Searched refs:allowed_algos (Results 1 - 4 of 4) sorted by relevance

/linux-master/security/integrity/ima/
H A Dima_api.c175 * @allowed_algos: allowlist of hash algorithms for the IMA xattr
193 const char *func_data, unsigned int *allowed_algos)
201 allowed_algos);
189 ima_get_action(struct mnt_idmap *idmap, struct inode *inode, const struct cred *cred, u32 secid, int mask, enum ima_hooks func, int *pcr, struct ima_template_desc **template_desc, const char *func_data, unsigned int *allowed_algos) argument
H A Dima.h375 const char *func_data, unsigned int *allowed_algos);
406 const char *func_data, unsigned int *allowed_algos);
H A Dima_main.c226 unsigned int allowed_algos = 0; local
237 &allowed_algos);
403 if (rc == 0 && must_appraise && allowed_algos != 0 &&
404 (allowed_algos & (1U << hash_algo)) == 0) {
H A Dima_policy.c115 unsigned int allowed_algos; /* bitfield of allowed hash algorithms */ member in struct:ima_rule_entry
133 "The bitfield allowed_algos in ima_rule_entry is too small to contain all the supported hash algorithms, consider using a bigger type");
728 * @allowed_algos: allowlist of hash algorithms for the IMA xattr
741 const char *func_data, unsigned int *allowed_algos)
770 if (allowed_algos &&
772 *allowed_algos = entry->allowed_algos;
832 0, entry->allowed_algos);
1830 if (entry->allowed_algos) {
1835 entry->allowed_algos
737 ima_match_policy(struct mnt_idmap *idmap, struct inode *inode, const struct cred *cred, u32 secid, enum ima_hooks func, int mask, int flags, int *pcr, struct ima_template_desc **template_desc, const char *func_data, unsigned int *allowed_algos) argument
[all...]

Completed in 143 milliseconds