/security/apparmor/ |
H A D | audit.c | 117 audit_log_string(ab, aa_audit_type[sa->aad->type]); 151 * @cb: optional callback fn for type specific fields (MAYBE NULL) 153 void aa_audit_msg(int type, struct common_audit_data *sa, argument 156 sa->aad->type = type; 162 * @type: audit type for the message 166 * @cb: optional callback fn for type specific fields (MAYBE NULL) 172 int aa_audit(int type, struct aa_profile *profile, gfp_t gfp, argument 178 if (type [all...] |
H A D | capability.c | 68 int type = AUDIT_APPARMOR_AUTO; local 71 sa.type = LSM_AUDIT_DATA_CAP; 82 type = AUDIT_APPARMOR_AUDIT; 85 type = AUDIT_APPARMOR_KILL; 107 return aa_audit(type, profile, GFP_ATOMIC, &sa, audit_cb);
|
/security/tomoyo/ |
H A D | mount.c | 33 r->param.mount.type->name, 52 tomoyo_compare_name_union(r->param.mount.type, 67 * @type: Name of filesystem type. 76 struct path *dir, const char *type, 93 requested_type = tomoyo_encode(type); 110 if (type == tomoyo_mounts[TOMOYO_MOUNT_REMOUNT]) { 112 } else if (type == tomoyo_mounts[TOMOYO_MOUNT_MAKE_UNBINDABLE] || 113 type == tomoyo_mounts[TOMOYO_MOUNT_MAKE_PRIVATE] || 114 type 74 tomoyo_mount_acl(struct tomoyo_request_info *r, const char *dev_name, struct path *dir, const char *type, unsigned long flags) argument 187 tomoyo_mount_permission(const char *dev_name, struct path *path, const char *type, unsigned long flags, void *data_page) argument [all...] |
H A D | network.c | 283 struct tomoyo_inet_acl e = { .head.type = TOMOYO_TYPE_INET_ACL }; 285 u8 type; local 292 for (type = 0; type < TOMOYO_MAX_NETWORK_OPERATION; type++) 293 if (tomoyo_permstr(operation, tomoyo_socket_keyword[type])) 294 e.perm |= 1 << type; 328 struct tomoyo_unix_acl e = { .head.type = TOMOYO_TYPE_UNIX_ACL }; 330 u8 type; local 337 for (type 471 const u8 type = tomoyo_inet2mac[address->protocol][address->operation]; local 546 const u8 type = tomoyo_unix2mac[address->protocol][address->operation]; local 649 const unsigned int type = sock->type; local 685 const unsigned int type = sock->type; local 722 const unsigned int type = sock->type; local 757 const unsigned int type = sock->type; local [all...] |
H A D | domain.c | 72 return a->type == b->type && a->cond == b->cond; 112 !(new_entry->type == TOMOYO_TYPE_PATH_ACL && 150 * @check_entry: Callback function to check type specific parameters. 167 if (ptr->is_deleted || ptr->type != r->param_type) 220 return p1->type == p2->type && p1->is_last_name == p2->is_last_name 229 * @type: Type of this entry. 234 const u8 type) 236 struct tomoyo_transition_control e = { .type 233 tomoyo_write_transition_control(struct tomoyo_acl_param *param, const u8 type) argument 287 tomoyo_scan_transition(const struct list_head *list, const struct tomoyo_path_info *domainname, const struct tomoyo_path_info *program, const char *last_name, const enum tomoyo_transition_type type) argument 337 enum tomoyo_transition_type type = TOMOYO_TRANSITION_CONTROL_NO_RESET; local [all...] |
H A D | file.c | 213 const u8 type = r->param.path_number.operation; local 216 switch (type) { 234 [tomoyo_pn2mac[type]], 382 .head.type = TOMOYO_TYPE_PATH_ACL, 455 .head.type = TOMOYO_TYPE_MKDEV_ACL, 531 .head.type = TOMOYO_TYPE_PATH2_ACL, 563 r->type = tomoyo_p2mac[operation]; 564 r->mode = tomoyo_get_mode(r->domain->ns, r->profile, r->type); 595 r->type = TOMOYO_MAC_FILE_EXECUTE; 596 r->mode = tomoyo_get_mode(r->domain->ns, r->profile, r->type); 690 tomoyo_path_number_perm(const u8 type, struct path *path, unsigned long number) argument 997 u8 type; local [all...] |
H A D | tomoyo.c | 240 int type = TOMOYO_TYPE_CREATE; local 245 type = TOMOYO_TYPE_MKCHAR; 248 type = TOMOYO_TYPE_MKBLOCK; 253 return tomoyo_mkdev_perm(type, &path, perm, dev); 257 type = TOMOYO_TYPE_MKFIFO; 260 type = TOMOYO_TYPE_MKSOCK; 263 return tomoyo_path_number_perm(type, &path, perm); 405 * @type: Name of filesystem type. Maybe NULL. 412 const char *type, unsigne 411 tomoyo_sb_mount(const char *dev_name, struct path *path, const char *type, unsigned long flags, void *data) argument [all...] |
