| /security/apparmor/ |
| A D | ipc.c | 21 static inline int map_signal_num(int sig) in map_signal_num() argument 23 if (sig > SIGRTMAX) in map_signal_num() 25 else if (sig >= SIGRTMIN) in map_signal_num() 26 return sig - SIGRTMIN + SIGRT_BASE; in map_signal_num() 27 else if (sig < MAXMAPPED_SIG) in map_signal_num() 28 return sig_map[sig]; in map_signal_num() 104 int sig) in aa_may_signal() argument 109 ad.signal = map_signal_num(sig); in aa_may_signal() 110 ad.unmappedsig = sig; in aa_may_signal()
|
| A D | lsm.c | 1028 int sig, const struct cred *cred) in apparmor_task_kill() argument 1042 error = aa_may_signal(cred, cl, tc, tl, sig); in apparmor_task_kill() 1046 error = aa_may_signal(current_cred(), cl, tc, tl, sig); in apparmor_task_kill()
|
| /security/integrity/ima/ |
| A D | ima_modsig.c | 44 const struct module_signature *sig; in ima_read_modsig() local 50 if (buf_len <= marker_len + sizeof(*sig)) in ima_read_modsig() 58 sig = (const struct module_signature *)(p - sizeof(*sig)); in ima_read_modsig() 60 rc = mod_check_sig(sig, buf_len, func_tokens[func]); in ima_read_modsig() 64 sig_len = be32_to_cpu(sig->sig_len); in ima_read_modsig() 65 buf_len -= sig_len + sizeof(*sig); in ima_read_modsig()
|
| A D | ima_appraise.c | 182 struct signature_v2_hdr *sig; in ima_get_hash_algo() local 191 sig = (typeof(sig))xattr_value; in ima_get_hash_algo() 192 if (sig->version != 3 || xattr_len <= sizeof(*sig) || in ima_get_hash_algo() 195 return sig->hash_algo; in ima_get_hash_algo() 197 sig = (typeof(sig))xattr_value; in ima_get_hash_algo() 198 if (sig->version != 2 || xattr_len <= sizeof(*sig) in ima_get_hash_algo() 201 return sig->hash_algo; in ima_get_hash_algo() 334 sig = (typeof(sig))xattr_value; in xattr_verify() 335 if (sig->version >= 3) { in xattr_verify() 374 sig = (typeof(sig))xattr_value; in xattr_verify() [all …]
|
| A D | Kconfig | 79 bool "ima-sig" 85 default "ima-sig" if IMA_SIG_TEMPLATE
|
| /security/integrity/ |
| A D | integrity.h | 98 uint8_t sig[]; /* signature payload */ member 130 int integrity_digsig_verify(const unsigned int id, const char *sig, int siglen, 141 const char *sig, int siglen, in integrity_digsig_verify() argument 168 int asymmetric_verify(struct key *keyring, const char *sig, 171 static inline int asymmetric_verify(struct key *keyring, const char *sig, in asymmetric_verify() argument
|
| A D | digsig.c | 61 int integrity_digsig_verify(const unsigned int id, const char *sig, int siglen, in integrity_digsig_verify() argument 73 switch (sig[1]) { in integrity_digsig_verify() 76 return digsig_verify(keyring, sig + 1, siglen - 1, digest, in integrity_digsig_verify() 80 return asymmetric_verify(keyring, sig, siglen, digest, in integrity_digsig_verify()
|
| A D | digsig_asymmetric.c | 82 int asymmetric_verify(struct key *keyring, const char *sig, in asymmetric_verify() argument 86 struct signature_v2_hdr *hdr = (struct signature_v2_hdr *)sig; in asymmetric_verify() 126 pks.s = hdr->sig; in asymmetric_verify()
|
| /security/apparmor/include/ |
| A D | ipc.h | 21 int sig);
|
| /security/landlock/ |
| A D | task.c | 339 struct kernel_siginfo *const info, const int sig, in hook_task_kill() argument
|
| /security/ |
| A D | security.c | 3110 struct fown_struct *fown, int sig) in security_file_send_sigiotask() argument 3112 return call_int_hook(file_send_sigiotask, tsk, fown, sig); in security_file_send_sigiotask() 3703 int sig, const struct cred *cred) in security_task_kill() argument 3705 return call_int_hook(task_kill, p, info, sig, cred); in security_task_kill()
|
| /security/selinux/ |
| A D | hooks.c | 1598 static inline u32 signal_to_av(int sig) in signal_to_av() argument 1602 switch (sig) { in signal_to_av() 4440 int sig, const struct cred *cred) in selinux_task_kill() argument 4445 if (!sig) in selinux_task_kill() 4448 perm = signal_to_av(sig); in selinux_task_kill()
|
| /security/smack/ |
| A D | smack_lsm.c | 2340 int sig, const struct cred *cred) in smack_task_kill() argument 2347 if (!sig) in smack_task_kill()
|