Searched refs:secattr (Results 1 - 12 of 12) sorted by relevance

/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/security/selinux/
H A Dnetlabel.c47 * @secattr: the NetLabel security attributes
57 struct netlbl_lsm_secattr *secattr,
62 rc = security_netlbl_secattr_to_sid(secattr, sid);
64 (secattr->flags & NETLBL_SECATTR_CACHEABLE) &&
65 (secattr->flags & NETLBL_SECATTR_CACHE))
66 netlbl_cache_add(skb, secattr);
72 * selinux_netlbl_sock_genattr - Generate the NetLabel socket secattr
85 struct netlbl_lsm_secattr *secattr; local
90 secattr = netlbl_secattr_alloc(GFP_ATOMIC);
91 if (secattr
56 selinux_netlbl_sidlookup_cached(struct sk_buff *skb, struct netlbl_lsm_secattr *secattr, u32 *sid) argument
181 struct netlbl_lsm_secattr secattr; local
217 struct netlbl_lsm_secattr *secattr = NULL; local
259 struct netlbl_lsm_secattr secattr; local
308 struct netlbl_lsm_secattr *secattr; local
351 struct netlbl_lsm_secattr secattr; local
406 struct netlbl_lsm_secattr secattr; local
439 struct netlbl_lsm_secattr *secattr; local
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/security/selinux/ss/
H A Dmls.h59 struct netlbl_lsm_secattr *secattr);
61 struct netlbl_lsm_secattr *secattr);
63 struct netlbl_lsm_secattr *secattr);
65 struct netlbl_lsm_secattr *secattr);
68 struct netlbl_lsm_secattr *secattr)
73 struct netlbl_lsm_secattr *secattr)
78 struct netlbl_lsm_secattr *secattr)
83 struct netlbl_lsm_secattr *secattr)
67 mls_export_netlbl_lvl(struct context *context, struct netlbl_lsm_secattr *secattr) argument
72 mls_import_netlbl_lvl(struct context *context, struct netlbl_lsm_secattr *secattr) argument
77 mls_export_netlbl_cat(struct context *context, struct netlbl_lsm_secattr *secattr) argument
82 mls_import_netlbl_cat(struct context *context, struct netlbl_lsm_secattr *secattr) argument
H A Dmls.c552 * @secattr: the NetLabel security attributes
560 struct netlbl_lsm_secattr *secattr)
565 secattr->attr.mls.lvl = context->range.level[0].sens - 1;
566 secattr->flags |= NETLBL_SECATTR_MLS_LVL;
572 * @secattr: the NetLabel security attributes
580 struct netlbl_lsm_secattr *secattr)
585 context->range.level[0].sens = secattr->attr.mls.lvl + 1;
592 * @secattr: the NetLabel security attributes
600 struct netlbl_lsm_secattr *secattr)
608 &secattr
559 mls_export_netlbl_lvl(struct context *context, struct netlbl_lsm_secattr *secattr) argument
579 mls_import_netlbl_lvl(struct context *context, struct netlbl_lsm_secattr *secattr) argument
599 mls_export_netlbl_cat(struct context *context, struct netlbl_lsm_secattr *secattr) argument
627 mls_import_netlbl_cat(struct context *context, struct netlbl_lsm_secattr *secattr) argument
[all...]
H A Dservices.c2979 * @secattr: the NetLabel packet security attributes
2984 * @skb, in the NetLabel subsystem cache. This function assumes @secattr has
2988 static void security_netlbl_cache_add(struct netlbl_lsm_secattr *secattr, argument
2996 secattr->cache = netlbl_secattr_cache_alloc(GFP_ATOMIC);
2997 if (secattr->cache == NULL) {
3003 secattr->cache->free = kfree;
3004 secattr->cache->data = sid_cache;
3005 secattr->flags |= NETLBL_SECATTR_CACHE;
3009 * security_netlbl_secattr_to_sid - Convert a NetLabel secattr to a SELinux SID
3010 * @secattr
3023 security_netlbl_secattr_to_sid(struct netlbl_lsm_secattr *secattr, u32 *sid) argument
3094 security_netlbl_sid_to_secattr(u32 sid, struct netlbl_lsm_secattr *secattr) argument
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/include/net/
H A Dnetlabel.h143 * struct netlbl_lsm_secattr_catmap - NetLabel LSM secattr category bitmap
225 * netlbl_secattr_cache_alloc - Allocate and initialize a secattr cache
248 * Frees @secattr including all of the internal buffers.
