| /security/apparmor/ |
| A D | policy_compat.c | 212 u32 version) in compute_perms_entry() argument 232 if (VERSION_LE(version, v8)) in compute_perms_entry() 243 if (VERSION_GT(version, v8)) in compute_perms_entry() 249 static struct aa_perms *compute_perms(struct aa_dfa *dfa, u32 version, in compute_perms() argument 267 table[state] = compute_perms_entry(dfa, state, version); in compute_perms() 307 int aa_compat_map_policy(struct aa_policydb *policy, u32 version) in aa_compat_map_policy() argument 309 policy->perms = compute_perms(policy->dfa, version, &policy->size); in aa_compat_map_policy()
|
| A D | crypto.c | 36 int aa_calc_profile_hash(struct aa_profile *profile, u32 version, void *start, in aa_calc_profile_hash() argument 40 __le32 le32_version = cpu_to_le32(version); in aa_calc_profile_hash()
|
| A D | policy_unpack.c | 651 if (version != 1) in unpack_perm() 683 u32 version; in unpack_perms_table() local 685 if (!aa_unpack_u32(e, &version, "version")) in unpack_perms_table() 693 if (!unpack_perm(e, version, &(*perms)[i])) in unpack_perms_table() 720 u32 version = 0; in unpack_pdb() local 738 if (aa_unpack_u32(e, &version, "permsv") && version > 2) in unpack_pdb() 1046 e->version); in unpack_profile() 1171 if (!aa_unpack_u32(e, &e->version, "version")) { in verify_header() 1183 if (VERSION_LT(e->version, v5) || VERSION_GT(e->version, v9)) { in verify_header() 1488 error = aa_calc_profile_hash(profile, e.version, start, in aa_unpack() [all …]
|
| /security/apparmor/include/ |
| A D | crypto.h | 18 int aa_calc_profile_hash(struct aa_profile *profile, u32 version, void *start, 25 static inline int aa_calc_profile_hash(struct aa_profile *profile, u32 version, in aa_calc_profile_hash() argument
|
| A D | policy_compat.h | 30 int aa_compat_map_policy(struct aa_policydb *policy, u32 version);
|
| A D | policy_unpack.h | 87 u32 version; member
|
| /security/ipe/ |
| A D | policy.c | 34 r = (((u64)p->parsed->version.major) << 32) in ver_to_u64() 35 | (((u64)p->parsed->version.minor) << 16) in ver_to_u64() 36 | ((u64)(p->parsed->version.rev)); in ver_to_u64()
|
| A D | audit.c | 190 p->parsed->version.major, p->parsed->version.minor, in audit_policy() 191 p->parsed->version.rev); in audit_policy()
|
| A D | policy_fs.c | 184 p->parsed->version.major, p->parsed->version.minor, in read_version() 185 p->parsed->version.rev); in read_version()
|
| A D | policy_parser.c | 95 u16 *const cv[] = { &p->version.major, &p->version.minor, &p->version.rev }; in parse_version()
|
| A D | policy.h | 71 } version; member
|
| /security/integrity/ima/ |
| A D | ima_kexec.c | 95 khdr.version = 1; in ima_dump_measurement_list() 113 khdr.version = cpu_to_le16(khdr.version); in ima_dump_measurement_list()
|
| A D | ima_template.c | 437 khdr->version = le16_to_cpu((__force __le16)khdr->version); in ima_restore_measurement_list() 442 if (khdr->version != 1) { in ima_restore_measurement_list()
|
| A D | ima_appraise.c | 192 if (sig->version != 3 || xattr_len <= sizeof(*sig) || in ima_get_hash_algo() 198 if (sig->version != 2 || xattr_len <= sizeof(*sig) in ima_get_hash_algo() 335 if (sig->version >= 3) { in xattr_verify() 375 if (sig->version != 3) { in xattr_verify()
|
| A D | ima_iint.c | 62 iint->real_inode.version = 0; in ima_iint_init_always()
|
| A D | ima_api.c | 309 iint->real_inode.version = i_version; in ima_collect_measurement()
|
| A D | ima.h | 123 u16 version; member
|
| A D | ima_main.c | 205 stat.change_cookie != iint->real_inode.version) { in ima_check_last_writer()
|
| /security/integrity/evm/ |
| A D | Kconfig | 18 bool "FSUUID (version 2)" 24 Default value is 'selected', which is former version 2. 25 if 'not selected', it is former version 1
|
| /security/selinux/ss/ |
| A D | policydb.c | 56 unsigned int version; member 64 .version = POLICYDB_VERSION_BASE, 69 .version = POLICYDB_VERSION_BOOL, 74 .version = POLICYDB_VERSION_IPV6, 79 .version = POLICYDB_VERSION_NLCLASS, 84 .version = POLICYDB_VERSION_MLS, 89 .version = POLICYDB_VERSION_AVTAB, 99 .version = POLICYDB_VERSION_POLCAP, 109 .version = POLICYDB_VERSION_BOUNDARY, 149 .version = POLICYDB_VERSION_GLBLUB, [all …]
|
| /security/keys/encrypted-keys/ |
| A D | ecryptfs_format.c | 54 auth_tok->version = (((uint16_t)(major << 8) & 0xFF00) in ecryptfs_fill_auth_tok()
|
| /security/selinux/ |
| A D | status.c | 54 status->version = SELINUX_KERNEL_STATUS_VERSION; in selinux_kernel_status_page()
|
| A D | netlabel.c | 298 if (ip_hdr(skb)->version == 4) { in selinux_netlbl_sctp_assoc_request() 302 } else if (IS_ENABLED(CONFIG_IPV6) && ip_hdr(skb)->version == 6) { in selinux_netlbl_sctp_assoc_request()
|
| /security/integrity/ |
| A D | integrity.h | 94 uint8_t version; /* signature format version */ member
|
| /security/selinux/include/ |
| A D | security.h | 381 u32 version; /* version number of the structure */ member
|