Searched refs:type (Results 1 - 25 of 64) sorted by last modified time

123

/security/apparmor/
H A Daudit.c117 audit_log_string(ab, aa_audit_type[sa->aad->type]);
151 * @cb: optional callback fn for type specific fields (MAYBE NULL)
153 void aa_audit_msg(int type, struct common_audit_data *sa, argument
156 sa->aad->type = type;
162 * @type: audit type for the message
166 * @cb: optional callback fn for type specific fields (MAYBE NULL)
172 int aa_audit(int type, struct aa_profile *profile, gfp_t gfp, argument
178 if (type
[all...]
H A Dcapability.c68 int type = AUDIT_APPARMOR_AUTO; local
71 sa.type = LSM_AUDIT_DATA_CAP;
82 type = AUDIT_APPARMOR_AUDIT;
85 type = AUDIT_APPARMOR_KILL;
107 return aa_audit(type, profile, GFP_ATOMIC, &sa, audit_cb);
H A Dfile.c110 int type = AUDIT_APPARMOR_AUTO; local
113 sa.type = LSM_AUDIT_DATA_NONE;
134 type = AUDIT_APPARMOR_AUDIT;
140 type = AUDIT_APPARMOR_KILL;
153 return aa_audit(type, profile, gfp, &sa, file_audit_cb);
H A Dipc.c45 sa.type = LSM_AUDIT_DATA_NONE;
H A Dlib.c71 sa.type = LSM_AUDIT_DATA_NONE;
82 * @flags: the type of memory to allocate (see kmalloc).
H A Dlsm.c596 sa.type = LSM_AUDIT_DATA_NONE;
H A Dpolicy.c908 sa.type = LSM_AUDIT_DATA_NONE;
H A Dpolicy_unpack.c33 * The AppArmor interface treats data as a type byte followed by the
98 sa.type = LSM_AUDIT_DATA_NONE;
151 * unpack_nameX - check is the next element is of type X with a name of @name
153 * @code: type code
156 * check that the next serialized data element is of type X and has a tag
161 * Returns 1 on success (both type code and name tests match) and the read
169 * May need to reset pos if name or type doesn't match
187 /* now check if type code matches */
H A Dresource.c56 sa.type = LSM_AUDIT_DATA_NONE;
/security/apparmor/include/
H A Daudit.h108 int type; member in struct:apparmor_audit_data
134 void aa_audit_msg(int type, struct common_audit_data *sa,
136 int aa_audit(int type, struct aa_profile *profile, gfp_t gfp,
/security/
H A Dcapability.c35 static int cap_syslog(int type) argument
40 static int cap_quotactl(int cmds, int type, int id, struct super_block *sb) argument
98 const char *type, unsigned long flags, void *data)
540 struct task_struct *target, long type, int mode)
607 static int cap_socket_create(int family, int type, int protocol, int kern) argument
612 static int cap_socket_post_create(struct socket *sock, int family, int type, argument
97 cap_sb_mount(const char *dev_name, struct path *path, const char *type, unsigned long flags, void *data) argument
539 cap_msg_queue_msgrcv(struct msg_queue *msq, struct msg_msg *msg, struct task_struct *target, long type, int mode) argument
H A Ddevice_cgroup.c42 short type; member in struct:dev_exception_item
105 if (walk->type != ex->type)
133 if (walk->type != ex->type)
256 static char type_to_char(short type) argument
258 if (type == DEV_ALL)
260 if (type == DEV_CHAR)
262 if (type == DEV_BLOCK)
299 seq_printf(m, "%c %s:%s %s\n", type_to_char(ex->type),
321 match_exception(struct list_head *exceptions, short type, u32 major, u32 minor, short access) argument
358 match_exception_partial(struct list_head *exceptions, short type, u32 major, u32 minor, short access) argument
812 __devcgroup_check_permission(short type, u32 major, u32 minor, short access) argument
838 short type, access = 0; local
855 short type; local
[all...]
/security/integrity/
H A Ddigsig.c19 #include <linux/key-type.h>
55 /* v1 API expect signature without xattr type */
