summaryrefslogtreecommitdiffstats
path: root/util
ModeNameSize
-rw-r--r--add-depends.pl14286logstatsplain
-rw-r--r--build.info208logstatsplain
-rwxr-xr-xc-compress-test.pl1043logstatsplain
-rw-r--r--cavs-to-evptest.pl3225logstatsplain
-rw-r--r--check-format-test-negatives.c15249logstatsplain
-rw-r--r--check-format-test-positives.c11069logstatsplain
-rwxr-xr-xcheck-format.pl70009logstatsplain
-rwxr-xr-xcheck-malloc-errs548logstatsplain
-rwxr-xr-xck_errf.pl4358logstatsplain
-rw-r--r--copy.pl1615logstatsplain
-rwxr-xr-xctags.sh2595logstatsplain
-rw-r--r--dofile.pl3524logstatsplain
-rw-r--r--echo.pl178logstatsplain
-rw-r--r--engines.num120logstatsplain
-rwxr-xr-xerr-to-raise818logstatsplain
-rwxr-xr-xfind-doc-nits43001logstatsplain
-rwxr-xr-xfind-unused-errs1365logstatsplain
-rwxr-xr-xfips-checksums.sh981logstatsplain
-rw-r--r--fix-deprecation3579logstatsplain
-rwxr-xr-xfix-includes582logstatsplain
-rw-r--r--fix-includes.sed502logstatsplain
-rwxr-xr-xhelp.pl776logstatsplain
-rw-r--r--indent.pro11155logstatsplain
-rwxr-xr-xlang-compress.pl4883logstatsplain
-rw-r--r--libcrypto.num398287logstatsplain
-rw-r--r--libssl.num39878logstatsplain
-rw-r--r--markdownlint.rb1255logstatsplain
-rwxr-xr-xmerge-err-lines969logstatsplain
-rw-r--r--missingcrypto-internal.txt150logstatsplain
-rw-r--r--missingcrypto.txt31692logstatsplain
-rw-r--r--missingcrypto111.txt40182logstatsplain
-rw-r--r--missingmacro.txt4181logstatsplain
-rw-r--r--missingmacro111.txt6015logstatsplain
-rw-r--r--missingssl-internal.txt0logstatsplain
-rw-r--r--missingssl.txt905logstatsplain
-rw-r--r--missingssl111.txt1616logstatsplain
-rw-r--r--mk-fipsmodule-cnf.pl1624logstatsplain
-rwxr-xr-xmkbuildinf.pl1506logstatsplain
-rwxr-xr-xmkdef.pl12560logstatsplain
-rwxr-xr-xmkdir-p.pl1001logstatsplain
-rwxr-xr-xmkerr.pl21200logstatsplain
-rw-r--r--mknum.pl4932logstatsplain
-rwxr-xr-xmkpod2html.pl1701logstatsplain
-rwxr-xr-xmkrc.pl2123logstatsplain
-rwxr-xr-xmktar.sh1398logstatsplain
-rwxr-xr-xopensslwrap.sh1110logstatsplain
-rw-r--r--other-internal.syms219logstatsplain
-rw-r--r--other.syms35109logstatsplain
d---------perl114logstatsplain
-rw-r--r--providers.num60logstatsplain
-rwxr-xr-xshlib_wrap.sh.in5171logstatsplain
-rw-r--r--su-filter.pl6594logstatsplain
-rwxr-xr-xwithlibctx.pl3728logstatsplain
-rw-r--r--wrap.pl.in3906logstatsplain
-rwxr-xr-xwrite-man-symlinks1264logstatsplain
pan>rcu_head *entry) { struct netlbl_dom_map *ptr; struct netlbl_af4list *iter4; struct netlbl_af4list *tmp4; #if defined(CONFIG_IPV6) || defined(CONFIG_IPV6_MODULE) struct netlbl_af6list *iter6; struct netlbl_af6list *tmp6; #endif /* IPv6 */ ptr = container_of(entry, struct netlbl_dom_map, rcu); if (ptr->type == NETLBL_NLTYPE_ADDRSELECT) { netlbl_af4list_foreach_safe(iter4, tmp4, &ptr->type_def.addrsel->list4) { netlbl_af4list_remove_entry(iter4); kfree(netlbl_domhsh_addr4_entry(iter4)); } #if defined(CONFIG_IPV6) || defined(CONFIG_IPV6_MODULE) netlbl_af6list_foreach_safe(iter6, tmp6, &ptr->type_def.addrsel->list6) { netlbl_af6list_remove_entry(iter6); kfree(netlbl_domhsh_addr6_entry(iter6)); } #endif /* IPv6 */ } kfree(ptr->domain); kfree(ptr); } /** * netlbl_domhsh_hash - Hashing function for the domain hash table * @domain: the domain name to hash * * Description: * This is the hashing function for the domain hash table, it returns the * correct bucket number for the domain. The caller is responsibile for * calling the rcu_read_[un]lock() functions. * */ static u32 netlbl_domhsh_hash(const char *key) { u32 iter; u32 val; u32 len; /* This is taken (with slight modification) from * security/selinux/ss/symtab.c:symhash() */ for (iter = 0, val = 0, len = strlen(key); iter < len; iter++) val = (val << 4 | (val >> (8 * sizeof(u32) - 4))) ^ key[iter]; return val & (rcu_dereference(netlbl_domhsh)->size - 1); } /** * netlbl_domhsh_search - Search for a domain entry * @domain: the domain * * Description: * Searches the domain hash table and returns a pointer to the hash table * entry if found, otherwise NULL is returned. The caller is responsibile for * the rcu hash table locks (i.e. the caller much call rcu_read_[un]lock()). * */ static struct netlbl_dom_map *netlbl_domhsh_search(const char *domain) { u32 bkt; struct list_head *bkt_list; struct netlbl_dom_map *iter; if (domain != NULL) { bkt = netlbl_domhsh_hash(domain); bkt_list = &rcu_dereference(netlbl_domhsh)->tbl[bkt]; list_for_each_entry_rcu(iter, bkt_list, list) if (iter->valid && strcmp(iter->domain, domain) == 0) return iter; } return NULL; } /** * netlbl_domhsh_search_def - Search for a domain entry * @domain: the domain * @def: return default if no match is found * * Description: * Searches the domain hash table and returns a pointer to the hash table * entry if an exact match is found, if an exact match is not present in the * hash table then the default entry is returned if valid otherwise NULL is * returned. The caller is responsibile for the rcu hash table locks * (i.e. the caller much call rcu_read_[un]lock()). * */ static struct netlbl_dom_map *netlbl_domhsh_search_def(const char *domain) { struct netlbl_dom_map *entry; entry = netlbl_domhsh_search(domain); if (entry == NULL) { entry = rcu_dereference(netlbl_domhsh_def); if (entry != NULL && !entry->valid) entry = NULL; } return entry; } /** * netlbl_domhsh_audit_add - Generate an audit entry for an add event * @entry: the entry being added * @addr4: the IPv4 address information * @addr6: the IPv6 address information * @result: the result code * @audit_info: NetLabel audit information * * Description: * Generate an audit record for adding a new NetLabel/LSM mapping entry with * the given information. Caller is responsibile for holding the necessary * locks. * */ static void netlbl_domhsh_audit_add(struct netlbl_dom_map *entry, struct netlbl_af4list *addr4, struct netlbl_af6list *addr6, int result, struct netlbl_audit *audit_info) { struct audit_buffer *audit_buf; struct cipso_v4_doi *cipsov4 = NULL; u32 type; audit_buf = netlbl_audit_start_common(AUDIT_MAC_MAP_ADD, audit_info); if (audit_buf != NULL) { audit_log_format(audit_buf, " nlbl_domain=%s", entry->domain ? entry->domain : "(default)"); if (addr4 != NULL) { struct netlbl_domaddr4_map *map4; map4 = netlbl_domhsh_addr4_entry(addr4); type = map4->type; cipsov4 = map4->type_def.cipsov4; netlbl_af4list_audit_addr(audit_buf, 0, NULL, addr4->addr, addr4->mask); #if defined(CONFIG_IPV6) || defined(CONFIG_IPV6_MODULE) } else if (addr6 != NULL) { struct netlbl_domaddr6_map *map6; map6 = netlbl_domhsh_addr6_entry(addr6); type = map6->type; netlbl_af6list_audit_addr(audit_buf, 0, NULL, &addr6->addr, &addr6->mask); #endif /* IPv6 */ } else { type = entry->type; cipsov4 = entry->type_def.cipsov4; } switch (type) { case NETLBL_NLTYPE_UNLABELED: audit_log_format(audit_buf, " nlbl_protocol=unlbl"); break; case NETLBL_NLTYPE_CIPSOV4: BUG_ON(cipsov4 == NULL); audit_log_format(audit_buf, " nlbl_protocol=cipsov4 cipso_doi=%u", cipsov4->doi); break; } audit_log_format(audit_buf, " res=%u", result == 0 ? 1 : 0); audit_log_end(audit_buf); } } /* * Domain Hash Table Functions */ /** * netlbl_domhsh_init - Init for the domain hash * @size: the number of bits to use for the hash buckets * * D