Home
last modified time | relevance | path

Searched refs:id (Results 1 – 16 of 16) sorted by relevance

/security/integrity/
Ddigsig.c42 static struct key *integrity_keyring_from_id(const unsigned int id) in integrity_keyring_from_id() argument
44 if (id >= INTEGRITY_KEYRING_MAX) in integrity_keyring_from_id()
47 if (!keyring[id]) { in integrity_keyring_from_id()
48 keyring[id] = in integrity_keyring_from_id()
49 request_key(&key_type_keyring, keyring_name[id], NULL); in integrity_keyring_from_id()
50 if (IS_ERR(keyring[id])) { in integrity_keyring_from_id()
51 int err = PTR_ERR(keyring[id]); in integrity_keyring_from_id()
52 pr_err("no %s keyring: %d\n", keyring_name[id], err); in integrity_keyring_from_id()
53 keyring[id] = NULL; in integrity_keyring_from_id()
58 return keyring[id]; in integrity_keyring_from_id()
[all …]
Dintegrity.h155 int integrity_digsig_verify(const unsigned int id, const char *sig, int siglen,
157 int integrity_modsig_verify(unsigned int id, const struct modsig *modsig);
159 int __init integrity_init_keyring(const unsigned int id);
160 int __init integrity_load_x509(const unsigned int id, const char *path);
161 int __init integrity_load_cert(const unsigned int id, const char *source,
165 static inline int integrity_digsig_verify(const unsigned int id, in integrity_digsig_verify() argument
172 static inline int integrity_modsig_verify(unsigned int id, in integrity_modsig_verify() argument
178 static inline int integrity_init_keyring(const unsigned int id) in integrity_init_keyring() argument
183 static inline int __init integrity_load_cert(const unsigned int id, in integrity_load_cert() argument
/security/keys/
Dkeyctl.c259 long keyctl_get_keyring_ID(key_serial_t id, int create) in keyctl_get_keyring_ID() argument
266 key_ref = lookup_user_key(id, lflags, KEY_NEED_SEARCH); in keyctl_get_keyring_ID()
326 long keyctl_update_key(key_serial_t id, in keyctl_update_key() argument
352 key_ref = lookup_user_key(id, 0, KEY_NEED_WRITE); in keyctl_update_key()
380 long keyctl_revoke_key(key_serial_t id) in keyctl_revoke_key() argument
386 key_ref = lookup_user_key(id, 0, KEY_NEED_WRITE); in keyctl_revoke_key()
391 key_ref = lookup_user_key(id, 0, KEY_NEED_SETATTR); in keyctl_revoke_key()
421 long keyctl_invalidate_key(key_serial_t id) in keyctl_invalidate_key() argument
427 kenter("%d", id); in keyctl_invalidate_key()
429 key_ref = lookup_user_key(id, 0, KEY_NEED_SEARCH); in keyctl_invalidate_key()
[all …]
Dkeyctl_pkey.c78 static int keyctl_pkey_params_get(key_serial_t id, in keyctl_pkey_params_get() argument
98 key_ref = lookup_user_key(id, 0, KEY_NEED_SEARCH); in keyctl_pkey_params_get()
161 long keyctl_pkey_query(key_serial_t id, in keyctl_pkey_query() argument
171 ret = keyctl_pkey_params_get(id, _info, &params); in keyctl_pkey_query()
Dcompat.c24 key_serial_t id, in compat_keyctl_instantiate_key_iov() argument
42 ret = keyctl_instantiate_key_common(id, &from, ringid); in compat_keyctl_instantiate_key_iov()
Dproc.c78 static struct key *find_ge_key(struct seq_file *p, key_serial_t id) in find_ge_key() argument
86 if (id < key->serial) { in find_ge_key()
90 } else if (id > key->serial) { in find_ge_key()
Dprocess_keys.c611 key_ref_t lookup_user_key(key_serial_t id, unsigned long lflags, in lookup_user_key() argument
629 switch (id) { in lookup_user_key()
746 if (id < 1) in lookup_user_key()
749 key = key_lookup(id); in lookup_user_key()
Dinternal.h249 extern long keyctl_restrict_keyring(key_serial_t id,
