/security/apparmor/ |
H A D | audit.c | 117 audit_log_string(ab, aa_audit_type[sa->aad->type]); 151 * @cb: optional callback fn for type specific fields (MAYBE NULL) 153 void aa_audit_msg(int type, struct common_audit_data *sa, argument 156 sa->aad->type = type; 162 * @type: audit type for the message 166 * @cb: optional callback fn for type specific fields (MAYBE NULL) 172 int aa_audit(int type, struct aa_profile *profile, gfp_t gfp, argument 178 if (type [all...] |
H A D | capability.c | 68 int type = AUDIT_APPARMOR_AUTO; local 71 sa.type = LSM_AUDIT_DATA_CAP; 82 type = AUDIT_APPARMOR_AUDIT; 85 type = AUDIT_APPARMOR_KILL; 107 return aa_audit(type, profile, GFP_ATOMIC, &sa, audit_cb);
|
H A D | file.c | 110 int type = AUDIT_APPARMOR_AUTO; local 113 sa.type = LSM_AUDIT_DATA_NONE; 134 type = AUDIT_APPARMOR_AUDIT; 140 type = AUDIT_APPARMOR_KILL; 153 return aa_audit(type, profile, gfp, &sa, file_audit_cb);
|
H A D | ipc.c | 45 sa.type = LSM_AUDIT_DATA_NONE;
|
H A D | lib.c | 71 sa.type = LSM_AUDIT_DATA_NONE; 82 * @flags: the type of memory to allocate (see kmalloc).
|
H A D | lsm.c | 596 sa.type = LSM_AUDIT_DATA_NONE;
|
H A D | policy.c | 908 sa.type = LSM_AUDIT_DATA_NONE;
|
H A D | policy_unpack.c | 33 * The AppArmor interface treats data as a type byte followed by the 98 sa.type = LSM_AUDIT_DATA_NONE; 151 * unpack_nameX - check is the next element is of type X with a name of @name 153 * @code: type code 156 * check that the next serialized data element is of type X and has a tag 161 * Returns 1 on success (both type code and name tests match) and the read 169 * May need to reset pos if name or type doesn't match 187 /* now check if type code matches */
|
H A D | resource.c | 56 sa.type = LSM_AUDIT_DATA_NONE;
|
/security/apparmor/include/ |
H A D | audit.h | 108 int type; member in struct:apparmor_audit_data 134 void aa_audit_msg(int type, struct common_audit_data *sa, 136 int aa_audit(int type, struct aa_profile *profile, gfp_t gfp,
|
/security/ |
H A D | capability.c | 35 static int cap_syslog(int type) argument 40 static int cap_quotactl(int cmds, int type, int id, struct super_block *sb) argument 98 const char *type, unsigned long flags, void *data) 540 struct task_struct *target, long type, int mode) 607 static int cap_socket_create(int family, int type, int protocol, int kern) argument 612 static int cap_socket_post_create(struct socket *sock, int family, int type, argument 97 cap_sb_mount(const char *dev_name, struct path *path, const char *type, unsigned long flags, void *data) argument 539 cap_msg_queue_msgrcv(struct msg_queue *msq, struct msg_msg *msg, struct task_struct *target, long type, int mode) argument
|
H A D | device_cgroup.c | 42 short type; member in struct:dev_exception_item 105 if (walk->type != ex->type) 133 if (walk->type != ex->type) 256 static char type_to_char(short type) argument 258 if (type == DEV_ALL) 260 if (type == DEV_CHAR) 262 if (type == DEV_BLOCK) 299 seq_printf(m, "%c %s:%s %s\n", type_to_char(ex->type), 321 match_exception(struct list_head *exceptions, short type, u32 major, u32 minor, short access) argument 358 match_exception_partial(struct list_head *exceptions, short type, u32 major, u32 minor, short access) argument 812 __devcgroup_check_permission(short type, u32 major, u32 minor, short access) argument 838 short type, access = 0; local 855 short type; local [all...] |
/security/integrity/ |
H A D | digsig.c | 19 #include <linux/key-type.h> 55 /* v1 API expect signature without xattr type */
|
