Lines Matching refs:params
47 static struct verified_exec_params *params = &lparams.params; variable
50 static struct verified_exec_params *params = &oparams; variable
127 strlcpy(params->fp_type, $1, sizeof(params->fp_type));
129 params->fingerprint) < 0) {
141 params->flags |= VERIEXEC_LABEL;
160 params->flags |= VERIEXEC_INDIRECT;
162 params->flags |= VERIEXEC_NOTRACE;
164 params->flags |= VERIEXEC_TRUSTED;
167 params->flags |= VERIEXEC_NOFIPS;
184 if (snprintf(params->file, sizeof(params->file), "%s%s%s",
187 $1) >= (int)sizeof(params->file)) {
190 params->flags = 0;
199 params->fp_type[0] = '\0'; /* invalidate it */
207 params->fp_type[0] = '\0'; /* invalidate it */
263 if (params->fp_type[0] == '\0') { in do_ioctl()
264 VERBOSE(1,("skipping %s\n", params->file)); in do_ioctl()
273 params->flags |= VERIEXEC_FILE; in do_ioctl()
275 } else if (stat(params->file, &st) == 0) { in do_ioctl()
277 params->flags |= VERIEXEC_FILE; in do_ioctl()
283 params->flags |= ForceFlags; in do_ioctl()
285 params->fp_type, in do_ioctl()
286 (params->flags == VERIEXEC_FILE) ? "file" : "executable", in do_ioctl()
287 params->file, params->flags)); in do_ioctl()
290 if (params->flags & VERIEXEC_LABEL) { in do_ioctl()
293 params->file); in do_ioctl()
296 if (ioctl(dev_fd, VERIEXEC_SIGNED_LOAD, params) < 0) in do_ioctl()
297 warn("cannot update veriexec for %s", params->file); in do_ioctl()
298 params->fp_type[0] = '\0'; in do_ioctl()