Searched refs:type (Results 51 - 64 of 64) sorted by relevance

123

/security/keys/
H A Dtrusted.c21 #include <keys/user-type.h>
22 #include <keys/trusted-type.h>
23 #include <linux/key-type.h>
394 const unsigned char *key, uint16_t type, uint32_t handle)
408 store16(tb, type);
893 * random key, then seal and create a trusted key-type key,
393 osap(struct tpm_buf *tb, struct osapsess *s, const unsigned char *key, uint16_t type, uint32_t handle) argument
H A Dprocess_keys.c305 * The search criteria are the type and the match function. The description is
452 ctx->index_key.type != &key_type_request_key_auth
674 ctx.index_key.type = key->type;
/security/integrity/ima/
H A Dima_template_lib.c335 if ((!xattr_value) || (xattr_value->type != EVM_IMA_XATTR_DIGSIG))
/security/keys/encrypted-keys/
H A Dencrypted.c24 #include <keys/user-type.h>
25 #include <keys/trusted-type.h>
26 #include <keys/encrypted-type.h>
27 #include <linux/key-type.h>
131 * valid_master_desc - verify the 'key-type:desc' of a new/updated master-key
133 * key-type:= "trusted:" | "user:"
136 * Verify that 'key-type' is valid and that 'desc' exists. On key update,
137 * only the master key description is permitted to change, not the key-type.
138 * The key-type remains constant.
/security/selinux/ss/
H A Davtab.c2 * Implementation of the access vector table type.
392 printk(KERN_ERR "SELinux: avtab: truncated source type\n");
398 printk(KERN_ERR "SELinux: avtab: truncated target type\n");
456 printk(KERN_ERR "SELinux: avtab: invalid type or class\n");
480 rc = next_entry(&ops.type, fp, sizeof(u8));
496 printk(KERN_ERR "SELinux: avtab: invalid type\n");
568 rc = put_entry(&cur->datum.u.ops->type, sizeof(u8), 1, fp);
H A Dmls.c523 rtr.source_type = scontext->type;
524 rtr.target_type = tcontext->type;
H A Dpolicydb.c933 int policydb_type_isvalid(struct policydb *p, unsigned int type) argument
935 if (!type || type > p->p_types.nprim)
955 if (!c->type || c->type > p->p_types.nprim)
960 * Role must be authorized for the type.
963 if (!ebitmap_get_bit(&role->types, c->type - 1))
964 /* role may not be associated with type */
1062 c->type = le32_to_cpu(buf[2]);
1735 "role=%s type
[all...]
/security/
H A Dlsm_audit.c226 switch (a->type) {
397 } /* switch (a->type) */
/security/tomoyo/
H A Daudit.c109 * tomoyo_filetype - Get string representation of file type.
113 * Returns file type string.
205 " minor=%u perm=0%o type=%s", (i >> 1) + 1,
364 if (!tomoyo_get_audit(r->domain->ns, r->profile, r->type,
/security/apparmor/
H A Dpolicy_unpack.c33 * The AppArmor interface treats data as a type byte followed by the
98 sa.type = LSM_AUDIT_DATA_NONE;
151 * unpack_nameX - check is the next element is of type X with a name of @name
153 * @code: type code
156 * check that the next serialized data element is of type X and has a tag
161 * Returns 1 on success (both type code and name tests match) and the read
169 * May need to reset pos if name or type doesn't match
187 /* now check if type code matches */
H A Dlsm.c596 sa.type = LSM_AUDIT_DATA_NONE;
H A Dpolicy.c908 sa.type = LSM_AUDIT_DATA_NONE;
/security/smack/
H A Dsmack_lsm.c429 * @type: message type
2433 * @type: unused
2442 int type, int protocol, int kern)
2941 * @type: unused
2947 struct task_struct *target, long type, int mode)
3943 if (f->type == AUDIT_SUBJ_USER || f->type == AUDIT_OBJ_USER)
2441 smack_socket_post_create(struct socket *sock, int family, int type, int protocol, int kern) argument
2946 smack_msg_queue_msgrcv(struct msg_queue *msq, struct msg_msg *msg, struct task_struct *target, long type, int mode) argument
H A Dsmackfs.c730 doip->type = CIPSO_V4_MAP_PASS;

Completed in 269 milliseconds

123