262 * netlbl_secattr_catmap_alloc - Allocate a LSM secattr catmap
266 * Allocate memory for a LSM secattr catmap, returns a pointer on success, NULL
277 * netlbl_secattr_catmap_free - Free a LSM secattr catmap
281 * Free a LSM secattr catmap.
298 * @secattr: the struct to initialize
304 static inline void netlbl_secattr_init(struct netlbl_lsm_secattr *secattr) argument
306 memset(secattr,
318 netlbl_secattr_destroy(struct netlbl_lsm_secattr *secattr) argument
350 netlbl_secattr_free(struct netlbl_lsm_secattr *secattr) argument
527 netlbl_sock_setattr(struct sock *sk, u16 family, const struct netlbl_lsm_secattr *secattr) argument
536 netlbl_sock_getattr(struct sock *sk, struct netlbl_lsm_secattr *secattr) argument
541 netlbl_conn_setattr(struct sock *sk, struct sockaddr *addr, const struct netlbl_lsm_secattr *secattr) argument
547 netlbl_req_setattr(struct request_sock *req, const struct netlbl_lsm_secattr *secattr) argument
556 netlbl_skbuff_setattr(struct sk_buff *skb, u16 family, const struct netlbl_lsm_secattr *secattr) argument
562 netlbl_skbuff_getattr(const struct sk_buff *skb, u16 family, struct netlbl_lsm_secattr *secattr) argument
578 netlbl_cache_add(const struct sk_buff *skb, const struct netlbl_lsm_secattr *secattr) argument
[all...]
H A Dcipso_ipv4.h194 const struct netlbl_lsm_secattr *secattr);
202 const struct netlbl_lsm_secattr *secattr)
216 const struct netlbl_lsm_secattr *secattr);
218 int cipso_v4_sock_getattr(struct sock *sk, struct netlbl_lsm_secattr *secattr);
221 const struct netlbl_lsm_secattr *secattr);
225 const struct netlbl_lsm_secattr *secattr);
228 struct netlbl_lsm_secattr *secattr);
240 const struct netlbl_lsm_secattr *secattr)
250 struct netlbl_lsm_secattr *secattr)
257 const struct netlbl_lsm_secattr *secattr)
201 cipso_v4_cache_add(const struct sk_buff *skb, const struct netlbl_lsm_secattr *secattr) argument
238 cipso_v4_sock_setattr(struct sock *sk, const struct cipso_v4_doi *doi_def, const struct netlbl_lsm_secattr *secattr) argument
249 cipso_v4_sock_getattr(struct sock *sk, struct netlbl_lsm_secattr *secattr) argument
255 cipso_v4_req_setattr(struct request_sock *req, const struct cipso_v4_doi *doi_def, const struct netlbl_lsm_secattr *secattr) argument
267 cipso_v4_skbuff_setattr(struct sk_buff *skb, const struct cipso_v4_doi *doi_def, const struct netlbl_lsm_secattr *secattr) argument
279 cipso_v4_skbuff_getattr(const struct sk_buff *skb, struct netlbl_lsm_secattr *secattr) argument
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/net/ipv4/
H A Dcipso_ipv4.c295 * @secattr: the security attribute struct to use
300 * @secattr struct is populated with the correct LSM security attributes. The
315 struct netlbl_lsm_secattr *secattr)
334 secattr->cache = entry->lsm_data;
335 secattr->flags |= NETLBL_SECATTR_CACHE;
336 secattr->type = NETLBL_NLTYPE_CIPSOV4;
366 * @secattr: the packet's security attributes
377 const struct netlbl_lsm_secattr *secattr)
402 atomic_inc(&secattr->cache->refcount);
403 entry->lsm_data = secattr
313 cipso_v4_cache_check(const unsigned char *key, u32 key_len, struct netlbl_lsm_secattr *secattr) argument
