/security/tomoyo/ |
D | network.c | 26 u8 protocol; member 198 return p1->protocol == p2->protocol && in tomoyo_same_inet_acl() 217 return p1->protocol == p2->protocol && in tomoyo_same_unix_acl() 287 const char *protocol = tomoyo_read_token(param); in tomoyo_write_inet_network() local 290 for (e.protocol = 0; e.protocol < TOMOYO_SOCK_MAX; e.protocol++) in tomoyo_write_inet_network() 291 if (!strcmp(protocol, tomoyo_proto_keyword[e.protocol])) in tomoyo_write_inet_network() 296 if (e.protocol == TOMOYO_SOCK_MAX || !e.perm) in tomoyo_write_inet_network() 332 const char *protocol = tomoyo_read_token(param); in tomoyo_write_unix_network() local 335 for (e.protocol = 0; e.protocol < TOMOYO_SOCK_MAX; e.protocol++) in tomoyo_write_unix_network() 336 if (!strcmp(protocol, tomoyo_proto_keyword[e.protocol])) in tomoyo_write_unix_network() [all …]
|
D | common.h | 471 u8 protocol; member 479 u8 protocol; member 765 u8 protocol; member 774 u8 protocol; member
|
D | common.c | 1512 [ptr->protocol]); in tomoyo_print_entry() 1545 [ptr->protocol]); in tomoyo_print_entry()
|
/security/selinux/ |
D | netport.c | 84 static struct sel_netport *sel_netport_find(u8 protocol, u16 pnum) in sel_netport_find() argument 91 if (port->psec.port == pnum && port->psec.protocol == protocol) in sel_netport_find() 138 static int sel_netport_sid_slow(u8 protocol, u16 pnum, u32 *sid) in sel_netport_sid_slow() argument 145 port = sel_netport_find(protocol, pnum); in sel_netport_sid_slow() 152 ret = security_port_sid(&selinux_state, protocol, pnum, sid); in sel_netport_sid_slow() 158 new->psec.protocol = protocol; in sel_netport_sid_slow() 184 int sel_netport_sid(u8 protocol, u16 pnum, u32 *sid) in sel_netport_sid() argument 189 port = sel_netport_find(protocol, pnum); in sel_netport_sid() 197 return sel_netport_sid_slow(protocol, pnum, sid); in sel_netport_sid()
|
D | hooks.c | 1171 static inline int default_protocol_stream(int protocol) in default_protocol_stream() argument 1173 return (protocol == IPPROTO_IP || protocol == IPPROTO_TCP); in default_protocol_stream() 1176 static inline int default_protocol_dgram(int protocol) in default_protocol_dgram() argument 1178 return (protocol == IPPROTO_IP || protocol == IPPROTO_UDP); in default_protocol_dgram() 1181 static inline u16 socket_type_to_security_class(int family, int type, int protocol) in socket_type_to_security_class() argument 1201 if (default_protocol_stream(protocol)) in socket_type_to_security_class() 1203 else if (extsockclass && protocol == IPPROTO_SCTP) in socket_type_to_security_class() 1208 if (default_protocol_dgram(protocol)) in socket_type_to_security_class() 1210 else if (extsockclass && (protocol == IPPROTO_ICMP || in socket_type_to_security_class() 1211 protocol == IPPROTO_ICMPV6)) in socket_type_to_security_class() [all …]
|
/security/apparmor/ |
D | net.c | 85 audit_log_format(ab, " protocol=%d", aad(sa)->net.protocol); in audit_net_cb() 133 int type, int protocol) in aa_af_perm() argument 136 DEFINE_AUDIT_NET(sa, op, NULL, family, type, protocol); in aa_af_perm()
|
D | lsm.c | 801 static int apparmor_socket_create(int family, int type, int protocol, int kern) in apparmor_socket_create() argument 811 create_perm(label, family, type, protocol), in apparmor_socket_create() 813 family, type, protocol)); in apparmor_socket_create() 830 int type, int protocol, int kern) in apparmor_socket_post_create() argument
|
/security/apparmor/include/ |
D | net.h | 65 aad(&NAME)->net.protocol = (P) 95 int type, int protocol);
|
D | audit.h | 134 int type, protocol; member
|
/security/selinux/include/ |
D | netport.h | 21 int sel_netport_sid(u8 protocol, u16 pnum, u32 *sid);
|
D | objsec.h | 102 u8 protocol; /* transport protocol */ member
|
D | security.h | 290 u8 protocol, u16 port, u32 *out_sid);
|
/security/ |
D | lsm_audit.c | 53 *proto = ih->protocol; in ipv4_skb_to_auditdata() 58 switch (ih->protocol) { in ipv4_skb_to_auditdata()
|
D | security.c | 1974 int security_socket_create(int family, int type, int protocol, int kern) in security_socket_create() argument 1976 return call_int_hook(socket_create, 0, family, type, protocol, kern); in security_socket_create() 1980 int type, int protocol, int kern) in security_socket_post_create() argument 1983 protocol, kern); in security_socket_post_create()
|
/security/selinux/ss/ |
D | policydb.h | 174 u8 protocol; member
|
D | services.c | 2316 u8 protocol, u16 port, u32 *out_sid) in security_port_sid() argument 2330 if (c->u.port.protocol == protocol && in security_port_sid()
|
D | policydb.c | 2134 c->u.port.protocol = le32_to_cpu(buf[0]); in ocontext_read() 3130 buf[0] = cpu_to_le32(c->u.port.protocol); in ocontext_write()
|
/security/smack/ |
D | smack_lsm.c | 2753 int type, int protocol, int kern) in smack_socket_post_create() argument 3861 if (family == PF_INET6 && skb->protocol == htons(ETH_P_IP)) in smack_socket_sock_rcv_skb() 4008 if (skb->protocol == htons(ETH_P_IP)) in smack_socket_getpeersec_dgram() 4011 else if (skb->protocol == htons(ETH_P_IPV6)) in smack_socket_getpeersec_dgram() 4109 if (skb->protocol == htons(ETH_P_IP)) in smack_inet_conn_request()
|