Lines Matching refs:secid

3295  * security_cred_getsecid() - Get the secid from a set of credentials

3297 * @secid: secid value
3300 * failure, @secid will be set to zero.
3302 void security_cred_getsecid(const struct cred *c, u32 *secid)
3304 *secid = 0;
3305 call_void_hook(cred_getsecid, c, secid);
3325 * security_kernel_act_as() - Set the kernel credentials to act as secid
3327 * @secid: secid
3330 * The current task must be the one that nominated @secid.
3334 int security_kernel_act_as(struct cred *new, u32 secid)
3336 return call_int_hook(kernel_act_as, new, secid);
4324 * security_secid_to_secctx() - Convert a secid to a secctx
4325 * @secid: secid
4328 * Convert secid to security context. If @cp is NULL the length of the
4335 int security_secid_to_secctx(u32 secid, struct lsm_context *cp)
4337 return call_int_hook(secid_to_secctx, secid, cp);
4360 * security_secctx_to_secid() - Convert a secctx to a secid
4363 * @secid: secid
4365 * Convert security context to secid.
4369 int security_secctx_to_secid(const char *secdata, u32 seclen, u32 *secid)
4371 *secid = 0;
4372 return call_int_hook(secctx_to_secid, secdata, seclen, secid);
4841 * @secid: remote peer label secid
4852 struct sk_buff *skb, u32 *secid)
4854 return call_int_hook(socket_getpeersec_dgram, sock, skb, secid);
4922 * security_sk_classify_flow() - Set a flow's secid based on socket
4926 * Set the target flow's secid to socket's secid.
4935 * security_req_classify_flow() - Set a flow's secid based on request_sock
4939 * Sets @flic's secid to @req's secid.
4953 * Sets @parent's inode secid to @sk's secid and update @sk with any necessary
5008 * @secid: new secmark value
5010 * Check if the process should be allowed to relabel packets to @secid.
5014 int security_secmark_relabel_packet(u32 secid)
5016 return call_int_hook(secmark_relabel_packet, secid);
5383 * @secid: secid from the flow
5387 * correspond to secid.
5392 struct xfrm_sec_ctx *polsec, u32 secid)
5394 return call_int_hook(xfrm_state_alloc_acquire, x, polsec, secid);
5425 * @fl_secid: flow secid used to authorize access
5473 * security_xfrm_decode_session() - Determine the xfrm secid for a packet
5475 * @secid: secid
5477 * Decode the packet in @skb and return the security label in @secid.
5479 * Return: Return 0 if all xfrms used have the same secid.
5481 int security_xfrm_decode_session(struct sk_buff *skb, u32 *secid)
5483 return call_int_hook(xfrm_decode_session, skb, secid, 1);
5641 * Determine if given @secid matches a rule previously approved by
5644 * Return: Returns 1 if secid matches the rule, 0 if it does not, -ERRNO on