Searched refs:x (Results 1 – 9 of 9) sorted by relevance
| /security/selinux/ |
| A D | xfrm.c | 178 if (x->security) in selinux_xfrm_state_pol_flow_match() 185 if (!x->security) in selinux_xfrm_state_pol_flow_match() 193 state_sid = x->security->ctx_sid; in selinux_xfrm_state_pol_flow_match() 210 struct xfrm_state *x; in selinux_xfrm_skb_sid_egress() local 214 x = dst->xfrm; in selinux_xfrm_skb_sid_egress() 215 if (x == NULL || !selinux_authorizable_xfrm(x)) in selinux_xfrm_skb_sid_egress() 218 return x->security->ctx_sid; in selinux_xfrm_skb_sid_egress() 369 x->security = ctx; in selinux_xfrm_state_alloc_acquire() 381 selinux_xfrm_free(x->security); in selinux_xfrm_state_free() 410 if (x && selinux_authorizable_xfrm(x)) { in selinux_xfrm_sock_rcv_skb() [all …]
|
| /security/selinux/include/ |
| A D | xfrm.h | 22 int selinux_xfrm_state_alloc(struct xfrm_state *x, 24 int selinux_xfrm_state_alloc_acquire(struct xfrm_state *x, 26 void selinux_xfrm_state_free(struct xfrm_state *x); 27 int selinux_xfrm_state_delete(struct xfrm_state *x); 29 int selinux_xfrm_state_pol_flow_match(struct xfrm_state *x,
|
| A D | security.h | 241 #define security_xperm_set(perms, x) ((perms)[(x) >> 5] |= 1 << ((x)&0x1f)) argument 242 #define security_xperm_test(perms, x) (1 & ((perms)[(x) >> 5] >> ((x)&0x1f))) argument
|
| /security/tomoyo/ |
| A D | Makefile | 8 $(foreach x, profile exception_policy domain_policy manager stat, \ 10 …g' -e 's/\"/\\"/g' -e 's/\(.*\)/\t"\1\\n"/' -- $(firstword $(filter %/$x.conf %/$x.conf.default, $…
|
| /security/apparmor/ |
| A D | policy_compat.c | 197 static u32 map_other(u32 x) in map_other() argument 199 return ((x & 0x3) << 8) | /* SETATTR/GETATTR */ in map_other() 200 ((x & 0x1c) << 18) | /* ACCEPT/BIND/LISTEN */ in map_other() 201 ((x & 0x60) << 19); /* SETOPT/GETOPT */ in map_other() 204 static u32 map_xbits(u32 x) in map_xbits() argument 206 return ((x & 0x1) << 7) | in map_xbits() 207 ((x & 0x7e) << 9); in map_xbits()
|
| /security/keys/ |
| A D | keyring.c | 36 static inline bool keyring_ptr_is_keyring(const struct assoc_array_ptr *x) in keyring_ptr_is_keyring() argument 38 return (unsigned long)x & KEYRING_PTR_SUBTYPE; in keyring_ptr_is_keyring() 40 static inline struct key *keyring_ptr_to_key(const struct assoc_array_ptr *x) in keyring_ptr_to_key() argument 42 void *object = assoc_array_ptr_to_leaf(x); in keyring_ptr_to_key() 153 static u64 mult_64x32_and_fold(u64 x, u32 y) in mult_64x32_and_fold() argument 155 u64 hi = (u64)(u32)(x >> 32) * y; in mult_64x32_and_fold() 156 u64 lo = (u64)(u32)(x) * y; in mult_64x32_and_fold() 280 return index_key->x; in keyring_get_key_chunk() 344 seg_a = a->x; in keyring_diff_objects() 345 seg_b = b->x; in keyring_diff_objects()
|
| /security/ipe/ |
| A D | audit.c | 18 #define ACTSTR(x) ((x) == IPE_ACTION_ALLOW ? "ALLOW" : "DENY") argument
|
| /security/selinux/ss/ |
| A D | ebitmap.h | 33 #define EBITMAP_SHIFT_UNIT_SIZE(x) \ argument 34 (((x) >> EBITMAP_UNIT_SIZE / 2) >> EBITMAP_UNIT_SIZE / 2)
|
| /security/ |
| A D | security.c | 5372 int security_xfrm_state_alloc(struct xfrm_state *x, in security_xfrm_state_alloc() argument 5375 return call_int_hook(xfrm_state_alloc, x, sec_ctx); in security_xfrm_state_alloc() 5391 int security_xfrm_state_alloc_acquire(struct xfrm_state *x, in security_xfrm_state_alloc_acquire() argument 5394 return call_int_hook(xfrm_state_alloc_acquire, x, polsec, secid); in security_xfrm_state_alloc_acquire() 5405 int security_xfrm_state_delete(struct xfrm_state *x) in security_xfrm_state_delete() argument 5407 return call_int_hook(xfrm_state_delete_security, x); in security_xfrm_state_delete() 5417 void security_xfrm_state_free(struct xfrm_state *x) in security_xfrm_state_free() argument 5419 call_void_hook(xfrm_state_free_security, x); in security_xfrm_state_free() 5449 int security_xfrm_state_pol_flow_match(struct xfrm_state *x, in security_xfrm_state_pol_flow_match() argument 5466 rc = scall->hl->hook.xfrm_state_pol_flow_match(x, xp, flic); in security_xfrm_state_pol_flow_match()
|
Completed in 25 milliseconds