Searched refs:options (Results 1 – 7 of 7) sorted by relevance
/security/keys/ |
D | trusted.c | 925 struct trusted_key_options *options; in trusted_options_alloc() local 932 options = kzalloc(sizeof *options, GFP_KERNEL); in trusted_options_alloc() 933 if (options) { in trusted_options_alloc() 935 options->keytype = SRK_keytype; in trusted_options_alloc() 938 options->keyhandle = SRKHANDLE; in trusted_options_alloc() 940 return options; in trusted_options_alloc() 970 struct trusted_key_options *options = NULL; in trusted_instantiate() local 991 options = trusted_options_alloc(); in trusted_instantiate() 992 if (!options) { in trusted_instantiate() 1002 key_cmd = datablob_parse(datablob, payload, options); in trusted_instantiate() [all …]
|
/security/apparmor/ |
D | Kconfig | 48 provide fine grained control of the debug options that are
|
/security/ |
D | Kconfig.hardening | 2 menu "Kernel hardening options"
|
D | Kconfig | 6 menu "Security options"
|
D | security.c | 829 int security_sb_eat_lsm_opts(char *options, void **mnt_opts) in security_sb_eat_lsm_opts() argument 831 return call_int_hook(sb_eat_lsm_opts, 0, options, mnt_opts); in security_sb_eat_lsm_opts()
|
/security/smack/ |
D | smack_lsm.c | 722 static int smack_sb_eat_lsm_opts(char *options, void **mnt_opts) in smack_sb_eat_lsm_opts() argument 724 char *from = options, *to = options; in smack_sb_eat_lsm_opts()
|
/security/selinux/ |
D | hooks.c | 2626 static int selinux_sb_eat_lsm_opts(char *options, void **mnt_opts) in selinux_sb_eat_lsm_opts() argument 2628 char *from = options; in selinux_sb_eat_lsm_opts() 2629 char *to = options; in selinux_sb_eat_lsm_opts()
|