Home
last modified time | relevance | path

Searched refs:version (Results 1 – 17 of 17) sorted by relevance

/security/apparmor/include/
Dcrypto.h18 int aa_calc_profile_hash(struct aa_profile *profile, u32 version, void *start,
25 static inline int aa_calc_profile_hash(struct aa_profile *profile, u32 version, in aa_calc_profile_hash() argument
/security/integrity/ima/
Dima_kexec.c38 khdr.version = 1; in ima_dump_measurement_list()
58 khdr.version = cpu_to_le16(khdr.version); in ima_dump_measurement_list()
Dima_template.c433 khdr->version = le16_to_cpu((__force __le16)khdr->version); in ima_restore_measurement_list()
438 if (khdr->version != 1) { in ima_restore_measurement_list()
Dima_main.c170 !inode_eq_iversion(inode, iint->version) || in ima_check_last_writer()
289 !inode_eq_iversion(backing_inode, iint->version)) { in process_measurement()
Dima_api.c269 iint->version = i_version; in ima_collect_measurement()
Dima.h115 u16 version; member
Dima_appraise.c188 if (sig->version != 2 || xattr_len <= sizeof(*sig) in ima_get_hash_algo()
/security/integrity/evm/
DKconfig17 bool "FSUUID (version 2)"
23 Default value is 'selected', which is former version 2.
24 if 'not selected', it is former version 1
/security/apparmor/
Dcrypto.c61 int aa_calc_profile_hash(struct aa_profile *profile, u32 version, void *start, in aa_calc_profile_hash() argument
66 __le32 le32_version = cpu_to_le32(version); in aa_calc_profile_hash()
Dpolicy_unpack.c74 u32 version; member
753 if (tmp == PACKED_MODE_COMPLAIN || (e->version & FORCE_COMPLAIN_FLAG)) { in unpack_profile()
964 if (!unpack_u32(e, &e->version, "version")) { in verify_header()
976 if (VERSION_LT(e->version, v5) || VERSION_GT(e->version, v8)) { in verify_header()
1206 error = aa_calc_profile_hash(profile, e.version, start, in aa_unpack()
1221 udata->abi = e.version & K_ABI_MASK; in aa_unpack()
/security/integrity/
Dintegrity.h118 uint8_t version; /* signature format version */ member
130 u64 version; /* track inode changes */ member
Diint.c96 iint->version = 0; in iint_init_always()
/security/selinux/ss/
Dpolicydb.c60 int version; member
68 .version = POLICYDB_VERSION_BASE,
73 .version = POLICYDB_VERSION_BOOL,
78 .version = POLICYDB_VERSION_IPV6,
83 .version = POLICYDB_VERSION_NLCLASS,
88 .version = POLICYDB_VERSION_MLS,
93 .version = POLICYDB_VERSION_AVTAB,
98 .version = POLICYDB_VERSION_RANGETRANS,
103 .version = POLICYDB_VERSION_POLCAP,
108 .version = POLICYDB_VERSION_PERMISSIVE,
[all …]
/security/keys/encrypted-keys/
Decryptfs_format.c54 auth_tok->version = (((uint16_t)(major << 8) & 0xFF00) in ecryptfs_fill_auth_tok()
/security/selinux/
Dstatus.c54 status->version = SELINUX_KERNEL_STATUS_VERSION; in selinux_kernel_status_page()
Dnetlabel.c293 if (ip_hdr(skb)->version == 4) { in selinux_netlbl_sctp_assoc_request()
297 } else if (IS_ENABLED(CONFIG_IPV6) && ip_hdr(skb)->version == 6) { in selinux_netlbl_sctp_assoc_request()
/security/selinux/include/
Dsecurity.h452 u32 version; /* version number of the structure */ member