddata_alloc(size_t size) in aa_loaddata_alloc() 201 static bool inbounds(struct aa_ext *e, size_t size) in inbounds() 206 static void *kvmemdup(const void *src, size_t len) in kvmemdup() 222 static size_t unpack_u16_chunk(struct aa_ext *e, char **chunk) in unpack_u16_chunk() 224 size_t size = 0; in unpack_u16_chunk() 281 size_t size = unpack_u16_chunk(e, &tag); in unpack_nameX() 353 static size_t unpack_array(struct aa_ext *e, const char *name) in unpack_array() 371 static size_t unpack_blob(struct aa_ext *e, char **blob, const char *name) in unpack_blob() 381 if (inbounds(e, (size_t) size)) { in unpack_blob() 396 size_t size = 0; in unpack_str() [all …]
|
/security/selinux/ |
D | selinuxfs.c | 126 size_t count, loff_t *ppos) in sel_read_enforce() 139 size_t count, loff_t *ppos) in sel_write_enforce() 205 size_t count, loff_t *ppos) in sel_read_handle_unknown() 239 size_t count, loff_t *ppos) in sel_read_handle_status() 281 size_t count, loff_t *ppos) in sel_write_disable() 340 size_t count, loff_t *ppos) in sel_read_policyvers() 374 size_t count, loff_t *ppos) in sel_read_mls() 391 size_t len; 425 if ((size_t)i_size_read(inode) != plm->len) { in sel_open_policy() 463 size_t count, loff_t *ppos) in sel_read_policy() [all …]
|
/security/smack/ |
D | smackfs.c | 444 size_t count, loff_t *ppos, in smk_write_rules_list() 658 size_t count, loff_t *ppos) in smk_write_load() 830 size_t count, loff_t *ppos, int format) in smk_set_cipso() 951 size_t count, loff_t *ppos) in smk_write_cipso() 1025 size_t count, loff_t *ppos) in smk_write_cipso2() 1144 size_t count, loff_t *ppos) in smk_write_net4addr() 1407 size_t count, loff_t *ppos) in smk_write_net6addr() 1571 size_t count, loff_t *ppos) in smk_read_doi() 1595 size_t count, loff_t *ppos) in smk_write_doi() 1637 size_t count, loff_t *ppos) in smk_read_direct() [all …]
|
/security/selinux/ss/ |
D | policydb.h | 309 size_t len; 354 size_t len; 362 static inline int next_entry(void *buf, struct policy_file *fp, size_t bytes) in next_entry() 373 static inline int put_entry(const void *buf, size_t bytes, int num, struct policy_file *fp) in put_entry() 375 size_t len = bytes * num; in put_entry()
|
/security/keys/trusted-keys/ |
D | trusted_tpm2.c | 129 int tpm2_key_parent(void *context, size_t hdrlen, in tpm2_key_parent() 131 const void *value, size_t vlen) in tpm2_key_parent() 146 int tpm2_key_type(void *context, size_t hdrlen, in tpm2_key_type() 148 const void *value, size_t vlen) in tpm2_key_type() 164 int tpm2_key_pub(void *context, size_t hdrlen, in tpm2_key_pub() 166 const void *value, size_t vlen) in tpm2_key_pub() 176 int tpm2_key_priv(void *context, size_t hdrlen, in tpm2_key_priv() 178 const void *value, size_t vlen) in tpm2_key_priv()
|
D | trusted_core.c | 146 size_t datalen = prep->datalen; in trusted_instantiate() 150 size_t key_len; in trusted_instantiate() 226 size_t datalen = prep->datalen; in trusted_update() 283 size_t buflen) in trusted_read() 319 static int kernel_get_random(unsigned char *key, size_t key_len) in kernel_get_random() 326 int (*get_random)(unsigned char *key, size_t key_len); in init_trusted()
|
/security/tomoyo/ |
D | securityfs_if.c | 42 size_t count, loff_t *ppos) in tomoyo_write_self() 101 size_t count, loff_t *ppos) in tomoyo_read_self() 176 static ssize_t tomoyo_read(struct file *file, char __user *buf, size_t count, in tomoyo_read() 193 size_t count, loff_t *ppos) in tomoyo_write()
|
/security/safesetid/ |
D | securityfs.c | 140 const char __user *ubuf, size_t len, enum setid_type policy_type) in handle_policy_update() 237 size_t len, in safesetid_uid_file_write() 251 size_t len, in safesetid_gid_file_write() 264 … size_t len, loff_t *ppos, struct mutex *policy_update_lock, struct __rcu setid_ruleset* ruleset) in safesetid_file_read() 283 size_t len, loff_t *ppos) in safesetid_uid_file_read() 290 size_t len, loff_t *ppos) in safesetid_gid_file_read()
|
/security/integrity/ |
D | integrity.h | 171 const void *data, size_t len, key_perm_t perm); 194 const void *data, size_t len, in integrity_load_cert() 281 size_t len); 284 const void *data, size_t len) in add_to_platform_keyring()
|
/security/integrity/ima/ |
D | ima_kexec.c | 91 size_t kexec_buffer_size; in ima_add_kexec_buffer() 92 size_t kexec_segment_size; in ima_add_kexec_buffer() 143 size_t kexec_buffer_size = 0; in ima_load_kexec_buffer()
|