Home
last modified time | relevance | path

Searched refs:token (Results 1 – 13 of 13) sorted by relevance

/security/apparmor/
A Dprocattr.c77 static char *split_token_from_name(const char *op, char *args, u64 *token) in split_token_from_name() argument
81 *token = simple_strtoull(args, &name, 16); in split_token_from_name()
104 u64 token; in aa_setprocattr_changehat() local
108 hat = split_token_from_name(OP_CHANGE_HAT, args, &token); in aa_setprocattr_changehat()
112 if (!hat && !token) { in aa_setprocattr_changehat()
130 , __func__, current->pid, token, count, hat); in aa_setprocattr_changehat()
136 __func__, current->pid, token, count, "<NULL>"); in aa_setprocattr_changehat()
138 return aa_change_hat(hats, count, token, flags); in aa_setprocattr_changehat()
A Dtask.c104 ctx->token = stack; in aa_set_current_onexec()
117 int aa_set_current_hat(struct aa_label *label, u64 token) in aa_set_current_hat() argument
130 ctx->token = token; in aa_set_current_hat()
131 } else if (ctx->token == token) { in aa_set_current_hat()
157 int aa_restore_previous_label(u64 token) in aa_restore_previous_label() argument
162 if (ctx->token != token) in aa_restore_previous_label()
A Ddomain.c961 new = handle_onexec(subj_cred, label, ctx->onexec, ctx->token, in apparmor_bprm_creds_for_exec()
1221 int aa_change_hat(const char *hats[], int count, u64 token, int flags) in aa_change_hat() argument
1298 error = aa_set_current_hat(new, token); in aa_change_hat()
1320 error = aa_restore_previous_label(token); in aa_change_hat()
/security/keys/encrypted-keys/
A Decryptfs_format.c21 return auth_tok->token.password.session_key_encryption_key; in ecryptfs_get_auth_tok_key()
57 strncpy((char *)auth_tok->token.password.signature, key_desc, in ecryptfs_fill_auth_tok()
59 auth_tok->token.password.session_key_encryption_key_bytes = in ecryptfs_fill_auth_tok()
67 auth_tok->token.password.flags |= in ecryptfs_fill_auth_tok()
73 auth_tok->token.password.hash_algo = PGP_DIGEST_ALGO_SHA512; in ecryptfs_fill_auth_tok()
74 auth_tok->token.password.flags &= ~(ECRYPTFS_PERSISTENT_PASSWORD); in ecryptfs_fill_auth_tok()
/security/ipe/
A Dpolicy_parser.c97 char *token; in parse_version() local
100 while ((token = strsep(&ver, ".")) != NULL) { in parse_version()
105 rc = kstrtou16(token, 10, cv[sep_count]); in parse_version()
151 int token; in parse_header() local
161 if (token != idx) { in parse_header()
166 switch (token) { in parse_header()
204 static bool token_default(char *token) in token_default() argument
206 return !strcmp(token, "DEFAULT"); in token_default()
305 int token; in parse_property() local
314 switch (token) { in parse_property()
[all …]
/security/apparmor/include/
A Dtask.h29 u64 token; member
34 int aa_set_current_hat(struct aa_label *label, u64 token);
77 ctx->token = 0; in aa_clear_task_ctx_trans()
A Ddomain.h30 int aa_change_hat(const char *hats[], int count, u64 token, int flags);
/security/keys/
A Dkeyctl_pkey.c43 int token; in keyctl_pkey_params_parse() local
48 token = match_token(p, param_keys, args); in keyctl_pkey_params_parse()
49 if (token == Opt_err) in keyctl_pkey_params_parse()
51 if (__test_and_set_bit(token, &token_mask)) in keyctl_pkey_params_parse()
57 switch (token) { in keyctl_pkey_params_parse()
/security/integrity/ima/
A Dima_policy.c1385 char *token; in ima_parse_appraise_algos() local
1392 token); in ima_parse_appraise_algos()
1398 token); in ima_parse_appraise_algos()
1432 int token; in ima_parse_rule() local
1440 switch (token) { in ima_parse_rule()
1643 if ((token == Opt_uid_lt) || (token == Opt_euid_lt)) in ima_parse_rule()
1653 args[0].from, token); in ima_parse_rule()
1678 if ((token == Opt_gid_lt) || (token == Opt_egid_lt)) in ima_parse_rule()
1688 args[0].from, token); in ima_parse_rule()
2033 #define pt(token) policy_tokens[token].pattern argument
[all …]
/security/
A Dsecurity.c5715 struct bpf_token *token, bool kernel) in security_bpf_map_create() argument
5717 return call_int_hook(bpf_map_create, map, attr, token, kernel); in security_bpf_map_create()
5734 struct bpf_token *token, bool kernel) in security_bpf_prog_load() argument
5736 return call_int_hook(bpf_prog_load, prog, attr, token, kernel); in security_bpf_prog_load()
5753 return call_int_hook(bpf_token_create, token, attr, path); in security_bpf_token_create()
5767 int security_bpf_token_cmd(const struct bpf_token *token, enum bpf_cmd cmd) in security_bpf_token_cmd() argument
5769 return call_int_hook(bpf_token_cmd, token, cmd); in security_bpf_token_cmd()
5783 int security_bpf_token_capable(const struct bpf_token *token, int cap) in security_bpf_token_capable() argument
5785 return call_int_hook(bpf_token_capable, token, cap); in security_bpf_token_capable()
5816 void security_bpf_token_free(struct bpf_token *token) in security_bpf_token_free() argument
[all …]
/security/keys/trusted-keys/
A Dtrusted_tpm1.c748 int token; in getoptions() local
769 token = match_token(p, key_tokens, args); in getoptions()
770 if (test_and_set_bit(token, &token_mask)) in getoptions()
773 switch (token) { in getoptions()
/security/selinux/
A Dhooks.c1010 if (token == Opt_seclabel) in selinux_add_opt()
1028 switch (token) { in selinux_add_opt()
2607 int token; in selinux_sb_eat_lsm_opts() local
2610 token = match_opt_prefix(from, len, &arg); in selinux_sb_eat_lsm_opts()
2612 if (token != Opt_error) { in selinux_sb_eat_lsm_opts()
2628 rc = selinux_add_opt(token, arg, mnt_opts); in selinux_sb_eat_lsm_opts()
7102 struct bpf_token *token, bool kernel) in selinux_bpf_map_create() argument
7125 struct bpf_token *token, bool kernel) in selinux_bpf_prog_load() argument
7157 token->security = bpfsec; in selinux_bpf_token_create()
7164 struct bpf_security_struct *bpfsec = token->security; in selinux_bpf_token_free()
[all …]
/security/smack/
A Dsmack_lsm.c559 static int smack_add_opt(int token, const char *s, void **mnt_opts) in smack_add_opt() argument
577 switch (token) { in smack_add_opt()
731 int token, len, rc; in smack_sb_eat_lsm_opts() local
739 token = match_opt_prefix(from, len, &arg); in smack_sb_eat_lsm_opts()
740 if (token != Opt_error) { in smack_sb_eat_lsm_opts()
742 rc = smack_add_opt(token, arg, mnt_opts); in smack_sb_eat_lsm_opts()

Completed in 52 milliseconds