H A Ddigsig_asymmetric.c17 #include <linux/key-type.h>
19 #include <keys/asymmetric-type.h>
H A Dintegrity.h68 u8 type; member in struct:evm_ima_xattr_data
80 u8 type; member in struct:ima_digest_data::__anon13::__anon14
83 u8 type; member in struct:ima_digest_data::__anon13::__anon15
95 uint8_t type; /* xattr type */ member in struct:signature_v2_hdr
/security/integrity/evm/
H A Devm_crypto.c21 #include <keys/encrypted-type.h>
35 static struct shash_desc *init_desc(char type) argument
42 if (type == EVM_XATTR_HMAC) {
62 if (type == EVM_XATTR_HMAC) {
132 char type, char *digest)
144 desc = init_desc(type);
209 xattr_data.type = EVM_XATTR_HMAC;
128 evm_calc_hmac_or_hash(struct dentry *dentry, const char *req_xattr_name, const char *req_xattr_value, size_t req_xattr_value_len, char type, char *digest) argument
H A Devm_main.c125 /* first need to know the sig type */
144 /* check value type */
145 switch (xattr_data->type) {
325 if (xattr_data->type != EVM_IMA_XATTR_DIGSIG)
445 xattr_data->type = EVM_XATTR_HMAC;
/security/integrity/ima/
H A Dima_appraise.c56 iint->ima_hash->xattr.sha1.type = IMA_XATTR_DIGEST;
59 iint->ima_hash->xattr.ng.type = IMA_XATTR_DIGEST_NG;
141 switch (xattr_value->type) {
222 switch (xattr_value->type) {
232 if (xattr_len - sizeof(xattr_value->type) - hash_start >=
274 xattr_value->type != EVM_IMA_XATTR_DIGSIG)) {
381 if (!xattr_value_len || (xvalue->type >= IMA_XATTR_LAST))
384 (xvalue->type == EVM_IMA_XATTR_DIGSIG) ? 1 : 0);
H A Dima_policy.c58 int type; /* audit type */ member in struct:ima_rule_entry::__anon10
147 result = security_filter_rule_init(entry->lsm[i].type,
203 rule->lsm[i].type,
213 rule->lsm[i].type,
261 * Measure decision based on func/mask/fsmagic and LSM(subj/obj/type)
420 entry->lsm[lsm_rule].type = audit_type;
421 result = security_filter_rule_init(entry->lsm[lsm_rule].type,
H A Dima_template_lib.c335 if ((!xattr_value) || (xattr_value->type != EVM_IMA_XATTR_DIGSIG))
/security/keys/
H A Dbig_key.c1 /* Large capacity key type
18 #include <keys/user-type.h>
19 #include <keys/big_key-type.h>
H A Dgc.c15 #include <keys/keyring-type.h>
45 * Any key whose type gets unregistered will be re-typed to this if it can't be
95 * Reap keys of dead type.
98 * collector: the first to mark keys of that type as being dead, the second to
154 if (key->type->destroy)
155 key->type->destroy(key);
225 if (key->type == key_gc_dead_keytype) {
242 if (key->type == key_gc_dead_keytype)
247 if (key->type == &key_type_keyring)
252 if (key->type
[all...]
H A Dinternal.h16 #include <linux/key-type.h>
88 extern struct key_type *key_type_lookup(const char *type);
146 extern struct key *request_key_and_link(struct key_type *type,
/security/keys/encrypted-keys/
H A Dencrypted.c24 #include <keys/user-type.h>
25 #include <keys/trusted-type.h>
26 #include <keys/encrypted-type.h>
27 #include <linux/key-type.h>
131 * valid_master_desc - verify the 'key-type:desc' of a new/updated master-key
133 * key-type:= "trusted:" | "user:"
136 * Verify that 'key-type' is valid and that 'desc' exists. On key update,
137 * only the master key description is permitted to change, not the key-type.
138 * The key-type remains constant.
H A Dmasterkey_trusted.c20 #include <keys/trusted-type.h>
21 #include <keys/encrypted-type.h>
28 * manages both trusted/encrypted key-types, like the encrypted key type
29 * data, trusted key type data is not visible decrypted from userspace.

Completed in 146 milliseconds

123