H A D | digsig_asymmetric.c | 17 #include <linux/key-type.h> 19 #include <keys/asymmetric-type.h>
|
H A D | integrity.h | 68 u8 type; member in struct:evm_ima_xattr_data 80 u8 type; member in struct:ima_digest_data::__anon13::__anon14 83 u8 type; member in struct:ima_digest_data::__anon13::__anon15 95 uint8_t type; /* xattr type */ member in struct:signature_v2_hdr
|
/security/integrity/evm/ |
H A D | evm_crypto.c | 21 #include <keys/encrypted-type.h> 35 static struct shash_desc *init_desc(char type) argument 42 if (type == EVM_XATTR_HMAC) { 62 if (type == EVM_XATTR_HMAC) { 132 char type, char *digest) 144 desc = init_desc(type); 209 xattr_data.type = EVM_XATTR_HMAC; 128 evm_calc_hmac_or_hash(struct dentry *dentry, const char *req_xattr_name, const char *req_xattr_value, size_t req_xattr_value_len, char type, char *digest) argument
|
H A D | evm_main.c | 125 /* first need to know the sig type */ 144 /* check value type */ 145 switch (xattr_data->type) { 325 if (xattr_data->type != EVM_IMA_XATTR_DIGSIG) 445 xattr_data->type = EVM_XATTR_HMAC;
|
/security/integrity/ima/ |
H A D | ima_appraise.c | 56 iint->ima_hash->xattr.sha1.type = IMA_XATTR_DIGEST; 59 iint->ima_hash->xattr.ng.type = IMA_XATTR_DIGEST_NG; 141 switch (xattr_value->type) { 222 switch (xattr_value->type) { 232 if (xattr_len - sizeof(xattr_value->type) - hash_start >= 274 xattr_value->type != EVM_IMA_XATTR_DIGSIG)) { 381 if (!xattr_value_len || (xvalue->type >= IMA_XATTR_LAST)) 384 (xvalue->type == EVM_IMA_XATTR_DIGSIG) ? 1 : 0);
|
H A D | ima_policy.c | 58 int type; /* audit type */ member in struct:ima_rule_entry::__anon10 147 result = security_filter_rule_init(entry->lsm[i].type, 203 rule->lsm[i].type, 213 rule->lsm[i].type, 261 * Measure decision based on func/mask/fsmagic and LSM(subj/obj/type) 420 entry->lsm[lsm_rule].type = audit_type; 421 result = security_filter_rule_init(entry->lsm[lsm_rule].type,
|
H A D | ima_template_lib.c | 335 if ((!xattr_value) || (xattr_value->type != EVM_IMA_XATTR_DIGSIG))
|
/security/keys/ |
H A D | big_key.c | 1 /* Large capacity key type 18 #include <keys/user-type.h> 19 #include <keys/big_key-type.h>
|
H A D | gc.c | 15 #include <keys/keyring-type.h> 45 * Any key whose type gets unregistered will be re-typed to this if it can't be 95 * Reap keys of dead type. 98 * collector: the first to mark keys of that type as being dead, the second to 154 if (key->type->destroy) 155 key->type->destroy(key); 225 if (key->type == key_gc_dead_keytype) { 242 if (key->type == key_gc_dead_keytype) 247 if (key->type == &key_type_keyring) 252 if (key->type [all...] |
H A D | internal.h | 16 #include <linux/key-type.h> 88 extern struct key_type *key_type_lookup(const char *type); 146 extern struct key *request_key_and_link(struct key_type *type,
|
/security/keys/encrypted-keys/ |
H A D | encrypted.c | 24 #include <keys/user-type.h> 25 #include <keys/trusted-type.h> 26 #include <keys/encrypted-type.h> 27 #include <linux/key-type.h> 131 * valid_master_desc - verify the 'key-type:desc' of a new/updated master-key 133 * key-type:= "trusted:" | "user:" 136 * Verify that 'key-type' is valid and that 'desc' exists. On key update, 137 * only the master key description is permitted to change, not the key-type. 138 * The key-type remains constant.
|
H A D | masterkey_trusted.c | 20 #include <keys/trusted-type.h> 21 #include <keys/encrypted-type.h> 28 * manages both trusted/encrypted key-types, like the encrypted key type 29 * data, trusted key type data is not visible decrypted from userspace.
|