Searched refs:type (Results 1 - 25 of 64) sorted by relevance

123

/security/apparmor/
H A Daudit.c117 audit_log_string(ab, aa_audit_type[sa->aad->type]);
151 * @cb: optional callback fn for type specific fields (MAYBE NULL)
153 void aa_audit_msg(int type, struct common_audit_data *sa, argument
156 sa->aad->type = type;
162 * @type: audit type for the message
166 * @cb: optional callback fn for type specific fields (MAYBE NULL)
172 int aa_audit(int type, struct aa_profile *profile, gfp_t gfp, argument
178 if (type
[all...]
H A Dcapability.c68 int type = AUDIT_APPARMOR_AUTO; local
71 sa.type = LSM_AUDIT_DATA_CAP;
82 type = AUDIT_APPARMOR_AUDIT;
85 type = AUDIT_APPARMOR_KILL;
107 return aa_audit(type, profile, GFP_ATOMIC, &sa, audit_cb);
/security/tomoyo/
H A Dmount.c33 r->param.mount.type->name,
52 tomoyo_compare_name_union(r->param.mount.type,
67 * @type: Name of filesystem type.
76 struct path *dir, const char *type,
93 requested_type = tomoyo_encode(type);
110 if (type == tomoyo_mounts[TOMOYO_MOUNT_REMOUNT]) {
112 } else if (type == tomoyo_mounts[TOMOYO_MOUNT_MAKE_UNBINDABLE] ||
113 type == tomoyo_mounts[TOMOYO_MOUNT_MAKE_PRIVATE] ||
114 type
74 tomoyo_mount_acl(struct tomoyo_request_info *r, const char *dev_name, struct path *dir, const char *type, unsigned long flags) argument
187 tomoyo_mount_permission(const char *dev_name, struct path *path, const char *type, unsigned long flags, void *data_page) argument
[all...]
H A Dnetwork.c283 struct tomoyo_inet_acl e = { .head.type = TOMOYO_TYPE_INET_ACL };
285 u8 type; local
292 for (type = 0; type < TOMOYO_MAX_NETWORK_OPERATION; type++)
293 if (tomoyo_permstr(operation, tomoyo_socket_keyword[type]))
294 e.perm |= 1 << type;
328 struct tomoyo_unix_acl e = { .head.type = TOMOYO_TYPE_UNIX_ACL };
330 u8 type; local
337 for (type
471 const u8 type = tomoyo_inet2mac[address->protocol][address->operation]; local
546 const u8 type = tomoyo_unix2mac[address->protocol][address->operation]; local
649 const unsigned int type = sock->type; local
685 const unsigned int type = sock->type; local
722 const unsigned int type = sock->type; local
757 const unsigned int type = sock->type; local
[all...]
H A Ddomain.c72 return a->type == b->type && a->cond == b->cond;
112 !(new_entry->type == TOMOYO_TYPE_PATH_ACL &&
150 * @check_entry: Callback function to check type specific parameters.
167 if (ptr->is_deleted || ptr->type != r->param_type)
220 return p1->type == p2->type && p1->is_last_name == p2->is_last_name
229 * @type: Type of this entry.
234 const u8 type)
236 struct tomoyo_transition_control e = { .type
233 tomoyo_write_transition_control(struct tomoyo_acl_param *param, const u8 type) argument
287 tomoyo_scan_transition(const struct list_head *list, const struct tomoyo_path_info *domainname, const struct tomoyo_path_info *program, const char *last_name, const enum tomoyo_transition_type type) argument
337 enum tomoyo_transition_type type = TOMOYO_TRANSITION_CONTROL_NO_RESET; local
[all...]
H A Dfile.c213 const u8 type = r->param.path_number.operation; local
216 switch (type) {
234 [tomoyo_pn2mac[type]],
382 .head.type = TOMOYO_TYPE_PATH_ACL,
455 .head.type = TOMOYO_TYPE_MKDEV_ACL,
531 .head.type = TOMOYO_TYPE_PATH2_ACL,
563 r->type = tomoyo_p2mac[operation];
564 r->mode = tomoyo_get_mode(r->domain->ns, r->profile, r->type);
595 r->type = TOMOYO_MAC_FILE_EXECUTE;
596 r->mode = tomoyo_get_mode(r->domain->ns, r->profile, r->type);
690 tomoyo_path_number_perm(const u8 type, struct path *path, unsigned long number) argument
997 u8 type; local
[all...]