H A D | group.c | 67 * @type: Type of this group. 71 int tomoyo_write_group(struct tomoyo_acl_param *param, const u8 type) argument 73 struct tomoyo_group *group = tomoyo_get_group(param, type); 78 if (type == TOMOYO_PATH_GROUP) { 88 } else if (type == TOMOYO_NUMBER_GROUP) {
|
H A D | util.c | 232 * @type: Type of @value. 237 const unsigned long value, const u8 type) 239 if (type == TOMOYO_VALUE_TYPE_DECIMAL) 241 else if (type == TOMOYO_VALUE_TYPE_OCTAL) 243 else if (type == TOMOYO_VALUE_TYPE_HEXADECIMAL) 246 snprintf(buffer, buffer_len, "type(%u)", type); 285 u8 type; local 294 type = tomoyo_parse_ulong(&v, &data); 295 if (type 236 tomoyo_print_ulong(char *buffer, const int buffer_len, const unsigned long value, const u8 type) argument [all...] |
/security/keys/encrypted-keys/ |
H A D | masterkey_trusted.c | 20 #include <keys/trusted-type.h> 21 #include <keys/encrypted-type.h> 28 * manages both trusted/encrypted key-types, like the encrypted key type 29 * data, trusted key type data is not visible decrypted from userspace.
|
/security/ |
H A D | device_cgroup.c | 42 short type; member in struct:dev_exception_item 105 if (walk->type != ex->type) 133 if (walk->type != ex->type) 256 static char type_to_char(short type) argument 258 if (type == DEV_ALL) 260 if (type == DEV_CHAR) 262 if (type == DEV_BLOCK) 299 seq_printf(m, "%c %s:%s %s\n", type_to_char(ex->type), 321 match_exception(struct list_head *exceptions, short type, u32 major, u32 minor, short access) argument 358 match_exception_partial(struct list_head *exceptions, short type, u32 major, u32 minor, short access) argument 812 __devcgroup_check_permission(short type, u32 major, u32 minor, short access) argument 838 short type, access = 0; local 855 short type; local [all...] |
/security/apparmor/include/ |
H A D | audit.h | 108 int type; member in struct:apparmor_audit_data 134 void aa_audit_msg(int type, struct common_audit_data *sa, 136 int aa_audit(int type, struct aa_profile *profile, gfp_t gfp,
|
/security/keys/ |
H A D | key.c | 196 * key_alloc - Allocate a key of the specified type. 197 * @type: The type of key to allocate. 205 * Allocate a key of the specified type with the attributes given. The key is 210 * the user's key data quota has the default for the key type reserved. The 219 * Note that the caller needs to ensure the key type isn't uninstantiated. 221 * be done by either never unregistering the key type, or making sure 224 struct key *key_alloc(struct key_type *type, const char *desc, argument 237 if (type->vet_description) { 238 ret = type 661 key_type_lookup(const char *type) argument 775 key_create_or_update(key_ref_t keyring_ref, const char *type, const char *description, const void *payload, size_t plen, key_perm_t perm, unsigned long flags) argument [all...] |
H A D | keyring.c | 19 #include <keys/keyring-type.h> 20 #include <keys/user-type.h> 53 if (key->type == &key_type_keyring) 72 * The keyring key type definition. Keyrings are simply keys of this type and 169 * Hash a key type and description. 176 unsigned long hash, type; local 181 type = (unsigned long)index_key->type; 183 acc = mult_64x32_and_fold(type, desc_le 889 keyring_search(key_ref_t keyring, struct key_type *type, const char *description) argument [all...] |
H A D | request_key.c | 231 if (key->type->request_key) 232 actor = key->type->request_key; 343 ctx->index_key.type->name, ctx->index_key.description); 350 if (ctx->index_key.type->read) 352 if (ctx->index_key.type == &key_type_keyring || 353 ctx->index_key.type->update) 356 key = key_alloc(ctx->index_key.type, ctx->index_key.description, 479 * @type: The type of key we want. 504 struct key *request_key_and_link(struct key_type *type, argument 615 request_key(struct key_type *type, const char *description, const char *callout_info) argument 652 request_key_with_auxdata(struct key_type *type, const char *description, const void *callout_info, size_t callout_len, void *aux) argument 688 request_key_async(struct key_type *type, const char *description, const void *callout_info, size_t callout_len) argument 713 request_key_async_with_auxdata(struct key_type *type, const char *description, const void *callout_info, size_t callout_len, void *aux) argument [all...] |
