Searched refs:type (Results 51 - 64 of 64) sorted by relevance
123
/security/keys/ |
H A D | trusted.c | 21 #include <keys/user-type.h> 22 #include <keys/trusted-type.h> 23 #include <linux/key-type.h> 394 const unsigned char *key, uint16_t type, uint32_t handle) 408 store16(tb, type); 893 * random key, then seal and create a trusted key-type key, 393 osap(struct tpm_buf *tb, struct osapsess *s, const unsigned char *key, uint16_t type, uint32_t handle) argument
|
H A D | process_keys.c | 305 * The search criteria are the type and the match function. The description is 452 ctx->index_key.type != &key_type_request_key_auth 674 ctx.index_key.type = key->type;
|
/security/integrity/ima/ |
H A D | ima_template_lib.c | 335 if ((!xattr_value) || (xattr_value->type != EVM_IMA_XATTR_DIGSIG))
|
/security/keys/encrypted-keys/ |
H A D | encrypted.c | 24 #include <keys/user-type.h> 25 #include <keys/trusted-type.h> 26 #include <keys/encrypted-type.h> 27 #include <linux/key-type.h> 131 * valid_master_desc - verify the 'key-type:desc' of a new/updated master-key 133 * key-type:= "trusted:" | "user:" 136 * Verify that 'key-type' is valid and that 'desc' exists. On key update, 137 * only the master key description is permitted to change, not the key-type. 138 * The key-type remains constant.
|
/security/selinux/ss/ |
H A D | avtab.c | 2 * Implementation of the access vector table type. 392 printk(KERN_ERR "SELinux: avtab: truncated source type\n"); 398 printk(KERN_ERR "SELinux: avtab: truncated target type\n"); 456 printk(KERN_ERR "SELinux: avtab: invalid type or class\n"); 480 rc = next_entry(&ops.type, fp, sizeof(u8)); 496 printk(KERN_ERR "SELinux: avtab: invalid type\n"); 568 rc = put_entry(&cur->datum.u.ops->type, sizeof(u8), 1, fp);
|
H A D | mls.c | 523 rtr.source_type = scontext->type; 524 rtr.target_type = tcontext->type;
|
H A D | policydb.c | 933 int policydb_type_isvalid(struct policydb *p, unsigned int type) argument 935 if (!type || type > p->p_types.nprim) 955 if (!c->type || c->type > p->p_types.nprim) 960 * Role must be authorized for the type. 963 if (!ebitmap_get_bit(&role->types, c->type - 1)) 964 /* role may not be associated with type */ 1062 c->type = le32_to_cpu(buf[2]); 1735 "role=%s type [all...] |
/security/ |
H A D | lsm_audit.c | 226 switch (a->type) { 397 } /* switch (a->type) */
|
/security/tomoyo/ |
H A D | audit.c | 109 * tomoyo_filetype - Get string representation of file type. 113 * Returns file type string. 205 " minor=%u perm=0%o type=%s", (i >> 1) + 1, 364 if (!tomoyo_get_audit(r->domain->ns, r->profile, r->type,
|
/security/apparmor/ |
H A D | policy_unpack.c | 33 * The AppArmor interface treats data as a type byte followed by the 98 sa.type = LSM_AUDIT_DATA_NONE; 151 * unpack_nameX - check is the next element is of type X with a name of @name 153 * @code: type code 156 * check that the next serialized data element is of type X and has a tag 161 * Returns 1 on success (both type code and name tests match) and the read 169 * May need to reset pos if name or type doesn't match 187 /* now check if type code matches */
|
H A D | lsm.c | 596 sa.type = LSM_AUDIT_DATA_NONE;
|
H A D | policy.c | 908 sa.type = LSM_AUDIT_DATA_NONE;
|
/security/smack/ |
H A D | smack_lsm.c | 429 * @type: message type 2433 * @type: unused 2442 int type, int protocol, int kern) 2941 * @type: unused 2947 struct task_struct *target, long type, int mode) 3943 if (f->type == AUDIT_SUBJ_USER || f->type == AUDIT_OBJ_USER) 2441 smack_socket_post_create(struct socket *sock, int family, int type, int protocol, int kern) argument 2946 smack_msg_queue_msgrcv(struct msg_queue *msq, struct msg_msg *msg, struct task_struct *target, long type, int mode) argument
|
H A D | smackfs.c | 730 doip->type = CIPSO_V4_MAP_PASS;
|
Completed in 269 milliseconds
123