376 cipso_v4_cache_add(const struct sk_buff *skb, const struct netlbl_lsm_secattr *secattr) argument
872 cipso_v4_map_cat_rbm_hton(const struct cipso_v4_doi *doi_def, const struct netlbl_lsm_secattr *secattr, unsigned char *net_cat, u32 net_cat_len) argument
933 cipso_v4_map_cat_rbm_ntoh(const struct cipso_v4_doi *doi_def, const unsigned char *net_cat, u32 net_cat_len, struct netlbl_lsm_secattr *secattr) argument
1030 cipso_v4_map_cat_enum_hton(const struct cipso_v4_doi *doi_def, const struct netlbl_lsm_secattr *secattr, unsigned char *net_cat, u32 net_cat_len) argument
1066 cipso_v4_map_cat_enum_ntoh(const struct cipso_v4_doi *doi_def, const unsigned char *net_cat, u32 net_cat_len, struct netlbl_lsm_secattr *secattr) argument
1139 cipso_v4_map_cat_rng_hton(const struct cipso_v4_doi *doi_def, const struct netlbl_lsm_secattr *secattr, unsigned char *net_cat, u32 net_cat_len) argument
1200 cipso_v4_map_cat_rng_ntoh(const struct cipso_v4_doi *doi_def, const unsigned char *net_cat, u32 net_cat_len, struct netlbl_lsm_secattr *secattr) argument
1265 cipso_v4_gentag_rbm(const struct cipso_v4_doi *doi_def, const struct netlbl_lsm_secattr *secattr, unsigned char *buffer, u32 buffer_len) argument
1320 cipso_v4_parsetag_rbm(const struct cipso_v4_doi *doi_def, const unsigned char *tag, struct netlbl_lsm_secattr *secattr) argument
1367 cipso_v4_gentag_enum(const struct cipso_v4_doi *doi_def, const struct netlbl_lsm_secattr *secattr, unsigned char *buffer, u32 buffer_len) argument
1416 cipso_v4_parsetag_enum(const struct cipso_v4_doi *doi_def, const unsigned char *tag, struct netlbl_lsm_secattr *secattr) argument
1463 cipso_v4_gentag_rng(const struct cipso_v4_doi *doi_def, const struct netlbl_lsm_secattr *secattr, unsigned char *buffer, u32 buffer_len) argument
1511 cipso_v4_parsetag_rng(const struct cipso_v4_doi *doi_def, const unsigned char *tag, struct netlbl_lsm_secattr *secattr) argument
1558 cipso_v4_gentag_loc(const struct cipso_v4_doi *doi_def, const struct netlbl_lsm_secattr *secattr, unsigned char *buffer, u32 buffer_len) argument
1584 cipso_v4_parsetag_loc(const struct cipso_v4_doi *doi_def, const unsigned char *tag, struct netlbl_lsm_secattr *secattr) argument
1801 cipso_v4_genopt(unsigned char *buf, u32 buf_len, const struct cipso_v4_doi *doi_def, const struct netlbl_lsm_secattr *secattr) argument
1867 cipso_v4_sock_setattr(struct sock *sk, const struct cipso_v4_doi *doi_def, const struct netlbl_lsm_secattr *secattr) argument
1948 cipso_v4_req_setattr(struct request_sock *req, const struct cipso_v4_doi *doi_def, const struct netlbl_lsm_secattr *secattr) argument
2126 cipso_v4_getattr(const unsigned char *cipso, struct netlbl_lsm_secattr *secattr) argument
2175 cipso_v4_sock_getattr(struct sock *sk, struct netlbl_lsm_secattr *secattr) argument
2197 cipso_v4_skbuff_setattr(struct sk_buff *skb, const struct cipso_v4_doi *doi_def, const struct netlbl_lsm_secattr *secattr) argument
2315 cipso_v4_skbuff_getattr(const struct sk_buff *skb, struct netlbl_lsm_secattr *secattr) argument
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/net/netlabel/
H A Dnetlabel_kapi.c400 * netlbl_secattr_catmap_walk - Walk a LSM secattr catmap looking for a bit