H A D | gc.c | 15 #include <keys/keyring-type.h> 45 * Any key whose type gets unregistered will be re-typed to this if it can't be 95 * Reap keys of dead type. 98 * collector: the first to mark keys of that type as being dead, the second to 154 if (key->type->destroy) 155 key->type->destroy(key); 225 if (key->type == key_gc_dead_keytype) { 242 if (key->type == key_gc_dead_keytype) 247 if (key->type == &key_type_keyring) 252 if (key->type [all...] |
H A D | keyctl.c | 31 static int key_get_type_from_user(char *type, argument 37 ret = strncpy_from_user(type, _type, len); 42 if (type[0] == '.') 44 type[len - 1] = '\0'; 52 * If the description is NULL or an empty string, the key type is asked to 67 char type[32], *description; local 77 ret = key_get_type_from_user(type, _type, sizeof(type)); 92 (strncmp(type, "keyring", 7) == 0)) { 128 key_ref = key_create_or_update(keyring_ref, type, descriptio 173 char type[32], *description, *callout_info; local 640 char type[32], *description; local [all...] |
/security/selinux/include/ |
H A D | netlabel.h | 50 u32 *type, 95 u32 *type, 98 *type = NETLBL_NLTYPE_NONE; 93 selinux_netlbl_skbuff_getsid(struct sk_buff *skb, u16 family, u32 *type, u32 *sid) argument
|
/security/integrity/ |
H A D | integrity.h | 68 u8 type; member in struct:evm_ima_xattr_data 80 u8 type; member in struct:ima_digest_data::__anon13::__anon14 83 u8 type; member in struct:ima_digest_data::__anon13::__anon15 95 uint8_t type; /* xattr type */ member in struct:signature_v2_hdr
|
H A D | digsig_asymmetric.c | 17 #include <linux/key-type.h> 19 #include <keys/asymmetric-type.h>
|
/security/selinux/ss/ |
H A D | services.c | 31 * Added support for runtime switching of the policy type 310 val1 = scontext->type; 311 val2 = tcontext->type; 418 val1 = c->type; 553 scontext->type - 1); 557 tcontext->type - 1); 564 lo_scontext.type = source->bounds; 580 lo_tcontext.type = target->bounds; 624 u8 type; local 629 for (i = 0; i < ARRAY_SIZE(ops->type); 857 struct type_datum *type; local 983 security_compute_operation(u32 ssid, u32 tsid, u16 orig_tclass, u8 type, struct operation_decision *od) argument [all...] |
H A D | context.h | 24 * identity, a role, a type and a MLS range. 29 u32 type; member in struct:context 123 dst->type = src->type; 143 c->user = c->role = c->type = 0; 158 (c1->type == c2->type) &&
|
/security/integrity/evm/ |
H A D | evm_crypto.c | 21 #include <keys/encrypted-type.h> 35 static struct shash_desc *init_desc(char type) argument 42 if (type == EVM_XATTR_HMAC) { 62 if (type == EVM_XATTR_HMAC) { 132 char type, char *digest) 144 desc = init_desc(type); 209 xattr_data.type = EVM_XATTR_HMAC; 128 evm_calc_hmac_or_hash(struct dentry *dentry, const char *req_xattr_name, const char *req_xattr_value, size_t req_xattr_value_len, char type, char *digest) argument
|
/security/integrity/ima/ |
H A D | ima_appraise.c | 56 iint->ima_hash->xattr.sha1.type = IMA_XATTR_DIGEST; 59 iint->ima_hash->xattr.ng.type = IMA_XATTR_DIGEST_NG; 141 switch (xattr_value->type) { 222 switch (xattr_value->type) { 232 if (xattr_len - sizeof(xattr_value->type) - hash_start >= 274 xattr_value->type != EVM_IMA_XATTR_DIGSIG)) { 381 if (!xattr_value_len || (xvalue->type >= IMA_XATTR_LAST)) 384 (xvalue->type == EVM_IMA_XATTR_DIGSIG) ? 1 : 0);
|
/security/smack/ |
H A D | smack.h | 351 char type) 354 a->a.type = type; 360 char type, struct lsm_network_audit *net) 362 smk_ad_init(a, func, type); 396 char type) 350 smk_ad_init(struct smk_audit_info *a, const char *func, char type) argument 359 smk_ad_init_net(struct smk_audit_info *a, const char *func, char type, struct lsm_network_audit *net) argument 395 smk_ad_init(struct smk_audit_info *a, const char *func, char type) argument
|