H A Dtomoyo.c240 int type = TOMOYO_TYPE_CREATE; local
245 type = TOMOYO_TYPE_MKCHAR;
248 type = TOMOYO_TYPE_MKBLOCK;
253 return tomoyo_mkdev_perm(type, &path, perm, dev);
257 type = TOMOYO_TYPE_MKFIFO;
260 type = TOMOYO_TYPE_MKSOCK;
263 return tomoyo_path_number_perm(type, &path, perm);
405 * @type: Name of filesystem type. Maybe NULL.
412 const char *type, unsigne
411 tomoyo_sb_mount(const char *dev_name, struct path *path, const char *type, unsigned long flags, void *data) argument
[all...]
H A Dgroup.c67 * @type: Type of this group.
71 int tomoyo_write_group(struct tomoyo_acl_param *param, const u8 type) argument
73 struct tomoyo_group *group = tomoyo_get_group(param, type);
78 if (type == TOMOYO_PATH_GROUP) {
88 } else if (type == TOMOYO_NUMBER_GROUP) {
H A Dutil.c232 * @type: Type of @value.
237 const unsigned long value, const u8 type)
239 if (type == TOMOYO_VALUE_TYPE_DECIMAL)
241 else if (type == TOMOYO_VALUE_TYPE_OCTAL)
243 else if (type == TOMOYO_VALUE_TYPE_HEXADECIMAL)
246 snprintf(buffer, buffer_len, "type(%u)", type);
285 u8 type; local
294 type = tomoyo_parse_ulong(&v, &data);
295 if (type
236 tomoyo_print_ulong(char *buffer, const int buffer_len, const unsigned long value, const u8 type) argument
[all...]
/security/keys/encrypted-keys/
H A Dmasterkey_trusted.c20 #include <keys/trusted-type.h>
21 #include <keys/encrypted-type.h>
28 * manages both trusted/encrypted key-types, like the encrypted key type
29 * data, trusted key type data is not visible decrypted from userspace.
/security/
H A Ddevice_cgroup.c42 short type; member in struct:dev_exception_item
105 if (walk->type != ex->type)
133 if (walk->type != ex->type)
256 static char type_to_char(short type) argument
258 if (type == DEV_ALL)
260 if (type == DEV_CHAR)
262 if (type == DEV_BLOCK)
299 seq_printf(m, "%c %s:%s %s\n", type_to_char(ex->type),
321 match_exception(struct list_head *exceptions, short type, u32 major, u32 minor, short access) argument
358 match_exception_partial(struct list_head *exceptions, short type, u32 major, u32 minor, short access) argument
812 __devcgroup_check_permission(short type, u32 major, u32 minor, short access) argument
838 short type, access = 0; local
855 short type; local
[all...]
/security/apparmor/include/
H A Daudit.h108 int type; member in struct:apparmor_audit_data
134 void aa_audit_msg(int type, struct common_audit_data *sa,
136 int aa_audit(int type, struct aa_profile *profile, gfp_t gfp,
/security/keys/
H A Dkey.c196 * key_alloc - Allocate a key of the specified type.
197 * @type: The type of key to allocate.
205 * Allocate a key of the specified type with the attributes given. The key is
210 * the user's key data quota has the default for the key type reserved. The
219 * Note that the caller needs to ensure the key type isn't uninstantiated.
221 * be done by either never unregistering the key type, or making sure
224 struct key *key_alloc(struct key_type *type, const char *desc, argument
237 if (type->vet_description) {
238 ret = type
661 key_type_lookup(const char *type) argument
775 key_create_or_update(key_ref_t keyring_ref, const char *type, const char *description, const void *payload, size_t plen, key_perm_t perm, unsigned long flags) argument
[all...]
H A Dkeyring.c19 #include <keys/keyring-type.h>
20 #include <keys/user-type.h>
53 if (key->type == &key_type_keyring)
72 * The keyring key type definition. Keyrings are simply keys of this type and
169 * Hash a key type and description.
176 unsigned long hash, type; local
181 type = (unsigned long)index_key->type;
183 acc = mult_64x32_and_fold(type, desc_le
889 keyring_search(key_ref_t keyring, struct key_type *type, const char *description) argument
[all...]
H A Drequest_key.c231 if (key->type->request_key)
232 actor = key->type->request_key;
343 ctx->index_key.type->name, ctx->index_key.description);
350 if (ctx->index_key.type->read)
352 if (ctx->index_key.type == &key_type_keyring ||
353 ctx->index_key.type->update)
356 key = key_alloc(ctx->index_key.type, ctx->index_key.description,
479 * @type: The type of key we want.
504 struct key *request_key_and_link(struct key_type *type, argument
615 request_key(struct key_type *type, const char *description, const char *callout_info) argument
652 request_key_with_auxdata(struct key_type *type, const char *description, const void *callout_info, size_t callout_len, void *aux) argument
688 request_key_async(struct key_type *type, const char *description, const void *callout_info, size_t callout_len) argument
713 request_key_async_with_auxdata(struct key_type *type, const char *description, const void *callout_info, size_t callout_len, void *aux) argument
[all...]
