/security/apparmor/ |
D | task.c | 100 ctx->token = stack; in aa_set_current_onexec() 115 int aa_set_current_hat(struct aa_label *label, u64 token) in aa_set_current_hat() argument 128 ctx->token = token; in aa_set_current_hat() 129 } else if (ctx->token == token) { in aa_set_current_hat() 155 int aa_restore_previous_label(u64 token) in aa_restore_previous_label() argument 160 if (ctx->token != token) in aa_restore_previous_label()
|
D | procattr.c | 78 static char *split_token_from_name(const char *op, char *args, u64 *token) in split_token_from_name() argument 82 *token = simple_strtoull(args, &name, 16); in split_token_from_name() 105 u64 token; in aa_setprocattr_changehat() local 109 hat = split_token_from_name(OP_CHANGE_HAT, args, &token); in aa_setprocattr_changehat() 113 if (!hat && !token) { in aa_setprocattr_changehat() 130 , __func__, current->pid, token, count, hat); in aa_setprocattr_changehat() 135 __func__, current->pid, token, count, "<NULL>"); in aa_setprocattr_changehat() 137 return aa_change_hat(hats, count, token, flags); in aa_setprocattr_changehat()
|
D | domain.c | 896 new = handle_onexec(label, ctx->onexec, ctx->token, in apparmor_bprm_creds_for_exec() 1149 int aa_change_hat(const char *hats[], int count, u64 token, int flags) in aa_change_hat() argument 1210 error = aa_set_current_hat(new, token); in aa_change_hat() 1231 error = aa_restore_previous_label(token); in aa_change_hat()
|
/security/keys/encrypted-keys/ |
D | ecryptfs_format.c | 21 return auth_tok->token.password.session_key_encryption_key; in ecryptfs_get_auth_tok_key() 57 strncpy((char *)auth_tok->token.password.signature, key_desc, in ecryptfs_fill_auth_tok() 59 auth_tok->token.password.session_key_encryption_key_bytes = in ecryptfs_fill_auth_tok() 67 auth_tok->token.password.flags |= in ecryptfs_fill_auth_tok() 73 auth_tok->token.password.hash_algo = PGP_DIGEST_ALGO_SHA512; in ecryptfs_fill_auth_tok() 74 auth_tok->token.password.flags &= ~(ECRYPTFS_PERSISTENT_PASSWORD); in ecryptfs_fill_auth_tok()
|
/security/apparmor/include/ |
D | task.h | 29 u64 token; member 34 int aa_set_current_hat(struct aa_label *label, u64 token); 77 ctx->token = 0; in aa_clear_task_ctx_trans()
|
D | domain.h | 36 int aa_change_hat(const char *hats[], int count, u64 token, int flags);
|
/security/keys/ |
D | keyctl_pkey.c | 43 int token; in keyctl_pkey_params_parse() local 48 token = match_token(p, param_keys, args); in keyctl_pkey_params_parse() 49 if (token == Opt_err) in keyctl_pkey_params_parse() 51 if (__test_and_set_bit(token, &token_mask)) in keyctl_pkey_params_parse() 57 switch (token) { in keyctl_pkey_params_parse()
|
/security/integrity/ima/ |
D | ima_policy.c | 1274 char *token; in ima_parse_appraise_algos() local 1276 while ((token = strsep(&arg, ",")) != NULL) { in ima_parse_appraise_algos() 1277 idx = match_string(hash_algo_name, HASH_ALGO__LAST, token); in ima_parse_appraise_algos() 1281 token); in ima_parse_appraise_algos() 1287 token); in ima_parse_appraise_algos() 1317 int token; in ima_parse_rule() local 1324 token = match_token(p, policy_tokens, args); in ima_parse_rule() 1325 switch (token) { in ima_parse_rule() 1526 if ((token == Opt_uid_lt) || (token == Opt_euid_lt)) in ima_parse_rule() 1531 uid_token = (token == Opt_uid_eq) || in ima_parse_rule() [all …]
|
/security/keys/trusted-keys/ |
D | trusted_tpm1.c | 737 int token; in getoptions() local 758 token = match_token(p, key_tokens, args); in getoptions() 759 if (test_and_set_bit(token, &token_mask)) in getoptions() 762 switch (token) { in getoptions()
|
/security/selinux/ |
D | hooks.c | 986 static int selinux_add_opt(int token, const char *s, void **mnt_opts) in selinux_add_opt() argument 991 if (token == Opt_seclabel) /* eaten and completely ignored */ in selinux_add_opt() 1005 switch (token) { in selinux_add_opt() 1048 int token = Opt_error; in selinux_add_mnt_opt() local 1053 token = tokens[i].opt; in selinux_add_mnt_opt() 1058 if (token == Opt_error) in selinux_add_mnt_opt() 1061 if (token != Opt_seclabel) { in selinux_add_mnt_opt() 1068 rc = selinux_add_opt(token, val, mnt_opts); in selinux_add_mnt_opt() 2651 int token; in selinux_sb_eat_lsm_opts() local 2654 token = match_opt_prefix(from, len, &arg); in selinux_sb_eat_lsm_opts() [all …]
|
/security/smack/ |
D | smack_lsm.c | 566 static int smack_add_opt(int token, const char *s, void **mnt_opts) in smack_add_opt() argument 579 switch (token) { in smack_add_opt() 702 int token, len, rc; in smack_sb_eat_lsm_opts() local 710 token = match_opt_prefix(from, len, &arg); in smack_sb_eat_lsm_opts() 711 if (token != Opt_error) { in smack_sb_eat_lsm_opts() 713 rc = smack_add_opt(token, arg, mnt_opts); in smack_sb_eat_lsm_opts()
|