Searched refs:security (Results 1 – 22 of 22) sorted by relevance
/net/rxrpc/ |
D | ar-security.c | 147 conn->security = sec; in rxrpc_init_client_conn_security() 149 ret = conn->security->init_connection_security(conn); in rxrpc_init_client_conn_security() 151 rxrpc_security_put(conn->security); in rxrpc_init_client_conn_security() 152 conn->security = NULL; in rxrpc_init_client_conn_security() 217 conn->security = sec; in rxrpc_init_server_conn_security() 231 if (call->conn->security) in rxrpc_secure_packet() 232 return call->conn->security->secure_packet( in rxrpc_secure_packet() 243 if (call->conn->security) in rxrpc_verify_packet() 244 return call->conn->security->verify_packet( in rxrpc_verify_packet() 256 if (conn->security) { in rxrpc_clear_conn_security() [all …]
|
D | ar-connevent.c | 174 if (conn->security) in rxrpc_process_event() 175 return conn->security->respond_to_challenge( in rxrpc_process_event() 180 if (!conn->security) in rxrpc_process_event() 183 ret = conn->security->verify_response(conn, skb, _abort_code); in rxrpc_process_event() 187 ret = conn->security->init_connection_security(conn); in rxrpc_process_event() 191 conn->security->prime_packet_security(conn); in rxrpc_process_event() 238 ASSERT(conn->security != NULL); in rxrpc_secure_connection() 240 if (conn->security->issue_challenge(conn) < 0) { in rxrpc_secure_connection()
|
D | Kconfig | 33 tristate "RxRPC Kerberos security" 41 Provide kerberos 4 and AFS kaserver security handling for AF_RXRPC
|
D | Makefile | 19 ar-security.o \
|
D | ar-connection.c | 568 if (candidate->security) in rxrpc_connect_call() 569 candidate->security->prime_packet_security(candidate); in rxrpc_connect_call()
|
D | ar-internal.h | 252 struct rxrpc_security *security; /* applied security module */ member
|
D | ar-output.c | 642 if (conn->security) { in rxrpc_send_data()
|
D | ar-input.c | 202 if (call->conn->security) in rxrpc_fast_process_data()
|
/net/xfrm/ |
D | Kconfig | 48 A feature to update locator(s) of a given IPsec security 88 locator(s) of a given IPsec security association.
|
D | xfrm_policy.c | 310 security_xfrm_policy_free(policy->security); in xfrm_policy_destroy_rcu() 766 xfrm_sec_ctx_match(pol->security, policy->security) && in xfrm_policy_insert() 832 xfrm_sec_ctx_match(ctx, pol->security)) { in xfrm_policy_bysel_ctx() 836 pol->security); in xfrm_policy_bysel_ctx() 875 pol->security); in xfrm_policy_byid() 908 err = security_xfrm_policy_delete(pol->security); in xfrm_policy_flush_secctx_check() 921 pol->security); in xfrm_policy_flush_secctx_check() 1087 ret = security_xfrm_policy_lookup(pol->security, fl->flowi_secid, in xfrm_policy_match() 1244 err = security_xfrm_policy_lookup(pol->security, in xfrm_sk_policy_lookup() 1359 if (security_xfrm_policy_clone(old->security, in clone_policy() [all …]
|
D | xfrm_user.c | 900 if (x->security) in copy_to_user_state_extra() 901 ret = copy_sec_ctx(x->security, skb); in copy_to_user_state_extra() 1425 return security_xfrm_policy_alloc(&pol->security, uctx, GFP_KERNEL); in copy_from_user_sec_ctx() 1634 security_xfrm_policy_free(xp->security); in xfrm_add_policy() 1680 if (x->security) { in copy_to_user_state_sec_ctx() 1681 return copy_sec_ctx(x->security, skb); in copy_to_user_state_sec_ctx() 1688 if (xp->security) in copy_to_user_sec_ctx() 1689 return copy_sec_ctx(xp->security, skb); in copy_to_user_sec_ctx() 2775 if (x->security) in xfrm_sa_len() 2777 x->security->ctx_len); in xfrm_sa_len() [all …]
|
D | xfrm_state.c | 848 error = security_xfrm_state_alloc_acquire(x, pol->security, fl->flowi_secid); in xfrm_state_find() 2241 struct xfrm_sec_ctx *ctx = x->security; in xfrm_audit_helper_sainfo()
|
/net/ipv6/netfilter/ |
D | Kconfig | 286 # security table for MAC policy 292 This option adds a `security' table to iptables, for use
|
/net/mac80211/ |
D | mesh.c | 739 sdata->u.mesh.security ? WLAN_CAPABILITY_PRIVACY : 0); in ieee80211_mesh_build_beacon() 1103 (elems.rsn && sdata->u.mesh.security == IEEE80211_MESH_SEC_NONE) || in ieee80211_mesh_rx_bcn_presp() 1104 (!elems.rsn && sdata->u.mesh.security != IEEE80211_MESH_SEC_NONE)) in ieee80211_mesh_rx_bcn_presp()
|
D | mesh_plink.c | 498 sdata->u.mesh.security & IEEE80211_MESH_SEC_AUTHED) { in mesh_sta_info_alloc() 1064 sdata->u.mesh.security == IEEE80211_MESH_SEC_NONE) { in mesh_process_plink_frame()
|
D | cfg.c | 230 if (sdata->u.mesh.security != IEEE80211_MESH_SEC_NONE) in ieee80211_add_key() 1607 ifmsh->security = IEEE80211_MESH_SEC_NONE; in copy_mesh_setup() 1609 ifmsh->security |= IEEE80211_MESH_SEC_AUTHED; in copy_mesh_setup() 1611 ifmsh->security |= IEEE80211_MESH_SEC_SECURED; in copy_mesh_setup()
|
D | ieee80211_i.h | 668 } security; member
|
/net/ipv4/netfilter/ |
D | Kconfig | 375 # security table for MAC policy 381 This option adds a `security' table to iptables, for use
|
/net/ |
D | Kconfig | 98 This enables security marking of network packets, similar 99 to nfmark, but designated for security purposes.
|
/net/netfilter/ |
D | Kconfig | 72 bool 'Connection tracking security mark support' 76 This option enables security markings to be applied to 675 The CONNSECMARK target copies security markings from packets 676 to connections, and restores security markings from connections 914 The SECMARK target allows security marking of network 915 packets, for use with security subsystems.
|
/net/key/ |
D | af_key.c | 813 if ((xfrm_ctx = x->security)) { in __pfkey_xfrm_state2msg() 2040 struct xfrm_sec_ctx *xfrm_ctx = xp->security; in pfkey_xfrm_policy2sec_ctx_size() 2222 if ((xfrm_ctx = xp->security)) { in pfkey_xfrm_policy2msg() 2331 err = security_xfrm_policy_alloc(&xp->security, uctx, GFP_KERNEL); in pfkey_spdadd() 3197 if ((xfrm_ctx = x->security)) { in pfkey_send_acquire() 3353 *dir = security_xfrm_policy_alloc(&xp->security, uctx, GFP_ATOMIC); in pfkey_compile_policy()
|
/net/ipv4/ |
D | Kconfig | 38 arriving on. This has security advantages because it prevents the
|