Searched refs:type (Results 26 - 50 of 64) sorted by last modified time

123

/security/keys/
H A Dkey.c196 * key_alloc - Allocate a key of the specified type.
197 * @type: The type of key to allocate.
205 * Allocate a key of the specified type with the attributes given. The key is
210 * the user's key data quota has the default for the key type reserved. The
219 * Note that the caller needs to ensure the key type isn't uninstantiated.
221 * be done by either never unregistering the key type, or making sure
224 struct key *key_alloc(struct key_type *type, const char *desc, argument
237 if (type->vet_description) {
238 ret = type
661 key_type_lookup(const char *type) argument
775 key_create_or_update(key_ref_t keyring_ref, const char *type, const char *description, const void *payload, size_t plen, key_perm_t perm, unsigned long flags) argument
[all...]
H A Dkeyctl.c31 static int key_get_type_from_user(char *type, argument
37 ret = strncpy_from_user(type, _type, len);
42 if (type[0] == '.')
44 type[len - 1] = '\0';
52 * If the description is NULL or an empty string, the key type is asked to
67 char type[32], *description; local
77 ret = key_get_type_from_user(type, _type, sizeof(type));
92 (strncmp(type, "keyring", 7) == 0)) {
128 key_ref = key_create_or_update(keyring_ref, type, descriptio
173 char type[32], *description, *callout_info; local
640 char type[32], *description; local
[all...]
H A Dkeyring.c19 #include <keys/keyring-type.h>
20 #include <keys/user-type.h>
53 if (key->type == &key_type_keyring)
72 * The keyring key type definition. Keyrings are simply keys of this type and
169 * Hash a key type and description.
176 unsigned long hash, type; local
181 type = (unsigned long)index_key->type;
183 acc = mult_64x32_and_fold(type, desc_le
889 keyring_search(key_ref_t keyring, struct key_type *type, const char *description) argument
[all...]
H A Dpersistent.c85 index_key.type = &key_type_keyring;
157 if (key_ref_to_ptr(dest_ref)->type != &key_type_keyring) {
H A Dproc.c194 .index_key.type = key->type,
266 key->type->name);
270 if (key->type->describe)
271 key->type->describe(key, m);
H A Dprocess_keys.c305 * The search criteria are the type and the match function. The description is
452 ctx->index_key.type != &key_type_request_key_auth
674 ctx.index_key.type = key->type;
H A Drequest_key.c231 if (key->type->request_key)
232 actor = key->type->request_key;
343 ctx->index_key.type->name, ctx->index_key.description);
350 if (ctx->index_key.type->read)
352 if (ctx->index_key.type == &key_type_keyring ||
353 ctx->index_key.type->update)
356 key = key_alloc(ctx->index_key.type, ctx->index_key.description,
479 * @type: The type of key we want.
504 struct key *request_key_and_link(struct key_type *type, argument
615 request_key(struct key_type *type, const char *description, const char *callout_info) argument
652 request_key_with_auxdata(struct key_type *type, const char *description, const void *callout_info, size_t callout_len, void *aux) argument
688 request_key_async(struct key_type *type, const char *description, const void *callout_info, size_t callout_len) argument
713 request_key_async_with_auxdata(struct key_type *type, const char *description, const void *callout_info, size_t callout_len, void *aux) argument
[all...]
H A Drequest_key_auth.c21 #include <keys/user-type.h>
33 * The request-key authorisation key type definition.
246 .index_key.type = &key_type_request_key_auth,
H A Dtrusted.c21 #include <keys/user-type.h>
22 #include <keys/trusted-type.h>
23 #include <linux/key-type.h>
394 const unsigned char *key, uint16_t type, uint32_t handle)
408 store16(tb, type);
893 * random key, then seal and create a trusted key-type key,
393 osap(struct tpm_buf *tb, struct osapsess *s, const unsigned char *key, uint16_t type, uint32_t handle) argument
H A Duser_defined.c1 /* user_defined.c: user defined key type
17 #include <keys/user-type.h>
42 * This key type is essentially the same as key_type_user, but it does
/security/
H A Dlsm_audit.c226 switch (a->type) {
397 } /* switch (a->type) */
H A Dsecurity.c209 int security_quotactl(int cmds, int type, int id, struct super_block *sb) argument
211 return security_ops->quotactl(cmds, type, id, sb);
219 int security_syslog(int type) argument
221 return security_ops->syslog(type);
301 const char *type, unsigned long flags, void *data)
303 return security_ops->sb_mount(dev_name, path, type, flags, data);
1032 struct task_struct *target, long type, int mode)
1034 return security_ops->msg_queue_msgrcv(msq, msg, target, type, mode);
1167 int security_socket_create(int family, int type, int protocol, int kern) argument
1169 return security_ops->socket_create(family, type, protoco
300 security_sb_mount(const char *dev_name, struct path *path, const char *type, unsigned long flags, void *data) argument
1031 security_msg_queue_msgrcv(struct msg_queue *msq, struct msg_msg *msg, struct task_struct *target, long type, int mode) argument
