/security/tomoyo/ |
D | util.c | 192 char c = *(cp + 1); in tomoyo_parse_ulong() local 194 if (c == 'x' || c == 'X') { in tomoyo_parse_ulong() 197 } else if (c >= '0' && c <= '7') { in tomoyo_parse_ulong() 330 static inline bool tomoyo_alphabet_char(const char c) in tomoyo_alphabet_char() argument 332 return (c >= 'A' && c <= 'Z') || (c >= 'a' && c <= 'z'); in tomoyo_alphabet_char() 356 static inline bool tomoyo_valid(const unsigned char c) in tomoyo_valid() argument 358 return c > ' ' && c < 127; in tomoyo_valid() 368 static inline bool tomoyo_invalid(const unsigned char c) in tomoyo_invalid() argument 370 return c && (c <= ' ' || c >= 127); in tomoyo_invalid() 444 unsigned char c = *string++; in tomoyo_correct_word2() local [all …]
|
D | realpath.c | 34 const unsigned char c = p[i]; in tomoyo_encode2() local 36 if (c == '\\') in tomoyo_encode2() 38 else if (c > ' ' && c < 127) in tomoyo_encode2() 51 const unsigned char c = p[i]; in tomoyo_encode2() local 53 if (c == '\\') { in tomoyo_encode2() 56 } else if (c > ' ' && c < 127) { in tomoyo_encode2() 57 *cp++ = c; in tomoyo_encode2() 60 *cp++ = (c >> 6) + '0'; in tomoyo_encode2() 61 *cp++ = ((c >> 3) & 7) + '0'; in tomoyo_encode2() 62 *cp++ = (c & 7) + '0'; in tomoyo_encode2()
|
D | audit.c | 52 const unsigned char c = kaddr[offset++]; in tomoyo_print_bprm() local 59 } else if (c == '\\') { in tomoyo_print_bprm() 62 } else if (c > ' ' && c < 127) { in tomoyo_print_bprm() 63 *cp++ = c; in tomoyo_print_bprm() 64 } else if (!c) { in tomoyo_print_bprm() 70 *cp++ = (c >> 6) + '0'; in tomoyo_print_bprm() 71 *cp++ = ((c >> 3) & 7) + '0'; in tomoyo_print_bprm() 72 *cp++ = (c & 7) + '0'; in tomoyo_print_bprm() 74 if (c) in tomoyo_print_bprm()
|
D | domain.c | 650 const unsigned char c = env_page.data[offset++]; in tomoyo_environ() local 652 if (c && arg_len < TOMOYO_EXEC_TMPSIZE - 10) { in tomoyo_environ() 653 if (c == '=') { in tomoyo_environ() 655 } else if (c == '\\') { in tomoyo_environ() 658 } else if (c > ' ' && c < 127) { in tomoyo_environ() 659 arg_ptr[arg_len++] = c; in tomoyo_environ() 662 arg_ptr[arg_len++] = (c >> 6) + '0'; in tomoyo_environ() 664 = ((c >> 3) & 7) + '0'; in tomoyo_environ() 665 arg_ptr[arg_len++] = (c & 7) + '0'; in tomoyo_environ() 670 if (c) in tomoyo_environ()
|
D | condition.c | 138 const unsigned char c = kaddr[offset++]; in tomoyo_scan_bprm() local 140 if (c && arg_len < TOMOYO_EXEC_TMPSIZE - 10) { in tomoyo_scan_bprm() 141 if (c == '\\') { in tomoyo_scan_bprm() 144 } else if (c > ' ' && c < 127) { in tomoyo_scan_bprm() 145 arg_ptr[arg_len++] = c; in tomoyo_scan_bprm() 148 arg_ptr[arg_len++] = (c >> 6) + '0'; in tomoyo_scan_bprm() 150 ((c >> 3) & 7) + '0'; in tomoyo_scan_bprm() 151 arg_ptr[arg_len++] = (c & 7) + '0'; in tomoyo_scan_bprm() 156 if (c) in tomoyo_scan_bprm()
|
D | common.c | 610 const u8 c = tomoyo_index2category[i]; in tomoyo_set_mode() local 612 tomoyo_category_keywords[c]; in tomoyo_set_mode() 2672 char c; in tomoyo_write_control() local 2688 if (get_user(c, buffer)) { in tomoyo_write_control() 2694 cp0[head->w.avail++] = c; in tomoyo_write_control() 2695 if (c != '\n') in tomoyo_write_control()
|
/security/selinux/ss/ |
