/security/integrity/ |
D | digsig.c | 41 static struct key *integrity_keyring_from_id(const unsigned int id) in integrity_keyring_from_id() argument 43 if (id >= INTEGRITY_KEYRING_MAX) in integrity_keyring_from_id() 46 if (!keyring[id]) { in integrity_keyring_from_id() 47 keyring[id] = in integrity_keyring_from_id() 48 request_key(&key_type_keyring, keyring_name[id], NULL); in integrity_keyring_from_id() 49 if (IS_ERR(keyring[id])) { in integrity_keyring_from_id() 50 int err = PTR_ERR(keyring[id]); in integrity_keyring_from_id() 51 pr_err("no %s keyring: %d\n", keyring_name[id], err); in integrity_keyring_from_id() 52 keyring[id] = NULL; in integrity_keyring_from_id() 57 return keyring[id]; in integrity_keyring_from_id() [all …]
|
D | integrity.h | 164 int integrity_digsig_verify(const unsigned int id, const char *sig, int siglen, 166 int integrity_modsig_verify(unsigned int id, const struct modsig *modsig); 168 int __init integrity_init_keyring(const unsigned int id); 169 int __init integrity_load_x509(const unsigned int id, const char *path); 170 int __init integrity_load_cert(const unsigned int id, const char *source, 174 static inline int integrity_digsig_verify(const unsigned int id, in integrity_digsig_verify() argument 181 static inline int integrity_modsig_verify(unsigned int id, in integrity_modsig_verify() argument 187 static inline int integrity_init_keyring(const unsigned int id) in integrity_init_keyring() argument 192 static inline int __init integrity_load_cert(const unsigned int id, in integrity_load_cert() argument
|
/security/keys/ |
D | keyctl.c | 258 long keyctl_get_keyring_ID(key_serial_t id, int create) in keyctl_get_keyring_ID() argument 265 key_ref = lookup_user_key(id, lflags, KEY_NEED_SEARCH); in keyctl_get_keyring_ID() 325 long keyctl_update_key(key_serial_t id, in keyctl_update_key() argument 351 key_ref = lookup_user_key(id, 0, KEY_NEED_WRITE); in keyctl_update_key() 379 long keyctl_revoke_key(key_serial_t id) in keyctl_revoke_key() argument 385 key_ref = lookup_user_key(id, 0, KEY_NEED_WRITE); in keyctl_revoke_key() 390 key_ref = lookup_user_key(id, 0, KEY_NEED_SETATTR); in keyctl_revoke_key() 420 long keyctl_invalidate_key(key_serial_t id) in keyctl_invalidate_key() argument 426 kenter("%d", id); in keyctl_invalidate_key() 428 key_ref = lookup_user_key(id, 0, KEY_NEED_SEARCH); in keyctl_invalidate_key() [all …]
|
D | keyctl_pkey.c | 78 static int keyctl_pkey_params_get(key_serial_t id, in keyctl_pkey_params_get() argument 98 key_ref = lookup_user_key(id, 0, KEY_NEED_SEARCH); in keyctl_pkey_params_get() 169 long keyctl_pkey_query(key_serial_t id, in keyctl_pkey_query() argument 177 ret = keyctl_pkey_params_get(id, _info, ¶ms); in keyctl_pkey_query()
|
D | proc.c | 78 static struct key *find_ge_key(struct seq_file *p, key_serial_t id) in find_ge_key() argument 86 if (id < key->serial) { in find_ge_key() 90 } else if (id > key->serial) { in find_ge_key()
|
D | process_keys.c | 611 key_ref_t lookup_user_key(key_serial_t id, unsigned long lflags, in lookup_user_key() argument 629 switch (id) { in lookup_user_key() 746 if (id < 1) in lookup_user_key() 749 key = key_lookup(id); in lookup_user_key()
|
D | internal.h | 274 extern long keyctl_restrict_keyring(key_serial_t id, 332 static inline long keyctl_pkey_query(key_serial_t id, in keyctl_pkey_query() argument
|
D | key.c | 658 struct key *key_lookup(key_serial_t id) in key_lookup() argument 670 if (id < key->serial) in key_lookup() 672 else if (id > key->serial) in key_lookup()
|
/security/loadpin/ |
D | loadpin.c | 121 static int loadpin_check(struct file *file, enum kernel_read_file_id id) in loadpin_check() argument 124 const char *origin = kernel_read_file_id_str(id); in loadpin_check() 127 if ((unsigned int)id < ARRAY_SIZE(ignore_read_file_id) && in loadpin_check() 128 ignore_read_file_id[id]) { in loadpin_check() 180 static int loadpin_read_file(struct file *file, enum kernel_read_file_id id, in loadpin_read_file() argument 188 return loadpin_check(file, id); in loadpin_read_file() 191 static int loadpin_load_data(enum kernel_load_data_id id, bool contents) in loadpin_load_data() argument 198 return loadpin_check(NULL, (enum kernel_read_file_id) id); in loadpin_load_data()
