Home
last modified time | relevance | path

Searched refs:token (Results 1 – 11 of 11) sorted by relevance

/security/apparmor/
Dtask.c100 ctx->token = stack; in aa_set_current_onexec()
115 int aa_set_current_hat(struct aa_label *label, u64 token) in aa_set_current_hat() argument
128 ctx->token = token; in aa_set_current_hat()
129 } else if (ctx->token == token) { in aa_set_current_hat()
155 int aa_restore_previous_label(u64 token) in aa_restore_previous_label() argument
160 if (ctx->token != token) in aa_restore_previous_label()
Dprocattr.c78 static char *split_token_from_name(const char *op, char *args, u64 *token) in split_token_from_name() argument
82 *token = simple_strtoull(args, &name, 16); in split_token_from_name()
105 u64 token; in aa_setprocattr_changehat() local
109 hat = split_token_from_name(OP_CHANGE_HAT, args, &token); in aa_setprocattr_changehat()
113 if (!hat && !token) { in aa_setprocattr_changehat()
130 , __func__, current->pid, token, count, hat); in aa_setprocattr_changehat()
135 __func__, current->pid, token, count, "<NULL>"); in aa_setprocattr_changehat()
137 return aa_change_hat(hats, count, token, flags); in aa_setprocattr_changehat()
Ddomain.c896 new = handle_onexec(label, ctx->onexec, ctx->token, in apparmor_bprm_creds_for_exec()
1149 int aa_change_hat(const char *hats[], int count, u64 token, int flags) in aa_change_hat() argument
1210 error = aa_set_current_hat(new, token); in aa_change_hat()
1231 error = aa_restore_previous_label(token); in aa_change_hat()
/security/keys/encrypted-keys/
Decryptfs_format.c21 return auth_tok->token.password.session_key_encryption_key; in ecryptfs_get_auth_tok_key()
57 strncpy((char *)auth_tok->token.password.signature, key_desc, in ecryptfs_fill_auth_tok()
59 auth_tok->token.password.session_key_encryption_key_bytes = in ecryptfs_fill_auth_tok()
67 auth_tok->token.password.flags |= in ecryptfs_fill_auth_tok()
73 auth_tok->token.password.hash_algo = PGP_DIGEST_ALGO_SHA512; in ecryptfs_fill_auth_tok()
74 auth_tok->token.password.flags &= ~(ECRYPTFS_PERSISTENT_PASSWORD); in ecryptfs_fill_auth_tok()
/security/apparmor/include/
Dtask.h29 u64 token; member
34 int aa_set_current_hat(struct aa_label *label, u64 token);
77 ctx->token = 0; in aa_clear_task_ctx_trans()
Ddomain.h36 int aa_change_hat(const char *hats[], int count, u64 token, int flags);
/security/keys/
Dkeyctl_pkey.c43 int token; in keyctl_pkey_params_parse() local
48 token = match_token(p, param_keys, args); in keyctl_pkey_params_parse()
49 if (token == Opt_err) in keyctl_pkey_params_parse()
51 if (__test_and_set_bit(token, &token_mask)) in keyctl_pkey_params_parse()
57 switch (token) { in keyctl_pkey_params_parse()
/security/integrity/ima/
Dima_policy.c1274 char *token; in ima_parse_appraise_algos() local
1276 while ((token = strsep(&arg, ",")) != NULL) { in ima_parse_appraise_algos()
1277 idx = match_string(hash_algo_name, HASH_ALGO__LAST, token); in ima_parse_appraise_algos()
1281 token); in ima_parse_appraise_algos()
1287 token); in ima_parse_appraise_algos()
1317 int token; in ima_parse_rule() local
1324 token = match_token(p, policy_tokens, args); in ima_parse_rule()
1325 switch (token) { in ima_parse_rule()
1526 if ((token == Opt_uid_lt) || (token == Opt_euid_lt)) in ima_parse_rule()
1531 uid_token = (token == Opt_uid_eq) || in ima_parse_rule()
[all …]
/security/keys/trusted-keys/
Dtrusted_tpm1.c737 int token; in getoptions() local
758 token = match_token(p, key_tokens, args); in getoptions()
759 if (test_and_set_bit(token, &token_mask)) in getoptions()
762 switch (token) { in getoptions()
/security/selinux/
Dhooks.c986 static int selinux_add_opt(int token, const char *s, void **mnt_opts) in selinux_add_opt() argument
991 if (token == Opt_seclabel) /* eaten and completely ignored */ in selinux_add_opt()
1005 switch (token) { in selinux_add_opt()
1048 int token = Opt_error; in selinux_add_mnt_opt() local
1053 token = tokens[i].opt; in selinux_add_mnt_opt()
1058 if (token == Opt_error) in selinux_add_mnt_opt()
1061 if (token != Opt_seclabel) { in selinux_add_mnt_opt()
1068 rc = selinux_add_opt(token, val, mnt_opts); in selinux_add_mnt_opt()
2651 int token; in selinux_sb_eat_lsm_opts() local
2654 token = match_opt_prefix(from, len, &arg); in selinux_sb_eat_lsm_opts()
[all …]
/security/smack/
Dsmack_lsm.c566 static int smack_add_opt(int token, const char *s, void **mnt_opts) in smack_add_opt() argument
579 switch (token) { in smack_add_opt()
702 int token, len, rc; in smack_sb_eat_lsm_opts() local
710 token = match_opt_prefix(from, len, &arg); in smack_sb_eat_lsm_opts()
711 if (token != Opt_error) { in smack_sb_eat_lsm_opts()
713 rc = smack_add_opt(token, arg, mnt_opts); in smack_sb_eat_lsm_opts()