Searched refs:token (Results 1 - 9 of 9) sorted by relevance

/security/keys/encrypted-keys/
H A Decryptfs_format.c23 return auth_tok->token.password.session_key_encryption_key;
59 strncpy((char *)auth_tok->token.password.signature, key_desc,
61 auth_tok->token.password.session_key_encryption_key_bytes =
64 * Removed auth_tok->token.password.salt and
65 * auth_tok->token.password.session_key_encryption_key
69 auth_tok->token.password.flags |=
75 auth_tok->token.password.hash_algo = PGP_DIGEST_ALGO_SHA512;
76 auth_tok->token.password.flags &= ~(ECRYPTFS_PERSISTENT_PASSWORD);
/security/apparmor/
H A Dcontext.c151 * @token: token value that must be specified to change from the hat
154 * validate the token to match.
158 int aa_set_current_hat(struct aa_profile *profile, u64 token) argument
170 cxt->token = token;
171 } else if (cxt->token == token) {
174 /* previous_profile && cxt->token != token */
196 aa_restore_previous_profile(u64 token) argument
[all...]
H A Dprocattr.c83 * split_token_from_name - separate a string of form <token>^<name>
86 * @token: stores returned parsed token value (NOT NULL)
88 * Returns: start position of name after token else NULL on failure
90 static char *split_token_from_name(int op, char *args, u64 * token) argument
94 *token = simple_strtoull(args, &name, 16);
117 u64 token; local
121 hat = split_token_from_name(OP_CHANGE_HAT, args, &token);
125 if (!hat && !token) {
146 __func__, token, ha
[all...]
H A Ddomain.c598 * @token: magic value to validate the hat change
603 * @token matches that stored in the current task context, return to the
608 int aa_change_hat(const char *hats[], int count, u64 token, bool permtest) argument
699 error = aa_set_current_hat(hat, token);
712 error = aa_restore_previous_profile(token);
/security/apparmor/include/
H A Ddomain.h32 int aa_change_hat(const char *hats[], int count, u64 token, bool permtest);
H A Dcontext.h64 * @token: magic value the task must know for returning to @previous_profile
75 u64 token; member in struct:aa_task_cxt
84 int aa_set_current_hat(struct aa_profile *profile, u64 token);
175 cxt->token = 0;
/security/integrity/ima/
H A Dima_policy.c453 int token; local
460 token = match_token(p, policy_tokens, args);
461 switch (token) {
/security/keys/
H A Dtrusted.c729 /* can have zero or more token= options */
735 int token; local
743 token = match_token(p, key_tokens, args);
745 switch (token) {
/security/selinux/
H A Dhooks.c933 int token; local
939 token = match_token(p, tokens, args);
941 switch (token) {

Completed in 376 milliseconds