• Home
  • History
  • Annotate
  • Raw
  • Download
  • only in /netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/net/ipv4/

Lines Matching refs:secattr

295  * @secattr: the security attribute struct to use
300 * @secattr struct is populated with the correct LSM security attributes. The
315 struct netlbl_lsm_secattr *secattr)
334 secattr->cache = entry->lsm_data;
335 secattr->flags |= NETLBL_SECATTR_CACHE;
336 secattr->type = NETLBL_NLTYPE_CIPSOV4;
366 * @secattr: the packet's security attributes
377 const struct netlbl_lsm_secattr *secattr)
402 atomic_inc(&secattr->cache->refcount);
403 entry->lsm_data = secattr->cache;
862 * @secattr: the security attributes
873 const struct netlbl_lsm_secattr *secattr,
890 host_spot = netlbl_secattr_catmap_walk(secattr->attr.mls.cat,
925 * @secattr: the security attributes
936 struct netlbl_lsm_secattr *secattr)
973 ret_val = netlbl_secattr_catmap_setbit(secattr->attr.mls.cat,
1019 * @secattr: the security attributes
1031 const struct netlbl_lsm_secattr *secattr,
1039 cat = netlbl_secattr_catmap_walk(secattr->attr.mls.cat,
1058 * @secattr: the security attributes
1069 struct netlbl_lsm_secattr *secattr)
1075 ret_val = netlbl_secattr_catmap_setbit(secattr->attr.mls.cat,
1128 * @secattr: the security attributes
1140 const struct netlbl_lsm_secattr *secattr,
1155 iter = netlbl_secattr_catmap_walk(secattr->attr.mls.cat,
1164 iter = netlbl_secattr_catmap_walk_rng(secattr->attr.mls.cat,
1192 * @secattr: the security attributes
1203 struct netlbl_lsm_secattr *secattr)
1217 ret_val = netlbl_secattr_catmap_setrng(secattr->attr.mls.cat,
1254 * @secattr: the security attributes
1266 const struct netlbl_lsm_secattr *secattr,
1274 if ((secattr->flags & NETLBL_SECATTR_MLS_LVL) == 0)
1278 secattr->attr.mls.lvl,
1283 if (secattr->flags & NETLBL_SECATTR_MLS_CAT) {
1285 secattr,
1312 * @secattr: the security attributes
1316 * attributes in @secattr. Return zero on success, negatives values on
1322 struct netlbl_lsm_secattr *secattr)
1331 secattr->attr.mls.lvl = level;
1332 secattr->flags |= NETLBL_SECATTR_MLS_LVL;
1335 secattr->attr.mls.cat =
1337 if (secattr->attr.mls.cat == NULL)
1343 secattr);
1345 netlbl_secattr_catmap_free(secattr->attr.mls.cat);
1349 secattr->flags |= NETLBL_SECATTR_MLS_CAT;
1358 * @secattr: the security attributes
1368 const struct netlbl_lsm_secattr *secattr,
1376 if (!(secattr->flags & NETLBL_SECATTR_MLS_LVL))
1380 secattr->attr.mls.lvl,
1385 if (secattr->flags & NETLBL_SECATTR_MLS_CAT) {
1387 secattr,
1408 * @secattr: the security attributes
1412 * attributes in @secattr. Return zero on success, negatives values on
1418 struct netlbl_lsm_secattr *secattr)
1427 secattr->attr.mls.lvl = level;
1428 secattr->flags |= NETLBL_SECATTR_MLS_LVL;
1431 secattr->attr.mls.cat =
1433 if (secattr->attr.mls.cat == NULL)
1439 secattr);
1441 netlbl_secattr_catmap_free(secattr->attr.mls.cat);
1445 secattr->flags |= NETLBL_SECATTR_MLS_CAT;
1454 * @secattr: the security attributes
1464 const struct netlbl_lsm_secattr *secattr,
1472 if (!(secattr->flags & NETLBL_SECATTR_MLS_LVL))
1476 secattr->attr.mls.lvl,
1481 if (secattr->flags & NETLBL_SECATTR_MLS_CAT) {
1483 secattr,
1504 * @secattr: the security attributes
1508 * in @secattr. Return zero on success, negatives values on failure.
1513 struct netlbl_lsm_secattr *secattr)
1522 secattr->attr.mls.lvl = level;
1523 secattr->flags |= NETLBL_SECATTR_MLS_LVL;
1526 secattr->attr.mls.cat =
1528 if (secattr->attr.mls.cat == NULL)
1534 secattr);
1536 netlbl_secattr_catmap_free(secattr->attr.mls.cat);
1540 secattr->flags |= NETLBL_SECATTR_MLS_CAT;
1549 * @secattr: the security attributes
1559 const struct netlbl_lsm_secattr *secattr,
1563 if (!(secattr->flags & NETLBL_SECATTR_SECID))
1568 *(u32 *)&buffer[2] = secattr->attr.secid;
1577 * @secattr: the security attributes
1580 * Parse a CIPSO local tag and return the security attributes in @secattr.
1586 struct netlbl_lsm_secattr *secattr)
1588 secattr->attr.secid = *(u32 *)&tag[2];
1589 secattr->flags |= NETLBL_SECATTR_SECID;
1793 * @secattr: the security attributes
1803 const struct netlbl_lsm_secattr *secattr)
1817 secattr,
1823 secattr,
1829 secattr,
1835 secattr,
1857 * @secattr: the specific security attributes of the socket
1869 const struct netlbl_lsm_secattr *secattr)
1896 ret_val = cipso_v4_genopt(buf, buf_len, doi_def, secattr);
1940 * @secattr: the specific security attributes of the socket
1950 const struct netlbl_lsm_secattr *secattr)
1969 ret_val = cipso_v4_genopt(buf, buf_len, doi_def, secattr);
2119 * @secattr: the security attributes
2122 * Inspect @cipso and return the security attributes in @secattr. Returns zero
2127 struct netlbl_lsm_secattr *secattr)
2133 if (cipso_v4_cache_check(cipso, cipso[1], secattr) == 0)
2143 ret_val = cipso_v4_parsetag_rbm(doi_def, &cipso[6], secattr);
2146 ret_val = cipso_v4_parsetag_enum(doi_def, &cipso[6], secattr);
2149 ret_val = cipso_v4_parsetag_rng(doi_def, &cipso[6], secattr);
2152 ret_val = cipso_v4_parsetag_loc(doi_def, &cipso[6], secattr);
2156 secattr->type = NETLBL_NLTYPE_CIPSOV4;
2166 * @secattr: the security attributes
2170 * there is return the CIPSO security attributes in @secattr. This function
2175 int cipso_v4_sock_getattr(struct sock *sk, struct netlbl_lsm_secattr *secattr)
2184 secattr);
2190 * @secattr: the security attributes
2199 const struct netlbl_lsm_secattr *secattr)
2209 ret_val = cipso_v4_genopt(buf, buf_len, doi_def, secattr);
2308 * @secattr: the security attributes
2316 struct netlbl_lsm_secattr *secattr)
2318 return cipso_v4_getattr(CIPSO_V4_OPTPTR(skb), secattr);