| /security/ipe/ | 
| D | hooks.c | 205 	struct ipe_bdev *blob = ipe_bdev(bdev);  in ipe_bdev_free_security()  local 207 	ipe_digest_free(blob->root_hash);  in ipe_bdev_free_security() 211 static void ipe_set_dmverity_signature(struct ipe_bdev *blob,  in ipe_set_dmverity_signature()  argument 215 	blob->dm_verity_signed = size > 0 && value;  in ipe_set_dmverity_signature() 218 static inline void ipe_set_dmverity_signature(struct ipe_bdev *blob,  in ipe_set_dmverity_signature()  argument 242 	struct ipe_bdev *blob = ipe_bdev(bdev);  in ipe_bdev_setintegrity()  local 246 		ipe_set_dmverity_signature(blob, value, size);  in ipe_bdev_setintegrity() 255 		ipe_digest_free(blob->root_hash);  in ipe_bdev_setintegrity() 256 		blob->root_hash = NULL;  in ipe_bdev_setintegrity() 276 	ipe_digest_free(blob->root_hash);  in ipe_bdev_setintegrity() [all …] 
 | 
| /security/keys/trusted-keys/ | 
| D | trusted_tpm2.c | 84 	work1 = payload->blob;  in tpm2_key_encode() 85 	work1 = asn1_encode_sequence(work1, work1 + sizeof(payload->blob),  in tpm2_key_encode() 94 	return work1 - payload->blob;  in tpm2_key_encode() 115 	u8 *blob;  in tpm2_key_decode()  local 119 	ret = asn1_ber_decoder(&tpm2key_decoder, &ctx, payload->blob,  in tpm2_key_decode() 127 	blob = kmalloc(ctx.priv_len + ctx.pub_len + 4, GFP_KERNEL);  in tpm2_key_decode() 128 	if (!blob)  in tpm2_key_decode() 131 	*buf = blob;  in tpm2_key_decode() 134 	memcpy(blob, ctx.priv, ctx.priv_len);  in tpm2_key_decode() 135 	blob += ctx.priv_len;  in tpm2_key_decode() [all …] 
 | 
| D | trusted_caam.c | 24 		.output = p->blob, .output_len  = MAX_BLOB_SIZE,  in trusted_caam_seal() 40 		.input   = p->blob,  .input_len  = p->blob_len,  in trusted_caam_unseal()
  | 
| D | trusted_tee.c | 74 					      sizeof(p->key) + sizeof(p->blob));  in trusted_tee_seal() 90 	param[1].u.memref.size = sizeof(p->blob);  in trusted_tee_seal() 121 					      sizeof(p->key) + sizeof(p->blob));  in trusted_tee_unseal()
  | 
| D | trusted_tpm1.c | 471 		    unsigned char *blob, uint32_t *bloblen,  in tpm_seal()  argument 575 		memcpy(blob, tb->data + TPM_DATA_OFFSET, storedsize);  in tpm_seal() 588 		      const unsigned char *blob, int bloblen,  in tpm_unseal()  argument 626 			   &ordinal, bloblen, blob, 0, 0);  in tpm_unseal() 631 			   &ordinal, bloblen, blob, 0, 0);  in tpm_unseal() 638 	tpm_buf_append(tb, blob, bloblen);  in tpm_unseal() 686 		       p->key, p->key_len + 1, p->blob, &p->blob_len,  in key_seal() 708 	ret = tpm_unseal(&tb, o->keyhandle, o->keyauth, p->blob, p->blob_len,  in key_unseal()
  | 
| D | trusted_dcp.c | 202 	struct dcp_blob_fmt *b = (struct dcp_blob_fmt *)p->blob;  in trusted_dcp_seal() 244 	struct dcp_blob_fmt *b = (struct dcp_blob_fmt *)p->blob;  in trusted_dcp_unseal()
  | 
| D | trusted_core.c | 110 		ret = hex2bin(p->blob, c, p->blob_len);  in datablob_parse() 304 			bufp = hex_byte_pack(bufp, p->blob[i]);  in trusted_read()
  | 
| /security/apparmor/include/ | 
| D | cred.h | 24 	struct aa_label **blob = cred->security + apparmor_blob_sizes.lbs_cred;  in cred_label()  local 26 	AA_BUG(!blob);  in cred_label() 27 	return *blob;  in cred_label() 33 	struct aa_label **blob = cred->security + apparmor_blob_sizes.lbs_cred;  in set_cred_label()  local 35 	AA_BUG(!blob);  in set_cred_label() 36 	*blob = label;  in set_cred_label()
