/security/keys/ |
H A D | key.c | 196 * key_alloc - Allocate a key of the specified type. 197 * @type: The type of key to allocate. 205 * Allocate a key of the specified type with the attributes given. The key is 210 * the user's key data quota has the default for the key type reserved. The 219 * Note that the caller needs to ensure the key type isn't uninstantiated. 221 * be done by either never unregistering the key type, or making sure 224 struct key *key_alloc(struct key_type *type, const char *desc, argument 237 if (type->vet_description) { 238 ret = type 661 key_type_lookup(const char *type) argument 775 key_create_or_update(key_ref_t keyring_ref, const char *type, const char *description, const void *payload, size_t plen, key_perm_t perm, unsigned long flags) argument [all...] |
H A D | keyctl.c | 31 static int key_get_type_from_user(char *type, argument 37 ret = strncpy_from_user(type, _type, len); 42 if (type[0] == '.') 44 type[len - 1] = '\0'; 52 * If the description is NULL or an empty string, the key type is asked to 67 char type[32], *description; local 77 ret = key_get_type_from_user(type, _type, sizeof(type)); 92 (strncmp(type, "keyring", 7) == 0)) { 128 key_ref = key_create_or_update(keyring_ref, type, descriptio 173 char type[32], *description, *callout_info; local 640 char type[32], *description; local [all...] |
H A D | keyring.c | 19 #include <keys/keyring-type.h> 20 #include <keys/user-type.h> 53 if (key->type == &key_type_keyring) 72 * The keyring key type definition. Keyrings are simply keys of this type and 169 * Hash a key type and description. 176 unsigned long hash, type; local 181 type = (unsigned long)index_key->type; 183 acc = mult_64x32_and_fold(type, desc_le 889 keyring_search(key_ref_t keyring, struct key_type *type, const char *description) argument [all...] |
H A D | persistent.c | 85 index_key.type = &key_type_keyring; 157 if (key_ref_to_ptr(dest_ref)->type != &key_type_keyring) {
|
H A D | proc.c | 194 .index_key.type = key->type, 266 key->type->name); 270 if (key->type->describe) 271 key->type->describe(key, m);
|
H A D | process_keys.c | 305 * The search criteria are the type and the match function. The description is 452 ctx->index_key.type != &key_type_request_key_auth 674 ctx.index_key.type = key->type;
|
H A D | request_key.c | 231 if (key->type->request_key) 232 actor = key->type->request_key; 343 ctx->index_key.type->name, ctx->index_key.description); 350 if (ctx->index_key.type->read) 352 if (ctx->index_key.type == &key_type_keyring || 353 ctx->index_key.type->update) 356 key = key_alloc(ctx->index_key.type, ctx->index_key.description, 479 * @type: The type of key we want. 504 struct key *request_key_and_link(struct key_type *type, argument 615 request_key(struct key_type *type, const char *description, const char *callout_info) argument 652 request_key_with_auxdata(struct key_type *type, const char *description, const void *callout_info, size_t callout_len, void *aux) argument 688 request_key_async(struct key_type *type, const char *description, const void *callout_info, size_t callout_len) argument 713 request_key_async_with_auxdata(struct key_type *type, const char *description, const void *callout_info, size_t callout_len, void *aux) argument [all...] |
H A D | request_key_auth.c | 21 #include <keys/user-type.h> 33 * The request-key authorisation key type definition. 246 .index_key.type = &key_type_request_key_auth,
|
H A D | trusted.c | 21 #include <keys/user-type.h> 22 #include <keys/trusted-type.h> 23 #include <linux/key-type.h> 394 const unsigned char *key, uint16_t type, uint32_t handle) 408 store16(tb, type); 893 * random key, then seal and create a trusted key-type key, 393 osap(struct tpm_buf *tb, struct osapsess *s, const unsigned char *key, uint16_t type, uint32_t handle) argument
|
H A D | user_defined.c | 1 /* user_defined.c: user defined key type 17 #include <keys/user-type.h> 42 * This key type is essentially the same as key_type_user, but it does
|
/security/ |
H A D | lsm_audit.c | 226 switch (a->type) { 397 } /* switch (a->type) */
|
H A D | security.c | 209 int security_quotactl(int cmds, int type, int id, struct super_block *sb) argument 211 return security_ops->quotactl(cmds, type, id, sb); 219 int security_syslog(int type) argument 221 return security_ops->syslog(type); 301 const char *type, unsigned long flags, void *data) 303 return security_ops->sb_mount(dev_name, path, type, flags, data); 1032 struct task_struct *target, long type, int mode) 1034 return security_ops->msg_queue_msgrcv(msq, msg, target, type, mode); 1167 int security_socket_create(int family, int type, int protocol, int kern) argument 1169 return security_ops->socket_create(family, type, protoco 300 security_sb_mount(const char *dev_name, struct path *path, const char *type, unsigned long flags, void *data) argument 1031 security_msg_queue_msgrcv(struct msg_queue *msq, struct msg_msg *msg, struct task_struct *target, long type, int mode) argument 1172 security_socket_post_create(struct socket *sock, int family, int type, int protocol, int kern) argument [all...] |