D | context.c | 14 u32 context_compute_hash(const struct context *c) in context_compute_hash() argument 26 if (c->len) in context_compute_hash() 27 return full_name_hash(NULL, c->str, c->len); in context_compute_hash() 29 hash = jhash_3words(c->user, c->role, c->type, hash); in context_compute_hash() 30 hash = mls_range_hash(&c->range, hash); in context_compute_hash()
|
D | context.h | 36 static inline void mls_context_init(struct context *c) in mls_context_init() argument 38 memset(&c->range, 0, sizeof(c->range)); in mls_context_init() 138 static inline void mls_context_destroy(struct context *c) in mls_context_destroy() argument 140 ebitmap_destroy(&c->range.level[0].cat); in mls_context_destroy() 141 ebitmap_destroy(&c->range.level[1].cat); in mls_context_destroy() 142 mls_context_init(c); in mls_context_destroy() 145 static inline void context_init(struct context *c) in context_init() argument 147 memset(c, 0, sizeof(*c)); in context_init() 174 static inline void context_destroy(struct context *c) in context_destroy() argument 176 c->user = c->role = c->type = 0; in context_destroy() [all …]
|
D | policydb.c | 367 static void ocontext_destroy(struct ocontext *c, int i) in ocontext_destroy() argument 369 if (!c) in ocontext_destroy() 372 context_destroy(&c->context[0]); in ocontext_destroy() 373 context_destroy(&c->context[1]); in ocontext_destroy() 376 kfree(c->u.name); in ocontext_destroy() 377 kfree(c); in ocontext_destroy() 788 struct ocontext *c, *ctmp; in policydb_destroy() local 811 c = p->ocontexts[i]; in policydb_destroy() 812 while (c) { in policydb_destroy() 813 ctmp = c; in policydb_destroy() [all …]
|
D | services.c | 279 struct context *c; in constraint_expr_eval() local 404 c = scontext; in constraint_expr_eval() 406 c = tcontext; in constraint_expr_eval() 408 c = xcontext; in constraint_expr_eval() 409 if (!c) { in constraint_expr_eval() 415 val1 = c->user; in constraint_expr_eval() 417 val1 = c->role; in constraint_expr_eval() 419 val1 = c->type; in constraint_expr_eval() 2401 static int ocontext_to_sid(struct sidtab *sidtab, struct ocontext *c, in ocontext_to_sid() argument 2408 sid = smp_load_acquire(&c->sid[index]); in ocontext_to_sid() [all …]
|
D | mls.c | 193 int mls_context_isvalid(struct policydb *p, struct context *c) in mls_context_isvalid() argument 200 if (!mls_range_isvalid(p, &c->range)) in mls_context_isvalid() 203 if (c->role == OBJECT_R_VAL) in mls_context_isvalid() 209 if (!c->user || c->user > p->p_users.nprim) in mls_context_isvalid() 211 usrdatum = p->user_val_to_struct[c->user - 1]; in mls_context_isvalid() 212 if (!mls_range_contains(usrdatum->range, c->range)) in mls_context_isvalid()
|
D | mls.h | 34 int mls_context_isvalid(struct policydb *p, struct context *c);
|
D | policydb.h | 322 extern int policydb_context_isvalid(struct policydb *p, struct context *c);
|
/security/keys/trusted-keys/ |
D | trusted_core.c | 75 char *c; in datablob_parse() local 78 c = strsep(datablob, " \t"); in datablob_parse() 79 if (!c) in datablob_parse() 81 key_cmd = match_token(c, key_tokens, args); in datablob_parse() 85 c = strsep(datablob, " \t"); in datablob_parse() 86 if (!c) in datablob_parse() 88 ret = kstrtol(c, 10, &keylen); in datablob_parse() 96 c = strsep(datablob, " \t"); in datablob_parse() 97 if (!c) in datablob_parse() 99 p->blob_len = strlen(c) / 2; in datablob_parse() [all …]