  | 
| D | policy_unpack.h | 176 size_t aa_unpack_blob(struct aa_ext *e, char **blob, const char *name);
  | 
| D | match.h | 124 struct aa_dfa *aa_dfa_unpack(void *blob, size_t size, int flags);
  | 
| /security/apparmor/ | 
| D | match.c | 33 static struct table_header *unpack_table(char *blob, size_t bsize)  in unpack_table()  argument 45 	th.td_id = be16_to_cpu(*(__be16 *) (blob)) - 1;  in unpack_table() 48 	th.td_flags = be16_to_cpu(*(__be16 *) (blob + 2));  in unpack_table() 49 	th.td_lolen = be32_to_cpu(*(__be32 *) (blob + 8));  in unpack_table() 50 	blob += sizeof(struct table_header);  in unpack_table() 69 			UNPACK_ARRAY(table->td_data, blob, th.td_lolen,  in unpack_table() 72 			UNPACK_ARRAY(table->td_data, blob, th.td_lolen,  in unpack_table() 75 			UNPACK_ARRAY(table->td_data, blob, th.td_lolen,  in unpack_table() 262 struct aa_dfa *aa_dfa_unpack(void *blob, size_t size, int flags)  in aa_dfa_unpack()  argument 266 	char *data = blob;  in aa_dfa_unpack()
  | 
| D | policy_unpack_test.c | 188 	char *blob = NULL;  in policy_unpack_test_unpack_blob_with_null_name()  local 192 	size = aa_unpack_blob(puf->e, &blob, NULL);  in policy_unpack_test_unpack_blob_with_null_name() 196 		memcmp(blob, TEST_BLOB_DATA, TEST_BLOB_DATA_SIZE) == 0);  in policy_unpack_test_unpack_blob_with_null_name() 202 	char *blob = NULL;  in policy_unpack_test_unpack_blob_with_name()  local 206 	size = aa_unpack_blob(puf->e, &blob, TEST_BLOB_NAME);  in policy_unpack_test_unpack_blob_with_name() 210 		memcmp(blob, TEST_BLOB_DATA, TEST_BLOB_DATA_SIZE) == 0);  in policy_unpack_test_unpack_blob_with_name() 216 	char *blob = NULL;  in policy_unpack_test_unpack_blob_out_of_bounds()  local 225 	size = aa_unpack_blob(puf->e, &blob, TEST_BLOB_NAME);  in policy_unpack_test_unpack_blob_out_of_bounds()
  | 
| D | policy_unpack.c | 349 VISIBLE_IF_KUNIT size_t aa_unpack_blob(struct aa_ext *e, char **blob, const char *name)  in aa_unpack_blob()  argument 360 			*blob = e->pos;  in aa_unpack_blob() 426 	char *blob = NULL;  in unpack_dfa()  local 430 	size = aa_unpack_blob(e, &blob, "aadfa");  in unpack_dfa() 437 		size_t sz = blob - (char *) e->start -  in unpack_dfa() 442 		dfa = aa_dfa_unpack(blob + pad, size - pad, flags);  in unpack_dfa()
  | 
| /security/smack/ | 
| D | smack_lsm.c | 1692 	struct smack_known **blob = smack_file(file);  in smack_file_alloc_security()  local 1694 	*blob = smk_of_current();  in smack_file_alloc_security() 1923 	struct smack_known **blob = smack_file(file);  in smack_file_set_fowner()  local 1925 	*blob = smk_of_current();  in smack_file_set_fowner() 1942 	struct smack_known **blob;  in smack_file_send_sigiotask()  local 1956 	blob = smack_file(file);  in smack_file_send_sigiotask() 1957 	skp = *blob;  in smack_file_send_sigiotask() 3098 	struct smack_known **blob = smack_msg_msg(msg);  in smack_msg_msg_alloc_security()  local 3100 	*blob = smk_of_current();  in smack_msg_msg_alloc_security() 3112 	struct smack_known **blob = smack_ipc(isp);  in smack_of_ipc()  local [all …] 
 | 
| /security/ | 
| D | security.c | 2888 	void *blob;  in security_file_free()  local 2892 	blob = file->f_security;  in security_file_free() 2893 	if (blob) {  in security_file_free() 2895 		kmem_cache_free(lsm_file_cache, blob);  in security_file_free()
  |