Home
last modified time | relevance | path

Searched refs:security (Results 1 – 22 of 22) sorted by relevance

/net/rxrpc/
Dar-security.c147 conn->security = sec; in rxrpc_init_client_conn_security()
149 ret = conn->security->init_connection_security(conn); in rxrpc_init_client_conn_security()
151 rxrpc_security_put(conn->security); in rxrpc_init_client_conn_security()
152 conn->security = NULL; in rxrpc_init_client_conn_security()
217 conn->security = sec; in rxrpc_init_server_conn_security()
231 if (call->conn->security) in rxrpc_secure_packet()
232 return call->conn->security->secure_packet( in rxrpc_secure_packet()
243 if (call->conn->security) in rxrpc_verify_packet()
244 return call->conn->security->verify_packet( in rxrpc_verify_packet()
256 if (conn->security) { in rxrpc_clear_conn_security()
[all …]
Dar-connevent.c174 if (conn->security) in rxrpc_process_event()
175 return conn->security->respond_to_challenge( in rxrpc_process_event()
180 if (!conn->security) in rxrpc_process_event()
183 ret = conn->security->verify_response(conn, skb, _abort_code); in rxrpc_process_event()
187 ret = conn->security->init_connection_security(conn); in rxrpc_process_event()
191 conn->security->prime_packet_security(conn); in rxrpc_process_event()
238 ASSERT(conn->security != NULL); in rxrpc_secure_connection()
240 if (conn->security->issue_challenge(conn) < 0) { in rxrpc_secure_connection()
DKconfig33 tristate "RxRPC Kerberos security"
41 Provide kerberos 4 and AFS kaserver security handling for AF_RXRPC
DMakefile19 ar-security.o \
Dar-connection.c568 if (candidate->security) in rxrpc_connect_call()
569 candidate->security->prime_packet_security(candidate); in rxrpc_connect_call()
Dar-internal.h252 struct rxrpc_security *security; /* applied security module */ member
Dar-output.c642 if (conn->security) { in rxrpc_send_data()
Dar-input.c202 if (call->conn->security) in rxrpc_fast_process_data()
/net/xfrm/
DKconfig48 A feature to update locator(s) of a given IPsec security
88 locator(s) of a given IPsec security association.
Dxfrm_policy.c310 security_xfrm_policy_free(policy->security); in xfrm_policy_destroy_rcu()
766 xfrm_sec_ctx_match(pol->security, policy->security) && in xfrm_policy_insert()
832 xfrm_sec_ctx_match(ctx, pol->security)) { in xfrm_policy_bysel_ctx()
836 pol->security); in xfrm_policy_bysel_ctx()
875 pol->security); in xfrm_policy_byid()
908 err = security_xfrm_policy_delete(pol->security); in xfrm_policy_flush_secctx_check()
921 pol->security); in xfrm_policy_flush_secctx_check()
1087 ret = security_xfrm_policy_lookup(pol->security, fl->flowi_secid, in xfrm_policy_match()
1244 err = security_xfrm_policy_lookup(pol->security, in xfrm_sk_policy_lookup()
1359 if (security_xfrm_policy_clone(old->security, in clone_policy()
[all …]
Dxfrm_user.c900 if (x->security) in copy_to_user_state_extra()
901 ret = copy_sec_ctx(x->security, skb); in copy_to_user_state_extra()
1425 return security_xfrm_policy_alloc(&pol->security, uctx, GFP_KERNEL); in copy_from_user_sec_ctx()
1634 security_xfrm_policy_free(xp->security); in xfrm_add_policy()
1680 if (x->security) { in copy_to_user_state_sec_ctx()
1681 return copy_sec_ctx(x->security, skb); in copy_to_user_state_sec_ctx()
1688 if (xp->security) in copy_to_user_sec_ctx()
1689 return copy_sec_ctx(xp->security, skb); in copy_to_user_sec_ctx()
2775 if (x->security) in xfrm_sa_len()
2777 x->security->ctx_len); in xfrm_sa_len()
[all …]
Dxfrm_state.c848 error = security_xfrm_state_alloc_acquire(x, pol->security, fl->flowi_secid); in xfrm_state_find()
2241 struct xfrm_sec_ctx *ctx = x->security; in xfrm_audit_helper_sainfo()
/net/ipv6/netfilter/
DKconfig286 # security table for MAC policy
292 This option adds a `security' table to iptables, for use
/net/mac80211/
Dmesh.c739 sdata->u.mesh.security ? WLAN_CAPABILITY_PRIVACY : 0); in ieee80211_mesh_build_beacon()
1103 (elems.rsn && sdata->u.mesh.security == IEEE80211_MESH_SEC_NONE) || in ieee80211_mesh_rx_bcn_presp()
1104 (!elems.rsn && sdata->u.mesh.security != IEEE80211_MESH_SEC_NONE)) in ieee80211_mesh_rx_bcn_presp()
Dmesh_plink.c498 sdata->u.mesh.security & IEEE80211_MESH_SEC_AUTHED) { in mesh_sta_info_alloc()
1064 sdata->u.mesh.security == IEEE80211_MESH_SEC_NONE) { in mesh_process_plink_frame()
Dcfg.c230 if (sdata->u.mesh.security != IEEE80211_MESH_SEC_NONE) in ieee80211_add_key()
1607 ifmsh->security = IEEE80211_MESH_SEC_NONE; in copy_mesh_setup()
1609 ifmsh->security |= IEEE80211_MESH_SEC_AUTHED; in copy_mesh_setup()
1611 ifmsh->security |= IEEE80211_MESH_SEC_SECURED; in copy_mesh_setup()
Dieee80211_i.h668 } security; member
/net/ipv4/netfilter/
DKconfig375 # security table for MAC policy
381 This option adds a `security' table to iptables, for use
/net/
DKconfig98 This enables security marking of network packets, similar
99 to nfmark, but designated for security purposes.
/net/netfilter/
DKconfig72 bool 'Connection tracking security mark support'
76 This option enables security markings to be applied to
675 The CONNSECMARK target copies security markings from packets
676 to connections, and restores security markings from connections
914 The SECMARK target allows security marking of network
915 packets, for use with security subsystems.
/net/key/
Daf_key.c813 if ((xfrm_ctx = x->security)) { in __pfkey_xfrm_state2msg()
2040 struct xfrm_sec_ctx *xfrm_ctx = xp->security; in pfkey_xfrm_policy2sec_ctx_size()
2222 if ((xfrm_ctx = xp->security)) { in pfkey_xfrm_policy2msg()
2331 err = security_xfrm_policy_alloc(&xp->security, uctx, GFP_KERNEL); in pfkey_spdadd()
3197 if ((xfrm_ctx = x->security)) { in pfkey_send_acquire()
3353 *dir = security_xfrm_policy_alloc(&xp->security, uctx, GFP_ATOMIC); in pfkey_compile_policy()
/net/ipv4/
DKconfig38 arriving on. This has security advantages because it prevents the