/security/integrity/ |
D | digsig.c | 42 static struct key *integrity_keyring_from_id(const unsigned int id) in integrity_keyring_from_id() argument 44 if (id >= INTEGRITY_KEYRING_MAX) in integrity_keyring_from_id() 47 if (!keyring[id]) { in integrity_keyring_from_id() 48 keyring[id] = in integrity_keyring_from_id() 49 request_key(&key_type_keyring, keyring_name[id], NULL); in integrity_keyring_from_id() 50 if (IS_ERR(keyring[id])) { in integrity_keyring_from_id() 51 int err = PTR_ERR(keyring[id]); in integrity_keyring_from_id() 52 pr_err("no %s keyring: %d\n", keyring_name[id], err); in integrity_keyring_from_id() 53 keyring[id] = NULL; in integrity_keyring_from_id() 58 return keyring[id]; in integrity_keyring_from_id() [all …]
|
D | integrity.h | 155 int integrity_digsig_verify(const unsigned int id, const char *sig, int siglen, 157 int integrity_modsig_verify(unsigned int id, const struct modsig *modsig); 159 int __init integrity_init_keyring(const unsigned int id); 160 int __init integrity_load_x509(const unsigned int id, const char *path); 161 int __init integrity_load_cert(const unsigned int id, const char *source, 165 static inline int integrity_digsig_verify(const unsigned int id, in integrity_digsig_verify() argument 172 static inline int integrity_modsig_verify(unsigned int id, in integrity_modsig_verify() argument 178 static inline int integrity_init_keyring(const unsigned int id) in integrity_init_keyring() argument 183 static inline int __init integrity_load_cert(const unsigned int id, in integrity_load_cert() argument
|
/security/keys/ |
D | keyctl.c | 259 long keyctl_get_keyring_ID(key_serial_t id, int create) in keyctl_get_keyring_ID() argument 266 key_ref = lookup_user_key(id, lflags, KEY_NEED_SEARCH); in keyctl_get_keyring_ID() 326 long keyctl_update_key(key_serial_t id, in keyctl_update_key() argument 352 key_ref = lookup_user_key(id, 0, KEY_NEED_WRITE); in keyctl_update_key() 380 long keyctl_revoke_key(key_serial_t id) in keyctl_revoke_key() argument 386 key_ref = lookup_user_key(id, 0, KEY_NEED_WRITE); in keyctl_revoke_key() 391 key_ref = lookup_user_key(id, 0, KEY_NEED_SETATTR); in keyctl_revoke_key() 421 long keyctl_invalidate_key(key_serial_t id) in keyctl_invalidate_key() argument 427 kenter("%d", id); in keyctl_invalidate_key() 429 key_ref = lookup_user_key(id, 0, KEY_NEED_SEARCH); in keyctl_invalidate_key() [all …]
|
D | keyctl_pkey.c | 78 static int keyctl_pkey_params_get(key_serial_t id, in keyctl_pkey_params_get() argument 98 key_ref = lookup_user_key(id, 0, KEY_NEED_SEARCH); in keyctl_pkey_params_get() 161 long keyctl_pkey_query(key_serial_t id, in keyctl_pkey_query() argument 171 ret = keyctl_pkey_params_get(id, _info, ¶ms); in keyctl_pkey_query()
|
D | compat.c | 24 key_serial_t id, in compat_keyctl_instantiate_key_iov() argument 42 ret = keyctl_instantiate_key_common(id, &from, ringid); in compat_keyctl_instantiate_key_iov()
|
D | proc.c | 78 static struct key *find_ge_key(struct seq_file *p, key_serial_t id) in find_ge_key() argument 86 if (id < key->serial) { in find_ge_key() 90 } else if (id > key->serial) { in find_ge_key()
|
D | process_keys.c | 611 key_ref_t lookup_user_key(key_serial_t id, unsigned long lflags, in lookup_user_key() argument 629 switch (id) { in lookup_user_key() 746 if (id < 1) in lookup_user_key() 749 key = key_lookup(id); in lookup_user_key()
|
D | internal.h | 249 extern long keyctl_restrict_keyring(key_serial_t id, 307 static inline long keyctl_pkey_query(key_serial_t id, in keyctl_pkey_query() argument
