| /security/apparmor/ |
| A D | procattr.c | 77 static char *split_token_from_name(const char *op, char *args, u64 *token) in split_token_from_name() argument 81 *token = simple_strtoull(args, &name, 16); in split_token_from_name() 104 u64 token; in aa_setprocattr_changehat() local 108 hat = split_token_from_name(OP_CHANGE_HAT, args, &token); in aa_setprocattr_changehat() 112 if (!hat && !token) { in aa_setprocattr_changehat() 130 , __func__, current->pid, token, count, hat); in aa_setprocattr_changehat() 136 __func__, current->pid, token, count, "<NULL>"); in aa_setprocattr_changehat() 138 return aa_change_hat(hats, count, token, flags); in aa_setprocattr_changehat()
|
| A D | task.c | 104 ctx->token = stack; in aa_set_current_onexec() 117 int aa_set_current_hat(struct aa_label *label, u64 token) in aa_set_current_hat() argument 130 ctx->token = token; in aa_set_current_hat() 131 } else if (ctx->token == token) { in aa_set_current_hat() 157 int aa_restore_previous_label(u64 token) in aa_restore_previous_label() argument 162 if (ctx->token != token) in aa_restore_previous_label()
|
| A D | domain.c | 961 new = handle_onexec(subj_cred, label, ctx->onexec, ctx->token, in apparmor_bprm_creds_for_exec() 1221 int aa_change_hat(const char *hats[], int count, u64 token, int flags) in aa_change_hat() argument 1298 error = aa_set_current_hat(new, token); in aa_change_hat() 1320 error = aa_restore_previous_label(token); in aa_change_hat()
|
| /security/keys/encrypted-keys/ |
| A D | ecryptfs_format.c | 21 return auth_tok->token.password.session_key_encryption_key; in ecryptfs_get_auth_tok_key() 57 strncpy((char *)auth_tok->token.password.signature, key_desc, in ecryptfs_fill_auth_tok() 59 auth_tok->token.password.session_key_encryption_key_bytes = in ecryptfs_fill_auth_tok() 67 auth_tok->token.password.flags |= in ecryptfs_fill_auth_tok() 73 auth_tok->token.password.hash_algo = PGP_DIGEST_ALGO_SHA512; in ecryptfs_fill_auth_tok() 74 auth_tok->token.password.flags &= ~(ECRYPTFS_PERSISTENT_PASSWORD); in ecryptfs_fill_auth_tok()
|
| /security/ipe/ |
| A D | policy_parser.c | 97 char *token; in parse_version() local 100 while ((token = strsep(&ver, ".")) != NULL) { in parse_version() 105 rc = kstrtou16(token, 10, cv[sep_count]); in parse_version() 151 int token; in parse_header() local 161 if (token != idx) { in parse_header() 166 switch (token) { in parse_header() 204 static bool token_default(char *token) in token_default() argument 206 return !strcmp(token, "DEFAULT"); in token_default() 305 int token; in parse_property() local 314 switch (token) { in parse_property() [all …]
|
| /security/apparmor/include/ |
| A D | task.h | 29 u64 token; member 34 int aa_set_current_hat(struct aa_label *label, u64 token); 77 ctx->token = 0; in aa_clear_task_ctx_trans()
|
| A D | domain.h | 30 int aa_change_hat(const char *hats[], int count, u64 token, int flags);
|
| /security/keys/ |
| A D | keyctl_pkey.c | 43 int token; in keyctl_pkey_params_parse() local 48 token = match_token(p, param_keys, args); in keyctl_pkey_params_parse() 49 if (token == Opt_err) in keyctl_pkey_params_parse() 51 if (__test_and_set_bit(token, &token_mask)) in keyctl_pkey_params_parse() 57 switch (token) { in keyctl_pkey_params_parse()
|
| /security/integrity/ima/ |
| A D | ima_policy.c | 1385 char *token; in ima_parse_appraise_algos() local 1392 token); in ima_parse_appraise_algos() 1398 token); in ima_parse_appraise_algos() 1432 int token; in ima_parse_rule() local 1440 switch (token) { in ima_parse_rule() 1643 if ((token == Opt_uid_lt) || (token == Opt_euid_lt)) in ima_parse_rule() 1653 args[0].from, token); in ima_parse_rule() 1678 if ((token == Opt_gid_lt) || (token == Opt_egid_lt)) in ima_parse_rule() 1688 args[0].from, token); in ima_parse_rule() 2033 #define pt(token) policy_tokens[token].pattern argument [all …]
|
| /security/ |
| A D | security.c | 5715 struct bpf_token *token, bool kernel) in security_bpf_map_create() argument 5717 return call_int_hook(bpf_map_create, map, attr, token, kernel); in security_bpf_map_create() 5734 struct bpf_token *token, bool kernel) in security_bpf_prog_load() argument 5736 return call_int_hook(bpf_prog_load, prog, attr, token, kernel); in security_bpf_prog_load() 5753 return call_int_hook(bpf_token_create, token, attr, path); in security_bpf_token_create() 5767 int security_bpf_token_cmd(const struct bpf_token *token, enum bpf_cmd cmd) in security_bpf_token_cmd() argument 5769 return call_int_hook(bpf_token_cmd, token, cmd); in security_bpf_token_cmd() 5783 int security_bpf_token_capable(const struct bpf_token *token, int cap) in security_bpf_token_capable() argument 5785 return call_int_hook(bpf_token_capable, token, cap); in security_bpf_token_capable() 5816 void security_bpf_token_free(struct bpf_token *token) in security_bpf_token_free() argument [all …]
|
| /security/keys/trusted-keys/ |
| A D | trusted_tpm1.c | 748 int token; in getoptions() local 769 token = match_token(p, key_tokens, args); in getoptions() 770 if (test_and_set_bit(token, &token_mask)) in getoptions() 773 switch (token) { in getoptions()
|
| /security/selinux/ |
| A D | hooks.c | 1010 if (token == Opt_seclabel) in selinux_add_opt() 1028 switch (token) { in selinux_add_opt() 2607 int token; in selinux_sb_eat_lsm_opts() local 2610 token = match_opt_prefix(from, len, &arg); in selinux_sb_eat_lsm_opts() 2612 if (token != Opt_error) { in selinux_sb_eat_lsm_opts() 2628 rc = selinux_add_opt(token, arg, mnt_opts); in selinux_sb_eat_lsm_opts() 7102 struct bpf_token *token, bool kernel) in selinux_bpf_map_create() argument 7125 struct bpf_token *token, bool kernel) in selinux_bpf_prog_load() argument 7157 token->security = bpfsec; in selinux_bpf_token_create() 7164 struct bpf_security_struct *bpfsec = token->security; in selinux_bpf_token_free() [all …]
|
| /security/smack/ |
| A D | smack_lsm.c | 559 static int smack_add_opt(int token, const char *s, void **mnt_opts) in smack_add_opt() argument 577 switch (token) { in smack_add_opt() 731 int token, len, rc; in smack_sb_eat_lsm_opts() local 739 token = match_opt_prefix(from, len, &arg); in smack_sb_eat_lsm_opts() 740 if (token != Opt_error) { in smack_sb_eat_lsm_opts() 742 rc = smack_add_opt(token, arg, mnt_opts); in smack_sb_eat_lsm_opts()
|