Lines Matching full:security
2 * NSA Security-Enhanced Linux (SELinux) security module
32 * 3. Testing addition of sk_policy's with security context via setsockopt
36 #include <linux/security.h>
66 * Returns true if the xfrm contains a security blob for SELinux.
70 return selinux_authorizable_ctx(x->security); in selinux_authorizable_xfrm()
74 * Allocates a xfrm_sec_state and populates it using the supplied security
185 if (!xp->security) in selinux_xfrm_state_pol_flow_match()
186 if (x->security) in selinux_xfrm_state_pol_flow_match()
193 if (!x->security) in selinux_xfrm_state_pol_flow_match()
201 state_sid = x->security->ctx_sid; in selinux_xfrm_state_pol_flow_match()
226 return x->security->ctx_sid; in selinux_xfrm_skb_sid_egress()
241 struct xfrm_sec_ctx *ctx = x->security; in selinux_xfrm_skb_sid_ingress()
295 * LSM hook implementation that copies security data structure from old to new
317 * LSM hook implementation that frees xfrm_sec_ctx security information.
334 * the supplied security context, and assigns it to the xfrm_state.
339 return selinux_xfrm_alloc_user(&x->security, uctx, GFP_KERNEL); in selinux_xfrm_state_alloc()
377 x->security = ctx; in selinux_xfrm_state_alloc_acquire()
385 * LSM hook implementation that frees xfrm_state security information.
389 selinux_xfrm_free(x->security); in selinux_xfrm_state_free()
397 return selinux_xfrm_delete(x->security); in selinux_xfrm_state_delete()
419 struct xfrm_sec_ctx *ctx = x->security; in selinux_xfrm_sock_rcv_skb()
436 * If we have no security association, then we need to determine
438 * If we do have a authorizable security association, then it has already been