Searched refs:version (Results 1 – 17 of 17) sorted by relevance
/security/apparmor/include/ |
D | crypto.h | 18 int aa_calc_profile_hash(struct aa_profile *profile, u32 version, void *start, 25 static inline int aa_calc_profile_hash(struct aa_profile *profile, u32 version, in aa_calc_profile_hash() argument
|
/security/integrity/ima/ |
D | ima_kexec.c | 37 khdr.version = 1; in ima_dump_measurement_list() 57 khdr.version = cpu_to_le16(khdr.version); in ima_dump_measurement_list()
|
D | ima_template.c | 377 khdr->version = le16_to_cpu(khdr->version); in ima_restore_measurement_list() 382 if (khdr->version != 1) { in ima_restore_measurement_list()
|
D | ima_main.c | 161 !inode_eq_iversion(inode, iint->version) || in ima_check_last_writer() 278 !inode_eq_iversion(backing_inode, iint->version)) { in process_measurement()
|
D | ima.h | 111 u16 version; member
|
D | ima_api.c | 262 iint->version = i_version; in ima_collect_measurement()
|
D | ima_appraise.c | 169 if (sig->version != 2 || xattr_len <= sizeof(*sig)) in ima_get_hash_algo()
|
/security/integrity/evm/ |
D | Kconfig | 17 bool "FSUUID (version 2)" 23 Default value is 'selected', which is former version 2. 24 if 'not selected', it is former version 1
|
/security/apparmor/ |
D | crypto.c | 61 int aa_calc_profile_hash(struct aa_profile *profile, u32 version, void *start, in aa_calc_profile_hash() argument 66 __le32 le32_version = cpu_to_le32(version); in aa_calc_profile_hash()
|
D | policy_unpack.c | 73 u32 version; member 750 if (tmp == PACKED_MODE_COMPLAIN || (e->version & FORCE_COMPLAIN_FLAG)) in unpack_profile() 950 if (!unpack_u32(e, &e->version, "version")) { in verify_header() 962 if (VERSION_LT(e->version, v5) || VERSION_GT(e->version, v8)) { in verify_header() 1090 error = aa_calc_profile_hash(profile, e.version, start, in aa_unpack() 1105 udata->abi = e.version & K_ABI_MASK; in aa_unpack()
|
/security/integrity/ |
D | integrity.h | 111 uint8_t version; /* signature format version */ member 123 u64 version; /* track inode changes */ member
|
D | iint.c | 96 iint->version = 0; in iint_init_always()
|
/security/selinux/ss/ |
D | policydb.c | 71 int version; member 79 .version = POLICYDB_VERSION_BASE, 84 .version = POLICYDB_VERSION_BOOL, 89 .version = POLICYDB_VERSION_IPV6, 94 .version = POLICYDB_VERSION_NLCLASS, 99 .version = POLICYDB_VERSION_MLS, 104 .version = POLICYDB_VERSION_AVTAB, 109 .version = POLICYDB_VERSION_RANGETRANS, 114 .version = POLICYDB_VERSION_POLCAP, 119 .version = POLICYDB_VERSION_PERMISSIVE, [all …]
|
D | status.c | 54 status->version = SELINUX_KERNEL_STATUS_VERSION; in selinux_kernel_status_page()
|
/security/keys/encrypted-keys/ |
D | ecryptfs_format.c | 54 auth_tok->version = (((uint16_t)(major << 8) & 0xFF00) in ecryptfs_fill_auth_tok()
|
/security/selinux/ |
D | netlabel.c | 293 if (ip_hdr(skb)->version == 4) { in selinux_netlbl_sctp_assoc_request() 297 } else if (IS_ENABLED(CONFIG_IPV6) && ip_hdr(skb)->version == 6) { in selinux_netlbl_sctp_assoc_request()
|
/security/selinux/include/ |
D | security.h | 388 u32 version; /* version number of thie structure */ member
|