307 static inline long keyctl_pkey_query(key_serial_t id, in keyctl_pkey_query() argument
Dkey.c655 struct key *key_lookup(key_serial_t id) in key_lookup() argument
667 if (id < key->serial) in key_lookup()
669 else if (id > key->serial) in key_lookup()
/security/loadpin/
Dloadpin.c119 static int loadpin_read_file(struct file *file, enum kernel_read_file_id id) in loadpin_read_file() argument
122 const char *origin = kernel_read_file_id_str(id); in loadpin_read_file()
125 if ((unsigned int)id < ARRAY_SIZE(ignore_read_file_id) && in loadpin_read_file()
126 ignore_read_file_id[id]) { in loadpin_read_file()
178 static int loadpin_load_data(enum kernel_load_data_id id) in loadpin_load_data() argument
180 return loadpin_read_file(NULL, (enum kernel_read_file_id) id); in loadpin_load_data()
/security/tomoyo/
Dgc.c485 static void tomoyo_collect_member(const enum tomoyo_policy_id id, in tomoyo_collect_member() argument
495 tomoyo_try_to_gc(id, &member->list); in tomoyo_collect_member()
527 enum tomoyo_policy_id id; in tomoyo_collect_entry() local
544 for (id = 0; id < TOMOYO_MAX_POLICY; id++) in tomoyo_collect_entry()
545 tomoyo_collect_member(id, &ns->policy_list[id]); in tomoyo_collect_entry()
569 id = TOMOYO_ID_PATH_GROUP; in tomoyo_collect_entry()
572 id = TOMOYO_ID_NUMBER_GROUP; in tomoyo_collect_entry()
575 id = TOMOYO_ID_ADDRESS_GROUP; in tomoyo_collect_entry()
579 tomoyo_collect_member(id, &group->member_list); in tomoyo_collect_entry()
/security/
Dsecurity.c732 int security_quotactl(int cmds, int type, int id, struct super_block *sb) in security_quotactl() argument
734 return call_int_hook(quotactl, 0, cmds, type, id, sb); in security_quotactl()
1598 int security_kernel_read_file(struct file *file, enum kernel_read_file_id id) in security_kernel_read_file() argument
1602 ret = call_int_hook(kernel_read_file, 0, file, id); in security_kernel_read_file()
1605 return ima_read_file(file, id); in security_kernel_read_file()
1610 enum kernel_read_file_id id) in security_kernel_post_read_file() argument
1614 ret = call_int_hook(kernel_post_read_file, 0, file, buf, size, id); in security_kernel_post_read_file()
1617 return ima_post_read_file(file, buf, size, id); in security_kernel_post_read_file()
1621 int security_kernel_load_data(enum kernel_load_data_id id) in security_kernel_load_data() argument
1625 ret = call_int_hook(kernel_load_data, 0, id); in security_kernel_load_data()
[all …]
/security/integrity/ima/
Dima_main.c584 int ima_load_data(enum kernel_load_data_id id) in ima_load_data() argument
591 switch (id) { in ima_load_data()
Dima_policy.c1518 bool ima_appraise_signature(enum kernel_read_file_id id) in ima_appraise_signature() argument
1524 if (id >= READING_MAX_ID) in ima_appraise_signature()
1527 func = read_idmap[id] ?: FILE_CHECK; in ima_appraise_signature()
/security/smack/
Dsmack_lsm.c2951 ad.a.u.ipc_id = isp->id; in smk_curacc_shm()
3040 ad.a.u.ipc_id = isp->id; in smk_curacc_sem()
3135 ad.a.u.ipc_id = isp->id; in smk_curacc_msq()
3241 ad.a.u.ipc_id = ipp->id; in smack_ipc_permission()
/security/selinux/
Dhooks.c2185 static int selinux_quotactl(int cmds, int type, int id, struct super_block *sb) in selinux_quotactl() argument
4005 enum kernel_read_file_id id) in selinux_kernel_read_file() argument
4009 switch (id) { in selinux_kernel_read_file()
4020 static int selinux_kernel_load_data(enum kernel_load_data_id id) in selinux_kernel_load_data() argument
4024 switch (id) { in selinux_kernel_load_data()