/security/integrity/ |
D | digsig.c | 36 int integrity_digsig_verify(const unsigned int id, const char *sig, int siglen, in integrity_digsig_verify() argument 39 if (id >= INTEGRITY_KEYRING_MAX) in integrity_digsig_verify() 42 if (!keyring[id]) { in integrity_digsig_verify() 43 keyring[id] = in integrity_digsig_verify() 44 request_key(&key_type_keyring, keyring_name[id], NULL); in integrity_digsig_verify() 45 if (IS_ERR(keyring[id])) { in integrity_digsig_verify() 46 int err = PTR_ERR(keyring[id]); in integrity_digsig_verify() 47 pr_err("no %s keyring: %d\n", keyring_name[id], err); in integrity_digsig_verify() 48 keyring[id] = NULL; in integrity_digsig_verify() 56 return digsig_verify(keyring[id], sig + 1, siglen - 1, in integrity_digsig_verify() [all …]
|
D | integrity.h | 130 int integrity_digsig_verify(const unsigned int id, const char *sig, int siglen, 133 int integrity_init_keyring(const unsigned int id); 136 static inline int integrity_digsig_verify(const unsigned int id, in integrity_digsig_verify() argument 143 static inline int integrity_init_keyring(const unsigned int id) in integrity_init_keyring() argument
|
/security/keys/ |
D | keyctl.c | 255 long keyctl_get_keyring_ID(key_serial_t id, int create) in keyctl_get_keyring_ID() argument 262 key_ref = lookup_user_key(id, lflags, KEY_NEED_SEARCH); in keyctl_get_keyring_ID() 322 long keyctl_update_key(key_serial_t id, in keyctl_update_key() argument 348 key_ref = lookup_user_key(id, 0, KEY_NEED_WRITE); in keyctl_update_key() 374 long keyctl_revoke_key(key_serial_t id) in keyctl_revoke_key() argument 379 key_ref = lookup_user_key(id, 0, KEY_NEED_WRITE); in keyctl_revoke_key() 384 key_ref = lookup_user_key(id, 0, KEY_NEED_SETATTR); in keyctl_revoke_key() 408 long keyctl_invalidate_key(key_serial_t id) in keyctl_invalidate_key() argument 413 kenter("%d", id); in keyctl_invalidate_key() 415 key_ref = lookup_user_key(id, 0, KEY_NEED_SEARCH); in keyctl_invalidate_key() [all …]
|
D | compat.c | 28 key_serial_t id, in compat_keyctl_instantiate_key_iov() argument 47 ret = keyctl_instantiate_key_common(id, iov, ioc, ret, ringid); in compat_keyctl_instantiate_key_iov() 57 return keyctl_instantiate_key_common(id, NULL, 0, 0, ringid); in compat_keyctl_instantiate_key_iov()
|
D | proc.c | 110 static struct key *find_ge_key(struct seq_file *p, key_serial_t id) in find_ge_key() argument 118 if (id < key->serial) { in find_ge_key() 122 } else if (id > key->serial) { in find_ge_key()
|
D | process_keys.c | 530 key_ref_t lookup_user_key(key_serial_t id, unsigned long lflags, in lookup_user_key() argument 547 switch (id) { in lookup_user_key() 676 if (id < 1) in lookup_user_key() 679 key = key_lookup(id); in lookup_user_key()
|
D | key.c | 618 struct key *key_lookup(key_serial_t id) in key_lookup() argument 630 if (id < key->serial) in key_lookup() 632 else if (id > key->serial) in key_lookup()
|
D | internal.h | 156 extern key_ref_t lookup_user_key(key_serial_t id, unsigned long flags,
|
/security/tomoyo/ |
D | gc.c | 473 static void tomoyo_collect_member(const enum tomoyo_policy_id id, in tomoyo_collect_member() argument 482 tomoyo_try_to_gc(id, &member->list); in tomoyo_collect_member() 513 enum tomoyo_policy_id id; in tomoyo_collect_entry() local 528 for (id = 0; id < TOMOYO_MAX_POLICY; id++) in tomoyo_collect_entry() 529 tomoyo_collect_member(id, &ns->policy_list[id]); in tomoyo_collect_entry() 551 id = TOMOYO_ID_PATH_GROUP; in tomoyo_collect_entry() 554 id = TOMOYO_ID_NUMBER_GROUP; in tomoyo_collect_entry() 557 id = TOMOYO_ID_ADDRESS_GROUP; in tomoyo_collect_entry() 561 tomoyo_collect_member(id, &group->member_list); in tomoyo_collect_entry()
|
/security/integrity/ima/ |
D | ima.h | 249 static inline int ima_init_keyring(const unsigned int id) in ima_init_keyring() argument 251 return integrity_init_keyring(id); in ima_init_keyring() 254 static inline int ima_init_keyring(const unsigned int id) in ima_init_keyring() argument
|
/security/smack/ |
D | smack_lsm.c | 2599 ad.a.u.ipc_id = shp->shm_perm.id; in smk_curacc_shm() 2726 ad.a.u.ipc_id = sma->sem_perm.id; in smk_curacc_sem() 2859 ad.a.u.ipc_id = msq->q_perm.id; in smk_curacc_msq() 2963 ad.a.u.ipc_id = ipp->id; in smack_ipc_permission()
|
/security/ |
D | security.c | 209 int security_quotactl(int cmds, int type, int id, struct super_block *sb) in security_quotactl() argument 211 return security_ops->quotactl(cmds, type, id, sb); in security_quotactl()
|
D | capability.c | 40 static int cap_quotactl(int cmds, int type, int id, struct super_block *sb) in cap_quotactl() argument
|
/security/selinux/ |
D | hooks.c | 2070 static int selinux_quotactl(int cmds, int type, int id, struct super_block *sb) in selinux_quotactl() argument
|