H A Dgc.c15 #include <keys/keyring-type.h>
45 * Any key whose type gets unregistered will be re-typed to this if it can't be
95 * Reap keys of dead type.
98 * collector: the first to mark keys of that type as being dead, the second to
154 if (key->type->destroy)
155 key->type->destroy(key);
225 if (key->type == key_gc_dead_keytype) {
242 if (key->type == key_gc_dead_keytype)
247 if (key->type == &key_type_keyring)
252 if (key->type
[all...]
H A Dkeyctl.c31 static int key_get_type_from_user(char *type, argument
37 ret = strncpy_from_user(type, _type, len);
42 if (type[0] == '.')
44 type[len - 1] = '\0';
52 * If the description is NULL or an empty string, the key type is asked to
67 char type[32], *description; local
77 ret = key_get_type_from_user(type, _type, sizeof(type));
92 (strncmp(type, "keyring", 7) == 0)) {
128 key_ref = key_create_or_update(keyring_ref, type, descriptio
173 char type[32], *description, *callout_info; local
640 char type[32], *description; local
[all...]
/security/selinux/include/
H A Dnetlabel.h50 u32 *type,
95 u32 *type,
98 *type = NETLBL_NLTYPE_NONE;
93 selinux_netlbl_skbuff_getsid(struct sk_buff *skb, u16 family, u32 *type, u32 *sid) argument
/security/integrity/
H A Dintegrity.h68 u8 type; member in struct:evm_ima_xattr_data
80 u8 type; member in struct:ima_digest_data::__anon13::__anon14
83 u8 type; member in struct:ima_digest_data::__anon13::__anon15
95 uint8_t type; /* xattr type */ member in struct:signature_v2_hdr
H A Ddigsig_asymmetric.c17 #include <linux/key-type.h>
19 #include <keys/asymmetric-type.h>
/security/selinux/ss/
H A Dservices.c31 * Added support for runtime switching of the policy type
310 val1 = scontext->type;
311 val2 = tcontext->type;
418 val1 = c->type;
553 scontext->type - 1);
557 tcontext->type - 1);
564 lo_scontext.type = source->bounds;
580 lo_tcontext.type = target->bounds;
624 u8 type; local
629 for (i = 0; i < ARRAY_SIZE(ops->type);
857 struct type_datum *type; local
983 security_compute_operation(u32 ssid, u32 tsid, u16 orig_tclass, u8 type, struct operation_decision *od) argument
[all...]
H A Dcontext.h24 * identity, a role, a type and a MLS range.
29 u32 type; member in struct:context
123 dst->type = src->type;
143 c->user = c->role = c->type = 0;
158 (c1->type == c2->type) &&
/security/integrity/evm/
H A Devm_crypto.c21 #include <keys/encrypted-type.h>
35 static struct shash_desc *init_desc(char type) argument
42 if (type == EVM_XATTR_HMAC) {
62 if (type == EVM_XATTR_HMAC) {
132 char type, char *digest)
144 desc = init_desc(type);
209 xattr_data.type = EVM_XATTR_HMAC;
128 evm_calc_hmac_or_hash(struct dentry *dentry, const char *req_xattr_name, const char *req_xattr_value, size_t req_xattr_value_len, char type, char *digest) argument
/security/integrity/ima/
H A Dima_appraise.c56 iint->ima_hash->xattr.sha1.type = IMA_XATTR_DIGEST;
59 iint->ima_hash->xattr.ng.type = IMA_XATTR_DIGEST_NG;
141 switch (xattr_value->type) {
222 switch (xattr_value->type) {
232 if (xattr_len - sizeof(xattr_value->type) - hash_start >=
274 xattr_value->type != EVM_IMA_XATTR_DIGSIG)) {
381 if (!xattr_value_len || (xvalue->type >= IMA_XATTR_LAST))
384 (xvalue->type == EVM_IMA_XATTR_DIGSIG) ? 1 : 0);
/security/smack/
H A Dsmack.h351 char type)
354 a->a.type = type;
360 char type, struct lsm_network_audit *net)
362 smk_ad_init(a, func, type);
396 char type)
350 smk_ad_init(struct smk_audit_info *a, const char *func, char type) argument
359 smk_ad_init_net(struct smk_audit_info *a, const char *func, char type, struct lsm_network_audit *net) argument
395 smk_ad_init(struct smk_audit_info *a, const char *func, char type) argument

Completed in 308 milliseconds

123