|
D | trusted_tpm1.c | 123 unsigned char c; in TSS_authhmac() local 136 c = !!h3; in TSS_authhmac() 160 TPM_NONCE_SIZE, h2, 1, &c, 0, 0); in TSS_authhmac() 732 static int getoptions(char *c, struct trusted_key_payload *pay, in getoptions() argument 736 char *p = c; in getoptions() 752 if (!c) in getoptions() 755 while ((p = strsep(&c, " \t"))) { in getoptions()
|
/security/apparmor/include/ |
D | policy.h | 275 struct aa_profile *c; in aa_get_profile_rcu() local 279 c = rcu_dereference(*p); in aa_get_profile_rcu() 280 } while (c && !kref_get_unless_zero(&c->label.count)); in aa_get_profile_rcu() 283 return c; in aa_get_profile_rcu()
|
D | label.h | 400 struct aa_label *c; in aa_get_label_rcu() local 404 c = rcu_dereference(*l); in aa_get_label_rcu() 405 } while (c && !kref_get_unless_zero(&c->count)); in aa_get_label_rcu() 408 return c; in aa_get_label_rcu()
|
D | match.h | 134 const char c);
|
/security/selinux/ |
D | avc.c | 817 struct avc_callback_node *c; in avc_add_callback() local 820 c = kmalloc(sizeof(*c), GFP_KERNEL); in avc_add_callback() 821 if (!c) { in avc_add_callback() 826 c->callback = callback; in avc_add_callback() 827 c->events = events; in avc_add_callback() 828 c->next = avc_callbacks; in avc_add_callback() 829 avc_callbacks = c; in avc_add_callback() 971 struct avc_callback_node *c; in avc_ss_reset() local 976 for (c = avc_callbacks; c; c = c->next) { in avc_ss_reset() 977 if (c->events & AVC_CALLBACK_RESET) { in avc_ss_reset() [all …]
|
D | hooks.c | 2631 char c; in opt_len() local 2633 for (len = 0; (c = s[len]) != '\0'; len++) { in opt_len() 2634 if (c == '"') in opt_len() 2636 if (c == ',' && !open_quote) in opt_len() 2662 char c = *p; in selinux_sb_eat_lsm_opts() local 2663 if (c != '"') in selinux_sb_eat_lsm_opts() 2664 *q++ = c; in selinux_sb_eat_lsm_opts() 4106 static void selinux_cred_getsecid(const struct cred *c, u32 *secid) in selinux_cred_getsecid() argument 4108 *secid = cred_sid(c); in selinux_cred_getsecid()
|
/security/keys/ |
D | keyctl_pkey.c | 42 char *c = params->info, *p, *q; in keyctl_pkey_params_parse() local 45 while ((p = strsep(&c, " \t"))) { in keyctl_pkey_params_parse()
|
/security/integrity/ima/ |
D | ima_template.c | 190 char c; in template_fmt_size() local 195 c = template_fmt[i]; in template_fmt_size() 196 if (c == '|') in template_fmt_size()
|
/security/apparmor/ |
D | policy_unpack.c | 497 int c, j, pos, size2 = unpack_strdup(e, &str, NULL); in unpack_trans_table() local 509 for (c = j = 0; j < size2 - 1; j++) { in unpack_trans_table() 512 c++; in unpack_trans_table() 525 if (c == 1) in unpack_trans_table() 527 else if (c > 1) in unpack_trans_table() 529 } else if (c) in unpack_trans_table()
|
D | match.c | 519 const char c) in aa_dfa_next() argument 530 match_char(state, def, base, next, check, equiv[(u8) c]); in aa_dfa_next() 532 match_char(state, def, base, next, check, (u8) c); in aa_dfa_next()
|
D | Kconfig | 73 bool "Build KUnit tests for policy_unpack.c" if !KUNIT_ALL_TESTS
|