Home
last modified time | relevance | path

Searched refs:id (Results 1 – 18 of 18) sorted by relevance

/security/integrity/
Ddigsig.c41 static struct key *integrity_keyring_from_id(const unsigned int id) in integrity_keyring_from_id() argument
43 if (id >= INTEGRITY_KEYRING_MAX) in integrity_keyring_from_id()
46 if (!keyring[id]) { in integrity_keyring_from_id()
47 keyring[id] = in integrity_keyring_from_id()
48 request_key(&key_type_keyring, keyring_name[id], NULL); in integrity_keyring_from_id()
49 if (IS_ERR(keyring[id])) { in integrity_keyring_from_id()
50 int err = PTR_ERR(keyring[id]); in integrity_keyring_from_id()
51 pr_err("no %s keyring: %d\n", keyring_name[id], err); in integrity_keyring_from_id()
52 keyring[id] = NULL; in integrity_keyring_from_id()
57 return keyring[id]; in integrity_keyring_from_id()
[all …]
Dintegrity.h164 int integrity_digsig_verify(const unsigned int id, const char *sig, int siglen,
166 int integrity_modsig_verify(unsigned int id, const struct modsig *modsig);
168 int __init integrity_init_keyring(const unsigned int id);
169 int __init integrity_load_x509(const unsigned int id, const char *path);
170 int __init integrity_load_cert(const unsigned int id, const char *source,
174 static inline int integrity_digsig_verify(const unsigned int id, in integrity_digsig_verify() argument
181 static inline int integrity_modsig_verify(unsigned int id, in integrity_modsig_verify() argument
187 static inline int integrity_init_keyring(const unsigned int id) in integrity_init_keyring() argument
192 static inline int __init integrity_load_cert(const unsigned int id, in integrity_load_cert() argument
/security/keys/
Dkeyctl.c258 long keyctl_get_keyring_ID(key_serial_t id, int create) in keyctl_get_keyring_ID() argument
265 key_ref = lookup_user_key(id, lflags, KEY_NEED_SEARCH); in keyctl_get_keyring_ID()
325 long keyctl_update_key(key_serial_t id, in keyctl_update_key() argument
351 key_ref = lookup_user_key(id, 0, KEY_NEED_WRITE); in keyctl_update_key()
379 long keyctl_revoke_key(key_serial_t id) in keyctl_revoke_key() argument
385 key_ref = lookup_user_key(id, 0, KEY_NEED_WRITE); in keyctl_revoke_key()
390 key_ref = lookup_user_key(id, 0, KEY_NEED_SETATTR); in keyctl_revoke_key()
420 long keyctl_invalidate_key(key_serial_t id) in keyctl_invalidate_key() argument
426 kenter("%d", id); in keyctl_invalidate_key()
428 key_ref = lookup_user_key(id, 0, KEY_NEED_SEARCH); in keyctl_invalidate_key()
[all …]
Dkeyctl_pkey.c78 static int keyctl_pkey_params_get(key_serial_t id, in keyctl_pkey_params_get() argument
98 key_ref = lookup_user_key(id, 0, KEY_NEED_SEARCH); in keyctl_pkey_params_get()
169 long keyctl_pkey_query(key_serial_t id, in keyctl_pkey_query() argument
177 ret = keyctl_pkey_params_get(id, _info, &params); in keyctl_pkey_query()
Dproc.c78 static struct key *find_ge_key(struct seq_file *p, key_serial_t id) in find_ge_key() argument
86 if (id < key->serial) { in find_ge_key()
90 } else if (id > key->serial) { in find_ge_key()
Dprocess_keys.c611 key_ref_t lookup_user_key(key_serial_t id, unsigned long lflags, in lookup_user_key() argument
629 switch (id) { in lookup_user_key()
746 if (id < 1) in lookup_user_key()
749 key = key_lookup(id); in lookup_user_key()
Dinternal.h274 extern long keyctl_restrict_keyring(key_serial_t id,
332 static inline long keyctl_pkey_query(key_serial_t id, in keyctl_pkey_query() argument
Dkey.c658 struct key *key_lookup(key_serial_t id) in key_lookup() argument
670 if (id < key->serial) in key_lookup()
672 else if (id > key->serial) in key_lookup()
/security/loadpin/
Dloadpin.c121 static int loadpin_check(struct file *file, enum kernel_read_file_id id) in loadpin_check() argument
124 const char *origin = kernel_read_file_id_str(id); in loadpin_check()
127 if ((unsigned int)id < ARRAY_SIZE(ignore_read_file_id) && in loadpin_check()
128 ignore_read_file_id[id]) { in loadpin_check()
180 static int loadpin_read_file(struct file *file, enum kernel_read_file_id id, in loadpin_read_file() argument
