Home
last modified time | relevance | path

Searched refs:sig (Results 1 – 12 of 12) sorted by relevance

/security/integrity/ima/
Dima_modsig.c64 const struct module_signature *sig; in ima_read_modsig() local
70 if (buf_len <= marker_len + sizeof(*sig)) in ima_read_modsig()
78 sig = (const struct module_signature *)(p - sizeof(*sig)); in ima_read_modsig()
80 rc = mod_check_sig(sig, buf_len, func_tokens[func]); in ima_read_modsig()
84 sig_len = be32_to_cpu(sig->sig_len); in ima_read_modsig()
85 buf_len -= sig_len + sizeof(*sig); in ima_read_modsig()
Dima_appraise.c153 struct signature_v2_hdr *sig; in ima_get_hash_algo() local
162 sig = (typeof(sig))xattr_value; in ima_get_hash_algo()
163 if (sig->version != 2 || xattr_len <= sizeof(*sig)) in ima_get_hash_algo()
165 return sig->hash_algo; in ima_get_hash_algo()
DKconfig80 bool "ima-sig"
88 default "ima-sig" if IMA_SIG_TEMPLATE
/security/apparmor/
Dipc.c133 static inline int map_signal_num(int sig) in map_signal_num() argument
135 if (sig > SIGRTMAX) in map_signal_num()
137 else if (sig >= SIGRTMIN) in map_signal_num()
138 return sig - SIGRTMIN + SIGRT_BASE; in map_signal_num()
139 else if (sig < MAXMAPPED_SIG) in map_signal_num()
140 return sig_map[sig]; in map_signal_num()
208 int aa_may_signal(struct aa_label *sender, struct aa_label *target, int sig) in aa_may_signal() argument
213 aad(&sa)->signal = map_signal_num(sig); in aa_may_signal()
214 aad(&sa)->unmappedsig = sig; in aa_may_signal()
Dlsm.c730 int sig, const struct cred *cred) in apparmor_task_kill() argument
741 error = aa_may_signal(cl, tl, sig); in apparmor_task_kill()
749 error = aa_may_signal(cl, tl, sig); in apparmor_task_kill()
/security/integrity/
Dintegrity.h115 uint8_t sig[0]; /* signature payload */ member
155 int integrity_digsig_verify(const unsigned int id, const char *sig, int siglen,
166 const char *sig, int siglen, in integrity_digsig_verify() argument
193 int asymmetric_verify(struct key *keyring, const char *sig,
196 static inline int asymmetric_verify(struct key *keyring, const char *sig, in asymmetric_verify() argument
Ddigsig.c61 int integrity_digsig_verify(const unsigned int id, const char *sig, int siglen, in integrity_digsig_verify() argument
73 switch (sig[1]) { in integrity_digsig_verify()
76 return digsig_verify(keyring, sig + 1, siglen - 1, digest, in integrity_digsig_verify()
79 return asymmetric_verify(keyring, sig, siglen, digest, in integrity_digsig_verify()
Ddigsig_asymmetric.c78 int asymmetric_verify(struct key *keyring, const char *sig, in asymmetric_verify() argument
82 struct signature_v2_hdr *hdr = (struct signature_v2_hdr *)sig; in asymmetric_verify()
115 pks.s = hdr->sig; in asymmetric_verify()
/security/apparmor/include/
Dipc.h34 int aa_may_signal(struct aa_label *sender, struct aa_label *target, int sig);
/security/
Dsecurity.c1484 struct fown_struct *fown, int sig) in security_file_send_sigiotask() argument
1486 return call_int_hook(file_send_sigiotask, 0, tsk, fown, sig); in security_file_send_sigiotask()
1703 int sig, const struct cred *cred) in security_task_kill() argument
1705 return call_int_hook(task_kill, 0, p, info, sig, cred); in security_task_kill()
/security/selinux/
Dhooks.c1601 static inline u32 signal_to_av(int sig) in signal_to_av() argument
1605 switch (sig) { in signal_to_av()
4136 int sig, const struct cred *cred) in selinux_task_kill() argument
4141 if (!sig) in selinux_task_kill()
4144 perm = signal_to_av(sig); in selinux_task_kill()
/security/smack/
Dsmack_lsm.c2184 int sig, const struct cred *cred) in smack_task_kill() argument
2191 if (!sig) in smack_task_kill()