| /security/integrity/platform_certs/ |
| A D | machine_keyring.c | 24 void __init add_to_machine_keyring(const char *source, const void *data, size_t len) in add_to_machine_keyring() argument 30 rc = integrity_load_cert(INTEGRITY_KEYRING_MACHINE, source, data, len, perm); in add_to_machine_keyring() 39 rc = integrity_load_cert(INTEGRITY_KEYRING_PLATFORM, source, in add_to_machine_keyring() 43 pr_info("Error adding keys to machine keyring %s\n", source); in add_to_machine_keyring()
|
| A D | platform_keyring.c | 26 void __init add_to_platform_keyring(const char *source, const void *data, in add_to_platform_keyring() argument 34 rc = integrity_load_cert(INTEGRITY_KEYRING_PLATFORM, source, data, len, in add_to_platform_keyring() 37 pr_info("Error adding keys to platform keyring %s\n", source); in add_to_platform_keyring()
|
| A D | keyring_handler.h | 8 void blacklist_hash(const char *source, const void *data, 15 void blacklist_x509_tbs(const char *source, const void *data, size_t len); 20 void blacklist_binary(const char *source, const void *data, size_t len);
|
| A D | keyring_handler.c | 22 static __init void uefi_blacklist_x509_tbs(const char *source, in uefi_blacklist_x509_tbs() argument 31 static __init void uefi_blacklist_binary(const char *source, in uefi_blacklist_binary() argument 40 static __init void uefi_revocation_list_x509(const char *source, in uefi_revocation_list_x509() argument
|
| A D | efi_parser.c | 38 const char *source, in parse_efi_signature_list() argument 97 handler(source, in parse_efi_signature_list()
|
| /security/integrity/ |
| A D | integrity.h | 136 int __init integrity_load_cert(const unsigned int id, const char *source, 159 const char *source, in integrity_load_cert() argument 246 void __init add_to_platform_keyring(const char *source, const void *data, 249 static inline void __init add_to_platform_keyring(const char *source, in add_to_platform_keyring() argument 256 void __init add_to_machine_keyring(const char *source, const void *data, size_t len); 259 static inline void __init add_to_machine_keyring(const char *source, in add_to_machine_keyring() argument
|
| A D | digsig.c | 218 int __init integrity_load_cert(const unsigned int id, const char *source, in integrity_load_cert() argument 224 pr_info("Loading X.509 certificate: %s\n", source); in integrity_load_cert()
|
| A D | Kconfig | 133 source "security/integrity/ima/Kconfig" 134 source "security/integrity/evm/Kconfig"
|
| /security/ |
| A D | Kconfig | 8 source "security/keys/Kconfig" 223 source "security/selinux/Kconfig" 224 source "security/smack/Kconfig" 225 source "security/tomoyo/Kconfig" 226 source "security/apparmor/Kconfig" 227 source "security/loadpin/Kconfig" 228 source "security/yama/Kconfig" 229 source "security/safesetid/Kconfig" 230 source "security/lockdown/Kconfig" 231 source "security/landlock/Kconfig" [all …]
|
| A D | lsm_audit.c | 59 ad->u.net->sport = th->source; in ipv4_skb_to_auditdata() 66 ad->u.net->sport = uh->source; in ipv4_skb_to_auditdata() 73 ad->u.net->sport = sh->source; in ipv4_skb_to_auditdata() 120 ad->u.net->sport = th->source; in ipv6_skb_to_auditdata() 131 ad->u.net->sport = uh->source; in ipv6_skb_to_auditdata() 141 ad->u.net->sport = sh->source; in ipv6_skb_to_auditdata()
|
| A D | commoncap.c | 852 #define __cap_gained(field, target, source) \ argument 853 !cap_issubset(target->cap_##field, source->cap_##field) 854 #define __cap_grew(target, source, cred) \ argument 855 !cap_issubset(cred->cap_##target, cred->cap_##source)
|
| A D | Kconfig.hardening | 292 source tree isn't cleaned after kernel installation).
|
| /security/keys/trusted-keys/ |
| A D | Kconfig | 51 comment "No trust source selected!"
|
| A D | trusted_core.c | 33 module_param_named(source, trusted_key_source, charp, 0); 34 MODULE_PARM_DESC(source, "Select trusted keys source (tpm, tee, caam or dcp)");
|
| /security/keys/ |
| A D | Kconfig | 77 generated and sealed by a trust source selected at kernel boot-time. 83 source "security/keys/trusted-keys/Kconfig"
|
| /security/selinux/ss/ |
| A D | services.c | 542 struct type_datum *source; in type_attribute_bounds_av() local 546 source = policydb->type_val_to_struct[scontext->type - 1]; in type_attribute_bounds_av() 547 BUG_ON(!source); in type_attribute_bounds_av() 549 if (!source->bounds) in type_attribute_bounds_av() 558 lo_scontext.type = source->bounds; in type_attribute_bounds_av()
|
| /security/selinux/ |
| A D | hooks.c | 4512 ad->u.net->sport = th->source; in selinux_parse_skb_ipv4() 4528 ad->u.net->sport = uh->source; in selinux_parse_skb_ipv4() 4545 ad->u.net->sport = sh->source; in selinux_parse_skb_ipv4() 4594 ad->u.net->sport = th->source; in selinux_parse_skb_ipv6() 4606 ad->u.net->sport = uh->source; in selinux_parse_skb_ipv6() 4619 ad->u.net->sport = sh->source; in selinux_parse_skb_ipv6()
|
| /security/smack/ |
| A D | smack_lsm.c | 4083 sip->sin6_port = th->source; in smk_skb_to_addr_ipv6() 4089 sip->sin6_port = uh->source; in smk_skb_to_addr_ipv6()
|