|
D | key.c | 655 struct key *key_lookup(key_serial_t id) in key_lookup() argument 667 if (id < key->serial) in key_lookup() 669 else if (id > key->serial) in key_lookup()
|
/security/loadpin/ |
D | loadpin.c | 119 static int loadpin_read_file(struct file *file, enum kernel_read_file_id id) in loadpin_read_file() argument 122 const char *origin = kernel_read_file_id_str(id); in loadpin_read_file() 125 if ((unsigned int)id < ARRAY_SIZE(ignore_read_file_id) && in loadpin_read_file() 126 ignore_read_file_id[id]) { in loadpin_read_file() 178 static int loadpin_load_data(enum kernel_load_data_id id) in loadpin_load_data() argument 180 return loadpin_read_file(NULL, (enum kernel_read_file_id) id); in loadpin_load_data()
|
/security/tomoyo/ |
D | gc.c | 485 static void tomoyo_collect_member(const enum tomoyo_policy_id id, in tomoyo_collect_member() argument 495 tomoyo_try_to_gc(id, &member->list); in tomoyo_collect_member() 527 enum tomoyo_policy_id id; in tomoyo_collect_entry() local 544 for (id = 0; id < TOMOYO_MAX_POLICY; id++) in tomoyo_collect_entry() 545 tomoyo_collect_member(id, &ns->policy_list[id]); in tomoyo_collect_entry() 569 id = TOMOYO_ID_PATH_GROUP; in tomoyo_collect_entry() 572 id = TOMOYO_ID_NUMBER_GROUP; in tomoyo_collect_entry() 575 id = TOMOYO_ID_ADDRESS_GROUP; in tomoyo_collect_entry() 579 tomoyo_collect_member(id, &group->member_list); in tomoyo_collect_entry()
|
/security/ |
D | security.c | 732 int security_quotactl(int cmds, int type, int id, struct super_block *sb) in security_quotactl() argument 734 return call_int_hook(quotactl, 0, cmds, type, id, sb); in security_quotactl() 1598 int security_kernel_read_file(struct file *file, enum kernel_read_file_id id) in security_kernel_read_file() argument 1602 ret = call_int_hook(kernel_read_file, 0, file, id); in security_kernel_read_file() 1605 return ima_read_file(file, id); in security_kernel_read_file() 1610 enum kernel_read_file_id id) in security_kernel_post_read_file() argument 1614 ret = call_int_hook(kernel_post_read_file, 0, file, buf, size, id); in security_kernel_post_read_file() 1617 return ima_post_read_file(file, buf, size, id); in security_kernel_post_read_file() 1621 int security_kernel_load_data(enum kernel_load_data_id id) in security_kernel_load_data() argument 1625 ret = call_int_hook(kernel_load_data, 0, id); in security_kernel_load_data() [all …]
|
/security/integrity/ima/ |
D | ima_main.c | 584 int ima_load_data(enum kernel_load_data_id id) in ima_load_data() argument 591 switch (id) { in ima_load_data()
|
D | ima_policy.c | 1518 bool ima_appraise_signature(enum kernel_read_file_id id) in ima_appraise_signature() argument 1524 if (id >= READING_MAX_ID) in ima_appraise_signature() 1527 func = read_idmap[id] ?: FILE_CHECK; in ima_appraise_signature()
|
/security/smack/ |
D | smack_lsm.c | 2951 ad.a.u.ipc_id = isp->id; in smk_curacc_shm() 3040 ad.a.u.ipc_id = isp->id; in smk_curacc_sem() 3135 ad.a.u.ipc_id = isp->id; in smk_curacc_msq() 3241 ad.a.u.ipc_id = ipp->id; in smack_ipc_permission()
|
/security/selinux/ |
D | hooks.c | 2185 static int selinux_quotactl(int cmds, int type, int id, struct super_block *sb) in selinux_quotactl() argument 4005 enum kernel_read_file_id id) in selinux_kernel_read_file() argument 4009 switch (id) { in selinux_kernel_read_file() 4020 static int selinux_kernel_load_data(enum kernel_load_data_id id) in selinux_kernel_load_data() argument 4024 switch (id) { in selinux_kernel_load_data()
|