1172 security_socket_post_create(struct socket *sock, int family, int type, int protocol, int kern) argument
[all...]
/security/selinux/
H A Davc.c237 static struct operation_decision *avc_operation_lookup(u8 type, argument
244 if (od_node->od.type != type)
273 u8 type; local
276 type = cmd >> 8;
278 security_operation_set(node->ops.type, type);
279 od = avc_operation_lookup(type, node);
316 dest->type = src->type;
1034 u8 type = cmd >> 8; local
[all...]
H A Dhooks.c430 printk(KERN_WARNING "SELinux: (dev %s, type %s) has no "
438 printk(KERN_WARNING "SELinux: (dev %s, type "
442 printk(KERN_WARNING "SELinux: (dev %s, type "
450 printk(KERN_ERR "SELinux: initialized (dev %s, type %s), unknown behavior\n",
453 printk(KERN_DEBUG "SELinux: initialized (dev %s, type %s), %s\n",
676 "(%s) failed for (dev %s, type %s) errno=%d\n",
744 * filesystem type.
808 "invalid for this filesystem type\n");
829 "security settings for (dev %s, type %s)\n", sb->s_id, name);
859 "type
1168 socket_type_to_security_class(int family, int type, int protocol) argument
2067 selinux_quotactl(int cmds, int type, int id, struct super_block *sb) argument
2102 selinux_syslog(int type) argument
2686 selinux_mount(const char *dev_name, struct path *path, const char *type, unsigned long flags, void *data) argument
4071 selinux_socket_create(int family, int type, int protocol, int kern) argument
4090 selinux_socket_post_create(struct socket *sock, int family, int type, int protocol, int kern) argument
5358 selinux_msg_queue_msgrcv(struct msg_queue *msq, struct msg_msg *msg, struct task_struct *target, long type, int mode) argument
[all...]
H A Dnetlabel.c192 * @type: NetLabel labeling protocol type
203 u32 *type,
220 *type = secattr.type;
201 selinux_netlbl_skbuff_getsid(struct sk_buff *skb, u16 family, u32 *type, u32 *sid) argument
/security/selinux/include/
H A Dnetlabel.h50 u32 *type,
95 u32 *type,
98 *type = NETLBL_NLTYPE_NONE;
93 selinux_netlbl_skbuff_getsid(struct sk_buff *skb, u16 family, u32 *type, u32 *sid) argument
H A Dsecurity.h121 u8 type; member in struct:operation_decision
135 u32 type[8]; /* 256 types */ member in struct:operation
146 u8 type, struct operation_decision *od);
/security/selinux/ss/
H A Davtab.c2 * Implementation of the access vector table type.
392 printk(KERN_ERR "SELinux: avtab: truncated source type\n");
398 printk(KERN_ERR "SELinux: avtab: truncated target type\n");
456 printk(KERN_ERR "SELinux: avtab: invalid type or class\n");
480 rc = next_entry(&ops.type, fp, sizeof(u8));
496 printk(KERN_ERR "SELinux: avtab: invalid type\n");
568 rc = put_entry(&cur->datum.u.ops->type, sizeof(u8), 1, fp);
H A Davtab.h4 * by a type pair and a class. An access vector
5 * table is used to represent the type enforcement
29 u16 source_type; /* source type */
30 u16 target_type; /* target type */
59 u8 type; member in struct:avtab_operation
65 u32 data; /* access vector or type value */
H A Dcontext.h24 * identity, a role, a type and a MLS range.
29 u32 type; member in struct:context
123 dst->type = src->type;
143 c->user = c->role = c->type = 0;
158 (c1->type == c2->type) &&
H A Dmls.c523 rtr.source_type = scontext->type;
524 rtr.target_type = tcontext->type;
H A Dpolicydb.c933 int policydb_type_isvalid(struct policydb *p, unsigned int type) argument
935 if (!type || type > p->p_types.nprim)
955 if (!c->type || c->type > p->p_types.nprim)
960 * Role must be authorized for the type.
963 if (!ebitmap_get_bit(&role->types, c->type - 1))
964 /* role may not be associated with type */
1062 c->type = le32_to_cpu(buf[2]);
1735 "role=%s type
[all...]
H A Dpolicydb.h38 * A datum type is defined for each kind of symbol
63 /* Options how a new object user, role, and type should be decided */
89 u32 type; /* program executable type, or new object type */ member in struct:role_trans
114 u32 value; /* internal type value */
115 u32 bounds; /* boundary of type */
148 /* Boolean data type */
150 __u32 value; /* internal type value */
157 * type se
[all...]
H A Dservices.c31 * Added support for runtime switching of the policy type
310 val1 = scontext->type;
311 val2 = tcontext->type;
418 val1 = c->type;
553 scontext->type - 1);
557 tcontext->type - 1);
564 lo_scontext.type = source->bounds;
580 lo_tcontext.type = target->bounds;
624 u8 type; local
629 for (i = 0; i < ARRAY_SIZE(ops->type);
857 struct type_datum *type; local
983 security_compute_operation(u32 ssid, u32 tsid, u16 orig_tclass, u8 type, struct operation_decision *od) argument
[all...]
/security/smack/
H A Dsmack.h351 char type)
354 a->a.type = type;
360 char type, struct lsm_network_audit *net)
362 smk_ad_init(a, func, type);
396 char type)
350 smk_ad_init(struct smk_audit_info *a, const char *func, char type) argument
359 smk_ad_init_net(struct smk_audit_info *a, const char *func, char type, struct lsm_network_audit *net) argument
395 smk_ad_init(struct smk_audit_info *a, const char *func, char type) argument

Completed in 219 milliseconds

123