/security/integrity/ima/ |
D | ima_modsig.c | 64 const struct module_signature *sig; in ima_read_modsig() local 70 if (buf_len <= marker_len + sizeof(*sig)) in ima_read_modsig() 78 sig = (const struct module_signature *)(p - sizeof(*sig)); in ima_read_modsig() 80 rc = mod_check_sig(sig, buf_len, func_tokens[func]); in ima_read_modsig() 84 sig_len = be32_to_cpu(sig->sig_len); in ima_read_modsig() 85 buf_len -= sig_len + sizeof(*sig); in ima_read_modsig()
|
D | ima_appraise.c | 153 struct signature_v2_hdr *sig; in ima_get_hash_algo() local 162 sig = (typeof(sig))xattr_value; in ima_get_hash_algo() 163 if (sig->version != 2 || xattr_len <= sizeof(*sig)) in ima_get_hash_algo() 165 return sig->hash_algo; in ima_get_hash_algo()
|
D | Kconfig | 80 bool "ima-sig" 88 default "ima-sig" if IMA_SIG_TEMPLATE
|
/security/apparmor/ |
D | ipc.c | 133 static inline int map_signal_num(int sig) in map_signal_num() argument 135 if (sig > SIGRTMAX) in map_signal_num() 137 else if (sig >= SIGRTMIN) in map_signal_num() 138 return sig - SIGRTMIN + SIGRT_BASE; in map_signal_num() 139 else if (sig < MAXMAPPED_SIG) in map_signal_num() 140 return sig_map[sig]; in map_signal_num() 208 int aa_may_signal(struct aa_label *sender, struct aa_label *target, int sig) in aa_may_signal() argument 213 aad(&sa)->signal = map_signal_num(sig); in aa_may_signal() 214 aad(&sa)->unmappedsig = sig; in aa_may_signal()
|
D | lsm.c | 730 int sig, const struct cred *cred) in apparmor_task_kill() argument 741 error = aa_may_signal(cl, tl, sig); in apparmor_task_kill() 749 error = aa_may_signal(cl, tl, sig); in apparmor_task_kill()
|
/security/integrity/ |
D | integrity.h | 115 uint8_t sig[0]; /* signature payload */ member 155 int integrity_digsig_verify(const unsigned int id, const char *sig, int siglen, 166 const char *sig, int siglen, in integrity_digsig_verify() argument 193 int asymmetric_verify(struct key *keyring, const char *sig, 196 static inline int asymmetric_verify(struct key *keyring, const char *sig, in asymmetric_verify() argument
|
D | digsig.c | 61 int integrity_digsig_verify(const unsigned int id, const char *sig, int siglen, in integrity_digsig_verify() argument 73 switch (sig[1]) { in integrity_digsig_verify() 76 return digsig_verify(keyring, sig + 1, siglen - 1, digest, in integrity_digsig_verify() 79 return asymmetric_verify(keyring, sig, siglen, digest, in integrity_digsig_verify()
|
D | digsig_asymmetric.c | 78 int asymmetric_verify(struct key *keyring, const char *sig, in asymmetric_verify() argument 82 struct signature_v2_hdr *hdr = (struct signature_v2_hdr *)sig; in asymmetric_verify() 115 pks.s = hdr->sig; in asymmetric_verify()
|
/security/apparmor/include/ |
D | ipc.h | 34 int aa_may_signal(struct aa_label *sender, struct aa_label *target, int sig);
|
/security/ |
D | security.c | 1484 struct fown_struct *fown, int sig) in security_file_send_sigiotask() argument 1486 return call_int_hook(file_send_sigiotask, 0, tsk, fown, sig); in security_file_send_sigiotask() 1703 int sig, const struct cred *cred) in security_task_kill() argument 1705 return call_int_hook(task_kill, 0, p, info, sig, cred); in security_task_kill()
|
/security/selinux/ |
D | hooks.c | 1601 static inline u32 signal_to_av(int sig) in signal_to_av() argument 1605 switch (sig) { in signal_to_av() 4136 int sig, const struct cred *cred) in selinux_task_kill() argument 4141 if (!sig) in selinux_task_kill() 4144 perm = signal_to_av(sig); in selinux_task_kill()
|
/security/smack/ |
D | smack_lsm.c | 2184 int sig, const struct cred *cred) in smack_task_kill() argument 2191 if (!sig) in smack_task_kill()
|