Home
last modified time | relevance | path

Searched refs:version (Results 1 – 25 of 25) sorted by relevance

/security/apparmor/
A Dpolicy_compat.c212 u32 version) in compute_perms_entry() argument
232 if (VERSION_LE(version, v8)) in compute_perms_entry()
243 if (VERSION_GT(version, v8)) in compute_perms_entry()
249 static struct aa_perms *compute_perms(struct aa_dfa *dfa, u32 version, in compute_perms() argument
267 table[state] = compute_perms_entry(dfa, state, version); in compute_perms()
307 int aa_compat_map_policy(struct aa_policydb *policy, u32 version) in aa_compat_map_policy() argument
309 policy->perms = compute_perms(policy->dfa, version, &policy->size); in aa_compat_map_policy()
A Dcrypto.c36 int aa_calc_profile_hash(struct aa_profile *profile, u32 version, void *start, in aa_calc_profile_hash() argument
40 __le32 le32_version = cpu_to_le32(version); in aa_calc_profile_hash()
A Dpolicy_unpack.c651 if (version != 1) in unpack_perm()
683 u32 version; in unpack_perms_table() local
685 if (!aa_unpack_u32(e, &version, "version")) in unpack_perms_table()
693 if (!unpack_perm(e, version, &(*perms)[i])) in unpack_perms_table()
720 u32 version = 0; in unpack_pdb() local
738 if (aa_unpack_u32(e, &version, "permsv") && version > 2) in unpack_pdb()
1046 e->version); in unpack_profile()
1171 if (!aa_unpack_u32(e, &e->version, "version")) { in verify_header()
1183 if (VERSION_LT(e->version, v5) || VERSION_GT(e->version, v9)) { in verify_header()
1488 error = aa_calc_profile_hash(profile, e.version, start, in aa_unpack()
[all …]
/security/apparmor/include/
A Dcrypto.h18 int aa_calc_profile_hash(struct aa_profile *profile, u32 version, void *start,
25 static inline int aa_calc_profile_hash(struct aa_profile *profile, u32 version, in aa_calc_profile_hash() argument
A Dpolicy_compat.h30 int aa_compat_map_policy(struct aa_policydb *policy, u32 version);
A Dpolicy_unpack.h87 u32 version; member
/security/ipe/
A Dpolicy.c34 r = (((u64)p->parsed->version.major) << 32) in ver_to_u64()
35 | (((u64)p->parsed->version.minor) << 16) in ver_to_u64()
36 | ((u64)(p->parsed->version.rev)); in ver_to_u64()
A Daudit.c190 p->parsed->version.major, p->parsed->version.minor, in audit_policy()
191 p->parsed->version.rev); in audit_policy()
A Dpolicy_fs.c184 p->parsed->version.major, p->parsed->version.minor, in read_version()
185 p->parsed->version.rev); in read_version()
A Dpolicy_parser.c95 u16 *const cv[] = { &p->version.major, &p->version.minor, &p->version.rev }; in parse_version()
A Dpolicy.h71 } version; member
/security/integrity/ima/
A Dima_kexec.c95 khdr.version = 1; in ima_dump_measurement_list()
113 khdr.version = cpu_to_le16(khdr.version); in ima_dump_measurement_list()
A Dima_template.c437 khdr->version = le16_to_cpu((__force __le16)khdr->version); in ima_restore_measurement_list()
442 if (khdr->version != 1) { in ima_restore_measurement_list()
A Dima_appraise.c192 if (sig->version != 3 || xattr_len <= sizeof(*sig) || in ima_get_hash_algo()
198 if (sig->version != 2 || xattr_len <= sizeof(*sig) in ima_get_hash_algo()
335 if (sig->version >= 3) { in xattr_verify()
375 if (sig->version != 3) { in xattr_verify()
A Dima_iint.c62 iint->real_inode.version = 0; in ima_iint_init_always()
A Dima_api.c309 iint->real_inode.version = i_version; in ima_collect_measurement()
A Dima.h123 u16 version; member
A Dima_main.c205 stat.change_cookie != iint->real_inode.version) { in ima_check_last_writer()
/security/integrity/evm/
A DKconfig18 bool "FSUUID (version 2)"
24 Default value is 'selected', which is former version 2.
25 if 'not selected', it is former version 1
/security/selinux/ss/
A Dpolicydb.c56 unsigned int version; member
64 .version = POLICYDB_VERSION_BASE,
69 .version = POLICYDB_VERSION_BOOL,
74 .version = POLICYDB_VERSION_IPV6,
79 .version = POLICYDB_VERSION_NLCLASS,
84 .version = POLICYDB_VERSION_MLS,
89 .version = POLICYDB_VERSION_AVTAB,
99 .version = POLICYDB_VERSION_POLCAP,
109 .version = POLICYDB_VERSION_BOUNDARY,
149 .version = POLICYDB_VERSION_GLBLUB,
[all …]
/security/keys/encrypted-keys/
A Decryptfs_format.c54 auth_tok->version = (((uint16_t)(major << 8) & 0xFF00) in ecryptfs_fill_auth_tok()
/security/selinux/
A Dstatus.c54 status->version = SELINUX_KERNEL_STATUS_VERSION; in selinux_kernel_status_page()
A Dnetlabel.c298 if (ip_hdr(skb)->version == 4) { in selinux_netlbl_sctp_assoc_request()
302 } else if (IS_ENABLED(CONFIG_IPV6) && ip_hdr(skb)->version == 6) { in selinux_netlbl_sctp_assoc_request()
/security/integrity/
A Dintegrity.h94 uint8_t version; /* signature format version */ member
/security/selinux/include/
A Dsecurity.h381 u32 version; /* version number of the structure */ member

Completed in 47 milliseconds