188 return loadpin_check(file, id); in loadpin_read_file()
191 static int loadpin_load_data(enum kernel_load_data_id id, bool contents) in loadpin_load_data() argument
198 return loadpin_check(NULL, (enum kernel_read_file_id) id); in loadpin_load_data()
/security/tomoyo/
Dgc.c485 static void tomoyo_collect_member(const enum tomoyo_policy_id id, in tomoyo_collect_member() argument
495 tomoyo_try_to_gc(id, &member->list); in tomoyo_collect_member()
527 enum tomoyo_policy_id id; in tomoyo_collect_entry() local
544 for (id = 0; id < TOMOYO_MAX_POLICY; id++) in tomoyo_collect_entry()
545 tomoyo_collect_member(id, &ns->policy_list[id]); in tomoyo_collect_entry()
569 id = TOMOYO_ID_PATH_GROUP; in tomoyo_collect_entry()
572 id = TOMOYO_ID_NUMBER_GROUP; in tomoyo_collect_entry()
575 id = TOMOYO_ID_ADDRESS_GROUP; in tomoyo_collect_entry()
579 tomoyo_collect_member(id, &group->member_list); in tomoyo_collect_entry()
/security/integrity/ima/
Dima_template_lib.c563 unsigned int id; in ima_eventinodedac_init_common() local
569 id = i_uid_read(file_inode(event_data->file)); in ima_eventinodedac_init_common()
571 id = i_gid_read(file_inode(event_data->file)); in ima_eventinodedac_init_common()
574 if (sizeof(id) == sizeof(u16)) in ima_eventinodedac_init_common()
575 id = (__force u16)cpu_to_le16(id); in ima_eventinodedac_init_common()
577 id = (__force u32)cpu_to_le32(id); in ima_eventinodedac_init_common()
580 return ima_write_template_field_data((void *)&id, sizeof(id), in ima_eventinodedac_init_common()
Dima_main.c789 int ima_load_data(enum kernel_load_data_id id, bool contents) in ima_load_data() argument
796 switch (id) { in ima_load_data()
Dima_policy.c2047 bool ima_appraise_signature(enum kernel_read_file_id id) in ima_appraise_signature() argument
2054 if (id >= READING_MAX_ID) in ima_appraise_signature()
2057 if (id == READING_KEXEC_IMAGE && !(ima_appraise & IMA_APPRAISE_ENFORCE) in ima_appraise_signature()
2061 func = read_idmap[id] ?: FILE_CHECK; in ima_appraise_signature()
/security/
Dsecurity.c811 int security_quotactl(int cmds, int type, int id, struct super_block *sb) in security_quotactl() argument
813 return call_int_hook(quotactl, 0, cmds, type, id, sb); in security_quotactl()
1768 int security_kernel_read_file(struct file *file, enum kernel_read_file_id id, in security_kernel_read_file() argument
1773 ret = call_int_hook(kernel_read_file, 0, file, id, contents); in security_kernel_read_file()
1776 return ima_read_file(file, id, contents); in security_kernel_read_file()
1781 enum kernel_read_file_id id) in security_kernel_post_read_file() argument
1785 ret = call_int_hook(kernel_post_read_file, 0, file, buf, size, id); in security_kernel_post_read_file()
1788 return ima_post_read_file(file, buf, size, id); in security_kernel_post_read_file()
1792 int security_kernel_load_data(enum kernel_load_data_id id, bool contents) in security_kernel_load_data() argument
1796 ret = call_int_hook(kernel_load_data, 0, id, contents); in security_kernel_load_data()
[all …]
DKconfig183 # https://bugs.llvm.org/show_bug.cgi?id=50322
184 # https://bugs.llvm.org/show_bug.cgi?id=41459
/security/keys/trusted-keys/
Dtrusted_tee.c246 memcpy(sess_arg.uuid, rng_device->id.uuid.b, TEE_IOCTL_UUID_LEN); in trusted_key_probe()
/security/smack/
Dsmack_lsm.c2971 ad.a.u.ipc_id = isp->id; in smk_curacc_shm()
3060 ad.a.u.ipc_id = isp->id; in smk_curacc_sem()
3155 ad.a.u.ipc_id = isp->id; in smk_curacc_msq()
3261 ad.a.u.ipc_id = ipp->id; in smack_ipc_permission()
/security/selinux/
Dhooks.c2196 static int selinux_quotactl(int cmds, int type, int id, struct super_block *sb) in selinux_quotactl() argument
4203 enum kernel_read_file_id id, in selinux_kernel_read_file() argument
4208 switch (id) { in selinux_kernel_read_file()
4219 static int selinux_kernel_load_data(enum kernel_load_data_id id, bool contents) in selinux_kernel_load_data() argument
4223 switch (id) { in selinux_kernel_load_data()