/security/keys/ |
D | process_keys.c | 324 key_match_func_t match, in search_my_process_keyrings() argument 345 cred, type, description, match, no_state_check); in search_my_process_keyrings() 364 cred, type, description, match, no_state_check); in search_my_process_keyrings() 386 cred, type, description, match, no_state_check); in search_my_process_keyrings() 408 cred, type, description, match, no_state_check); in search_my_process_keyrings() 442 key_match_func_t match, in search_process_keyrings() argument 450 key_ref = search_my_process_keyrings(type, description, match, in search_process_keyrings() 471 match, rka->cred); in search_process_keyrings()
|
D | internal.h | 116 key_match_func_t match, 121 key_match_func_t match, 126 key_match_func_t match,
|
D | user_defined.c | 31 .match = user_match, 50 .match = user_match,
|
D | keyring.c | 81 .match = keyring_match, 320 key_match_func_t match, in keyring_search_aux() argument 363 if (keyring->type == type && match(keyring, description)) { in keyring_search_aux() 422 if (!match(key, description)) in keyring_search_aux() 516 if (!type->match) in keyring_search() 520 type, description, type->match, false); in keyring_search() 561 (!key->type->match || in __keyring_search_one() 562 key->type->match(key, description)) && in __keyring_search_one()
|
D | request_key.c | 393 key_ref = search_process_keyrings(type, description, type->match, cred); in construct_alloc_key() 542 key_ref = search_process_keyrings(type, description, type->match, cred); in request_key_and_link()
|
D | Kconfig | 32 if the boot PCRs and other criteria match. Userspace will only ever
|
D | key.c | 800 if (!ktype->match || !ktype->instantiate || in key_create_or_update()
|
D | trusted.c | 1099 .match = user_match,
|
/security/tomoyo/ |
D | condition.c | 227 const bool match) in tomoyo_scan_exec_realpath() argument 239 return result == match; in tomoyo_scan_exec_realpath() 777 const bool match = condp->equals; in tomoyo_condition() local 797 == match) in tomoyo_condition() 804 match)) in tomoyo_condition() 1048 == match) in tomoyo_condition() 1052 max_v[0] >= ptr->values[0]) == match) in tomoyo_condition() 1069 if (!(max_v[0] & max_v[1]) == !match) in tomoyo_condition() 1079 if (!(max_v[0] & max_v[1]) == !match) in tomoyo_condition() 1085 if ((min_v[0] <= max_v[1] && max_v[0] >= min_v[1]) == match) in tomoyo_condition()
|
D | common.c | 1252 const u8 match = condp->equals; in tomoyo_print_condition() local 1298 tomoyo_set_string(head, match ? "=" : "!="); in tomoyo_print_condition()
|
/security/selinux/ss/ |
D | services.c | 2901 struct class_datum *match; in security_get_permissions() local 2906 match = hashtab_search(policydb.p_classes.table, class); in security_get_permissions() 2907 if (!match) { in security_get_permissions() 2914 *nperms = match->permissions.nprim; in security_get_permissions() 2919 if (match->comdatum) { in security_get_permissions() 2920 rc = hashtab_map(match->comdatum->permissions.table, in security_get_permissions() 2926 rc = hashtab_map(match->permissions.table, get_permissions_callback, in security_get_permissions() 3116 int match = 0; in selinux_audit_rule_match() local 3129 match = -ESTALE; in selinux_audit_rule_match() 3138 match = -ENOENT; in selinux_audit_rule_match() [all …]
|
/security/ |
D | device_cgroup.c | 346 bool match = false; in may_access() local 363 match = true; in may_access() 373 if (match) in may_access() 383 if (match) in may_access()
|
/security/apparmor/ |
D | Makefile | 5 apparmor-y := apparmorfs.o audit.o capability.o context.o ipc.o lib.o match.o \
|
/security/keys/encrypted-keys/ |
D | encrypted.c | 973 .match = user_match,
|