|
/security/tomoyo/ |
D | gc.c | 485 static void tomoyo_collect_member(const enum tomoyo_policy_id id, in tomoyo_collect_member() argument 495 tomoyo_try_to_gc(id, &member->list); in tomoyo_collect_member() 527 enum tomoyo_policy_id id; in tomoyo_collect_entry() local 544 for (id = 0; id < TOMOYO_MAX_POLICY; id++) in tomoyo_collect_entry() 545 tomoyo_collect_member(id, &ns->policy_list[id]); in tomoyo_collect_entry() 569 id = TOMOYO_ID_PATH_GROUP; in tomoyo_collect_entry() 572 id = TOMOYO_ID_NUMBER_GROUP; in tomoyo_collect_entry() 575 id = TOMOYO_ID_ADDRESS_GROUP; in tomoyo_collect_entry() 579 tomoyo_collect_member(id, &group->member_list); in tomoyo_collect_entry()
|
/security/integrity/ima/ |
D | ima_template_lib.c | 563 unsigned int id; in ima_eventinodedac_init_common() local 569 id = i_uid_read(file_inode(event_data->file)); in ima_eventinodedac_init_common() 571 id = i_gid_read(file_inode(event_data->file)); in ima_eventinodedac_init_common() 574 if (sizeof(id) == sizeof(u16)) in ima_eventinodedac_init_common() 575 id = (__force u16)cpu_to_le16(id); in ima_eventinodedac_init_common() 577 id = (__force u32)cpu_to_le32(id); in ima_eventinodedac_init_common() 580 return ima_write_template_field_data((void *)&id, sizeof(id), in ima_eventinodedac_init_common()
|
D | ima_main.c | 789 int ima_load_data(enum kernel_load_data_id id, bool contents) in ima_load_data() argument 796 switch (id) { in ima_load_data()
|
D | ima_policy.c | 2047 bool ima_appraise_signature(enum kernel_read_file_id id) in ima_appraise_signature() argument 2054 if (id >= READING_MAX_ID) in ima_appraise_signature() 2057 if (id == READING_KEXEC_IMAGE && !(ima_appraise & IMA_APPRAISE_ENFORCE) in ima_appraise_signature() 2061 func = read_idmap[id] ?: FILE_CHECK; in ima_appraise_signature()
|
/security/ |
D | security.c | 811 int security_quotactl(int cmds, int type, int id, struct super_block *sb) in security_quotactl() argument 813 return call_int_hook(quotactl, 0, cmds, type, id, sb); in security_quotactl() 1768 int security_kernel_read_file(struct file *file, enum kernel_read_file_id id, in security_kernel_read_file() argument 1773 ret = call_int_hook(kernel_read_file, 0, file, id, contents); in security_kernel_read_file() 1776 return ima_read_file(file, id, contents); in security_kernel_read_file() 1781 enum kernel_read_file_id id) in security_kernel_post_read_file() argument 1785 ret = call_int_hook(kernel_post_read_file, 0, file, buf, size, id); in security_kernel_post_read_file() 1788 return ima_post_read_file(file, buf, size, id); in security_kernel_post_read_file() 1792 int security_kernel_load_data(enum kernel_load_data_id id, bool contents) in security_kernel_load_data() argument 1796 ret = call_int_hook(kernel_load_data, 0, id, contents); in security_kernel_load_data() [all …]
|
D | Kconfig | 183 # https://bugs.llvm.org/show_bug.cgi?id=50322 184 # https://bugs.llvm.org/show_bug.cgi?id=41459
|
/security/keys/trusted-keys/ |
D | trusted_tee.c | 246 memcpy(sess_arg.uuid, rng_device->id.uuid.b, TEE_IOCTL_UUID_LEN); in trusted_key_probe()
|
/security/smack/ |
D | smack_lsm.c | 2971 ad.a.u.ipc_id = isp->id; in smk_curacc_shm() 3060 ad.a.u.ipc_id = isp->id; in smk_curacc_sem() 3155 ad.a.u.ipc_id = isp->id; in smk_curacc_msq() 3261 ad.a.u.ipc_id = ipp->id; in smack_ipc_permission()
|
/security/selinux/ |
D | hooks.c | 2196 static int selinux_quotactl(int cmds, int type, int id, struct super_block *sb) in selinux_quotactl() argument 4203 enum kernel_read_file_id id, in selinux_kernel_read_file() argument 4208 switch (id) { in selinux_kernel_read_file() 4219 static int selinux_kernel_load_data(enum kernel_load_data_id id, bool contents) in selinux_kernel_load_data() argument 4223 switch (id) { in selinux_kernel_load_data()
|