Home
last modified time | relevance | path

Searched refs:version (Results 1 – 17 of 17) sorted by relevance

/security/apparmor/include/
Dcrypto.h18 int aa_calc_profile_hash(struct aa_profile *profile, u32 version, void *start,
25 static inline int aa_calc_profile_hash(struct aa_profile *profile, u32 version, in aa_calc_profile_hash() argument
/security/integrity/ima/
Dima_kexec.c37 khdr.version = 1; in ima_dump_measurement_list()
57 khdr.version = cpu_to_le16(khdr.version); in ima_dump_measurement_list()
Dima_template.c377 khdr->version = le16_to_cpu(khdr->version); in ima_restore_measurement_list()
382 if (khdr->version != 1) { in ima_restore_measurement_list()
Dima_main.c161 !inode_eq_iversion(inode, iint->version) || in ima_check_last_writer()
278 !inode_eq_iversion(backing_inode, iint->version)) { in process_measurement()
Dima.h111 u16 version; member
Dima_api.c262 iint->version = i_version; in ima_collect_measurement()
Dima_appraise.c169 if (sig->version != 2 || xattr_len <= sizeof(*sig)) in ima_get_hash_algo()
/security/integrity/evm/
DKconfig17 bool "FSUUID (version 2)"
23 Default value is 'selected', which is former version 2.
24 if 'not selected', it is former version 1
/security/apparmor/
Dcrypto.c61 int aa_calc_profile_hash(struct aa_profile *profile, u32 version, void *start, in aa_calc_profile_hash() argument
66 __le32 le32_version = cpu_to_le32(version); in aa_calc_profile_hash()
Dpolicy_unpack.c73 u32 version; member
750 if (tmp == PACKED_MODE_COMPLAIN || (e->version & FORCE_COMPLAIN_FLAG)) in unpack_profile()
950 if (!unpack_u32(e, &e->version, "version")) { in verify_header()
962 if (VERSION_LT(e->version, v5) || VERSION_GT(e->version, v8)) { in verify_header()
1090 error = aa_calc_profile_hash(profile, e.version, start, in aa_unpack()
1105 udata->abi = e.version & K_ABI_MASK; in aa_unpack()
/security/integrity/
Dintegrity.h111 uint8_t version; /* signature format version */ member
123 u64 version; /* track inode changes */ member
Diint.c96 iint->version = 0; in iint_init_always()
/security/selinux/ss/
Dpolicydb.c71 int version; member
79 .version = POLICYDB_VERSION_BASE,
84 .version = POLICYDB_VERSION_BOOL,
89 .version = POLICYDB_VERSION_IPV6,
94 .version = POLICYDB_VERSION_NLCLASS,
99 .version = POLICYDB_VERSION_MLS,
104 .version = POLICYDB_VERSION_AVTAB,
109 .version = POLICYDB_VERSION_RANGETRANS,
114 .version = POLICYDB_VERSION_POLCAP,
119 .version = POLICYDB_VERSION_PERMISSIVE,
[all …]
Dstatus.c54 status->version = SELINUX_KERNEL_STATUS_VERSION; in selinux_kernel_status_page()
/security/keys/encrypted-keys/
Decryptfs_format.c54 auth_tok->version = (((uint16_t)(major << 8) & 0xFF00) in ecryptfs_fill_auth_tok()
/security/selinux/
Dnetlabel.c293 if (ip_hdr(skb)->version == 4) { in selinux_netlbl_sctp_assoc_request()
297 } else if (IS_ENABLED(CONFIG_IPV6) && ip_hdr(skb)->version == 6) { in selinux_netlbl_sctp_assoc_request()
/security/selinux/include/
Dsecurity.h388 u32 version; /* version number of thie structure */ member