405 * This function walks a LSM secattr category bitmap starting at @offset and
461 * This function walks a LSM secattr category bitmap starting at @offset and
515 * netlbl_secattr_catmap_setbit - Set a bit in a LSM secattr catmap
553 * netlbl_secattr_catmap_setrng - Set a range of bits in a LSM secattr catmap
619 * @secattr: the security attributes
623 * specified in @secattr. This function requires exclusive access to @sk,
632 const struct netlbl_lsm_secattr *secattr)
638 dom_entry = netlbl_domhsh_getentry(secattr->domain);
652 secattr);
630 netlbl_sock_setattr(struct sock *sk, u16 family, const struct netlbl_lsm_secattr *secattr) argument
703 netlbl_sock_getattr(struct sock *sk, struct netlbl_lsm_secattr *secattr) argument
736 netlbl_conn_setattr(struct sock *sk, struct sockaddr *addr, const struct netlbl_lsm_secattr *secattr) argument
796 netlbl_req_setattr(struct request_sock *req, const struct netlbl_lsm_secattr *secattr) argument
881 netlbl_skbuff_setattr(struct sk_buff *skb, u16 family, const struct netlbl_lsm_secattr *secattr) argument
943 netlbl_skbuff_getattr(const struct sk_buff *skb, u16 family, struct netlbl_lsm_secattr *secattr) argument
1005 netlbl_cache_add(const struct sk_buff *skb, const struct netlbl_lsm_secattr *secattr) argument
[all...]
H A Dnetlabel_unlabeled.h241 struct netlbl_lsm_secattr *secattr);
H A Dnetlabel_unlabeled.c1505 * @secattr: the security attributes
1509 * them in @secattr. Returns zero on success and negative values on failure.
1514 struct netlbl_lsm_secattr *secattr)
1534 secattr->attr.secid = netlbl_unlhsh_addr4_entry(addr4)->secid;
1547 secattr->attr.secid = netlbl_unlhsh_addr6_entry(addr6)->secid;
1556 secattr->flags |= NETLBL_SECATTR_SECID;
1557 secattr->type = NETLBL_NLTYPE_UNLABELED;
1564 secattr->type = NETLBL_NLTYPE_UNLABELED;
1512 netlbl_unlabel_getattr(const struct sk_buff *skb, u16 family, struct netlbl_lsm_secattr *secattr) argument
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/security/selinux/include/
H A Dsecurity.h172 int security_netlbl_secattr_to_sid(struct netlbl_lsm_secattr *secattr,
176 struct netlbl_lsm_secattr *secattr);
179 struct netlbl_lsm_secattr *secattr,
186 struct netlbl_lsm_secattr *secattr)
178 security_netlbl_secattr_to_sid( struct netlbl_lsm_secattr *secattr, u32 *sid) argument
185 security_netlbl_sid_to_secattr(u32 sid, struct netlbl_lsm_secattr *secattr) argument
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/security/smack/
H A Dsmack_lsm.c1515 * smack_to_secattr - fill a secattr from a smack value
1543 * smack_netlabel - Set the secattr on a socket
1548 * secattr and attach it to the socket.
1555 struct netlbl_lsm_secattr secattr; local
1573 netlbl_secattr_init(&secattr);
1574 smack_to_secattr(ssp->smk_out, &secattr);
1575 rc = netlbl_sock_setattr(sk, sk->sk_family, &secattr);
1576 netlbl_secattr_destroy(&secattr);
1586 * smack_netlbel_send - Set the secattr on a socket and perform access checks
1590 * Set the correct secattr fo
2562 struct netlbl_lsm_secattr secattr; local
2647 struct netlbl_lsm_secattr secattr; local
2721 struct netlbl_lsm_secattr secattr; local
[all...]

Completed in 209 milliseconds