Searched refs:allowed_algos (Results 1 - 4 of 4) sorted by relevance
/linux-master/security/integrity/ima/ |
H A D | ima_api.c | 175 * @allowed_algos: allowlist of hash algorithms for the IMA xattr 193 const char *func_data, unsigned int *allowed_algos) 201 allowed_algos); 189 ima_get_action(struct mnt_idmap *idmap, struct inode *inode, const struct cred *cred, u32 secid, int mask, enum ima_hooks func, int *pcr, struct ima_template_desc **template_desc, const char *func_data, unsigned int *allowed_algos) argument
|
H A D | ima.h | 375 const char *func_data, unsigned int *allowed_algos); 406 const char *func_data, unsigned int *allowed_algos);
|
H A D | ima_main.c | 226 unsigned int allowed_algos = 0; local 237 &allowed_algos); 403 if (rc == 0 && must_appraise && allowed_algos != 0 && 404 (allowed_algos & (1U << hash_algo)) == 0) {
|
H A D | ima_policy.c | 115 unsigned int allowed_algos; /* bitfield of allowed hash algorithms */ member in struct:ima_rule_entry 133 "The bitfield allowed_algos in ima_rule_entry is too small to contain all the supported hash algorithms, consider using a bigger type"); 728 * @allowed_algos: allowlist of hash algorithms for the IMA xattr 741 const char *func_data, unsigned int *allowed_algos) 770 if (allowed_algos && 772 *allowed_algos = entry->allowed_algos; 832 0, entry->allowed_algos); 1830 if (entry->allowed_algos) { 1835 entry->allowed_algos 737 ima_match_policy(struct mnt_idmap *idmap, struct inode *inode, const struct cred *cred, u32 secid, enum ima_hooks func, int mask, int flags, int *pcr, struct ima_template_desc **template_desc, const char *func_data, unsigned int *allowed_algos) argument [all...] |
Completed in 143 milliseconds