/openbmc/linux/fs/ceph/ |
H A D | crypto.c | 75 u32 ctxlen; in ceph_crypt_get_context() local 85 ctxlen = le32_to_cpu(cfa->cfa_blob_len); in ceph_crypt_get_context() 86 if (len < ctxlen) in ceph_crypt_get_context() 89 memcpy(ctx, cfa->cfa_blob, ctxlen); in ceph_crypt_get_context() 90 return ctxlen; in ceph_crypt_get_context()
|
/openbmc/linux/include/linux/ |
H A D | security.h | 326 u32 *ctxlen); 485 int security_inode_notifysecctx(struct inode *inode, void *ctx, u32 ctxlen); 486 int security_inode_setsecctx(struct dentry *dentry, void *ctx, u32 ctxlen); 487 int security_inode_getsecctx(struct inode *inode, void **ctx, u32 *ctxlen); 757 u32 *ctxlen) in security_dentry_init_security() argument 1391 static inline int security_inode_notifysecctx(struct inode *inode, void *ctx, u32 ctxlen) in security_inode_notifysecctx() argument 1395 static inline int security_inode_setsecctx(struct dentry *dentry, void *ctx, u32 ctxlen) in security_inode_setsecctx() argument 1399 static inline int security_inode_getsecctx(struct inode *inode, void **ctx, u32 *ctxlen) in security_inode_getsecctx() argument
|
H A D | lsm_hook_defs.h | 86 void **ctx, u32 *ctxlen) 276 LSM_HOOK(int, 0, inode_notifysecctx, struct inode *inode, void *ctx, u32 ctxlen) 277 LSM_HOOK(int, 0, inode_setsecctx, struct dentry *dentry, void *ctx, u32 ctxlen) 279 u32 *ctxlen)
|
/openbmc/linux/fs/fuse/ |
H A D | dir.c | 470 u32 ctxlen, total_len = sizeof(*header); in get_security_context() local 476 &name, &ctx, &ctxlen); in get_security_context() 481 ctxlen = 0; in get_security_context() 485 if (ctxlen) { in get_security_context() 489 if (WARN_ON(namelen > XATTR_NAME_MAX + 1 || ctxlen > S32_MAX)) in get_security_context() 491 total_len += FUSE_REC_ALIGN(sizeof(*fctx) + namelen + ctxlen); in get_security_context() 504 fctx->size = ctxlen; in get_security_context() 510 memcpy(ptr, ctx, ctxlen); in get_security_context()
|
/openbmc/linux/security/ |
H A D | security.c | 1554 u32 *ctxlen) in security_dentry_init_security() argument 1565 xattr_name, ctx, ctxlen); in security_dentry_init_security() 3992 int security_inode_notifysecctx(struct inode *inode, void *ctx, u32 ctxlen) in security_inode_notifysecctx() argument 3994 return call_int_hook(inode_notifysecctx, 0, inode, ctx, ctxlen); in security_inode_notifysecctx() 4014 int security_inode_setsecctx(struct dentry *dentry, void *ctx, u32 ctxlen) in security_inode_setsecctx() argument 4016 return call_int_hook(inode_setsecctx, 0, dentry, ctx, ctxlen); in security_inode_setsecctx() 4031 int security_inode_getsecctx(struct inode *inode, void **ctx, u32 *ctxlen) in security_inode_getsecctx() argument 4040 rc = hp->hook.inode_getsecctx(inode, ctx, ctxlen); in security_inode_getsecctx()
|
/openbmc/linux/security/smack/ |
H A D | smack_lsm.c | 4773 static int smack_inode_notifysecctx(struct inode *inode, void *ctx, u32 ctxlen) in smack_inode_notifysecctx() argument 4776 ctxlen, 0); in smack_inode_notifysecctx() 4779 static int smack_inode_setsecctx(struct dentry *dentry, void *ctx, u32 ctxlen) in smack_inode_setsecctx() argument 4782 ctx, ctxlen, 0, NULL); in smack_inode_setsecctx() 4785 static int smack_inode_getsecctx(struct inode *inode, void **ctx, u32 *ctxlen) in smack_inode_getsecctx() argument 4790 *ctxlen = strlen(skp->smk_known); in smack_inode_getsecctx()
|
/openbmc/linux/security/selinux/ |
H A D | hooks.c | 2860 u32 *ctxlen) in selinux_dentry_init_security() argument 2876 ctxlen); in selinux_dentry_init_security() 6543 static int selinux_inode_notifysecctx(struct inode *inode, void *ctx, u32 ctxlen) in selinux_inode_notifysecctx() argument 6546 ctx, ctxlen, 0); in selinux_inode_notifysecctx() 6554 static int selinux_inode_setsecctx(struct dentry *dentry, void *ctx, u32 ctxlen) in selinux_inode_setsecctx() argument 6557 ctx, ctxlen, 0, NULL); in selinux_inode_setsecctx() 6560 static int selinux_inode_getsecctx(struct inode *inode, void **ctx, u32 *ctxlen) in selinux_inode_getsecctx() argument 6567 *ctxlen = len; in selinux_inode_getsecctx()
|