/security/selinux/ |
H A D | avc.c | 237 static struct operation_decision *avc_operation_lookup(u8 type, argument 244 if (od_node->od.type != type) 273 u8 type; local 276 type = cmd >> 8; 278 security_operation_set(node->ops.type, type); 279 od = avc_operation_lookup(type, node); 316 dest->type = src->type; 1034 u8 type = cmd >> 8; local [all...] |
H A D | hooks.c | 430 printk(KERN_WARNING "SELinux: (dev %s, type %s) has no " 438 printk(KERN_WARNING "SELinux: (dev %s, type " 442 printk(KERN_WARNING "SELinux: (dev %s, type " 450 printk(KERN_ERR "SELinux: initialized (dev %s, type %s), unknown behavior\n", 453 printk(KERN_DEBUG "SELinux: initialized (dev %s, type %s), %s\n", 676 "(%s) failed for (dev %s, type %s) errno=%d\n", 744 * filesystem type. 808 "invalid for this filesystem type\n"); 829 "security settings for (dev %s, type %s)\n", sb->s_id, name); 859 "type 1168 socket_type_to_security_class(int family, int type, int protocol) argument 2067 selinux_quotactl(int cmds, int type, int id, struct super_block *sb) argument 2102 selinux_syslog(int type) argument 2686 selinux_mount(const char *dev_name, struct path *path, const char *type, unsigned long flags, void *data) argument 4071 selinux_socket_create(int family, int type, int protocol, int kern) argument 4090 selinux_socket_post_create(struct socket *sock, int family, int type, int protocol, int kern) argument 5358 selinux_msg_queue_msgrcv(struct msg_queue *msq, struct msg_msg *msg, struct task_struct *target, long type, int mode) argument [all...] |
H A D | netlabel.c | 192 * @type: NetLabel labeling protocol type 203 u32 *type, 220 *type = secattr.type; 201 selinux_netlbl_skbuff_getsid(struct sk_buff *skb, u16 family, u32 *type, u32 *sid) argument
|
/security/selinux/include/ |
H A D | netlabel.h | 50 u32 *type, 95 u32 *type, 98 *type = NETLBL_NLTYPE_NONE; 93 selinux_netlbl_skbuff_getsid(struct sk_buff *skb, u16 family, u32 *type, u32 *sid) argument
|
H A D | security.h | 121 u8 type; member in struct:operation_decision 135 u32 type[8]; /* 256 types */ member in struct:operation 146 u8 type, struct operation_decision *od);
|
/security/selinux/ss/ |
H A D | avtab.c | 2 * Implementation of the access vector table type. 392 printk(KERN_ERR "SELinux: avtab: truncated source type\n"); 398 printk(KERN_ERR "SELinux: avtab: truncated target type\n"); 456 printk(KERN_ERR "SELinux: avtab: invalid type or class\n"); 480 rc = next_entry(&ops.type, fp, sizeof(u8)); 496 printk(KERN_ERR "SELinux: avtab: invalid type\n"); 568 rc = put_entry(&cur->datum.u.ops->type, sizeof(u8), 1, fp);
|
H A D | avtab.h | 4 * by a type pair and a class. An access vector 5 * table is used to represent the type enforcement 29 u16 source_type; /* source type */ 30 u16 target_type; /* target type */ 59 u8 type; member in struct:avtab_operation 65 u32 data; /* access vector or type value */
|
H A D | context.h | 24 * identity, a role, a type and a MLS range. 29 u32 type; member in struct:context 123 dst->type = src->type; 143 c->user = c->role = c->type = 0; 158 (c1->type == c2->type) &&
|
H A D | mls.c | 523 rtr.source_type = scontext->type; 524 rtr.target_type = tcontext->type;
|
H A D | policydb.c | 933 int policydb_type_isvalid(struct policydb *p, unsigned int type) argument 935 if (!type || type > p->p_types.nprim) 955 if (!c->type || c->type > p->p_types.nprim) 960 * Role must be authorized for the type. 963 if (!ebitmap_get_bit(&role->types, c->type - 1)) 964 /* role may not be associated with type */ 1062 c->type = le32_to_cpu(buf[2]); 1735 "role=%s type [all...] |
H A D | policydb.h | 38 * A datum type is defined for each kind of symbol 63 /* Options how a new object user, role, and type should be decided */ 89 u32 type; /* program executable type, or new object type */ member in struct:role_trans 114 u32 value; /* internal type value */ 115 u32 bounds; /* boundary of type */ 148 /* Boolean data type */ 150 __u32 value; /* internal type value */ 157 * type se [all...] |
H A D | services.c | 31 * Added support for runtime switching of the policy type 310 val1 = scontext->type; 311 val2 = tcontext->type; 418 val1 = c->type; 553 scontext->type - 1); 557 tcontext->type - 1); 564 lo_scontext.type = source->bounds; 580 lo_tcontext.type = target->bounds; 624 u8 type; local 629 for (i = 0; i < ARRAY_SIZE(ops->type); 857 struct type_datum *type; local 983 security_compute_operation(u32 ssid, u32 tsid, u16 orig_tclass, u8 type, struct operation_decision *od) argument [all...] |
/security/smack/ |
H A D | smack.h | 351 char type) 354 a->a.type = type; 360 char type, struct lsm_network_audit *net) 362 smk_ad_init(a, func, type); 396 char type) 350 smk_ad_init(struct smk_audit_info *a, const char *func, char type) argument 359 smk_ad_init_net(struct smk_audit_info *a, const char *func, char type, struct lsm_network_audit *net) argument 395 smk_ad_init(struct smk_audit_info *a, const char *func, char type) argument
|