Home
last modified time | relevance | path

Searched refs:security (Results 1 – 25 of 28) sorted by relevance

12

/net/rxrpc/
A DKconfig58 bool "RxRPC Kerberos security"
65 Provide kerberos 4 and AFS kaserver security handling for AF_RXRPC
71 bool "RxRPC GSSAPI security"
88 Provide the GSSAPI-based RxGK security class for AFS. Keys are added
A Dsecurity.c93 call->security = sec; in rxrpc_init_client_call_security()
110 if (token->security_index == conn->security->security_index) in rxrpc_init_client_conn_security()
118 ret = conn->security->init_connection_security(conn, token); in rxrpc_init_client_conn_security()
A Dconn_event.c259 ret = conn->security->respond_to_challenge(conn, skb); in rxrpc_process_event()
265 ret = conn->security->verify_response(conn, skb); in rxrpc_process_event()
269 ret = conn->security->init_connection_security( in rxrpc_process_event()
304 if (conn->security->issue_challenge(conn) < 0) in rxrpc_secure_connection()
422 if (!conn->security->challenge_to_recvmsg) { in rxrpc_post_challenge()
487 if (!conn->security->validate_challenge(conn, skb)) in rxrpc_input_conn_packet()
A Dconn_client.c84 bundle->security = call->security; in rxrpc_alloc_bundle()
180 conn->security = bundle->security; in rxrpc_alloc_client_connection()
188 if (conn->security == &rxrpc_no_security) in rxrpc_alloc_client_connection()
A Doob.c198 if (!conn->security->sendmsg_respond_to_challenge) in rxrpc_respond_to_oob()
205 ret = conn->security->sendmsg_respond_to_challenge(skb, msg); in rxrpc_respond_to_oob()
A DMakefile33 security.o \
A Dconn_object.c75 conn->security = &rxrpc_no_security; in rxrpc_alloc_connection()
337 conn->security->clear(conn); in rxrpc_clean_up_connection()
A Dcall_event.c475 if (call->security) in rxrpc_input_call_event()
476 call->security->free_call_crypto(call); in rxrpc_input_call_event()
A Dcall_accept.c315 call->security = conn->security; in rxrpc_alloc_incoming_call()
A Dconn_service.c163 conn->security = sec; in rxrpc_new_incoming_connection()
A Drecvmsg.c158 return call->security->verify_packet(call, skb); in rxrpc_verify_data()
192 return conn->security->challenge_to_recvmsg(conn, challenge, msg); in rxrpc_recvmsg_challenge()
A Drxgk_app.c243 ret = conn->security->default_decode_ticket(conn, skb, ticket_offset, in rxgk_extract_token()
A Dar-internal.h502 const struct rxrpc_security *security; /* applied security module */ member
564 const struct rxrpc_security *security; /* applied security module */ member
702 const struct rxrpc_security *security; /* applied security module */ member
A Dsendmsg.c408 txb = call->conn->security->alloc_txbuf(call, remain, sk->sk_allocation); in rxrpc_send_data()
445 ret = call->security->secure_packet(call, txb); in rxrpc_send_data()
/net/xfrm/
A DKconfig65 A feature to update locator(s) of a given IPsec security
129 locator(s) of a given IPsec security association.
A Dxfrm_state.c1526 error = security_xfrm_state_alloc_acquire(x, pol->security, fl->flowi_secid); in xfrm_state_find()
1943 static inline int clone_security(struct xfrm_state *x, struct xfrm_sec_ctx *security) in clone_security() argument
1946 int size = sizeof(*uctx) + security->ctx_len; in clone_security()
1955 uctx->ctx_doi = security->ctx_doi; in clone_security()
1956 uctx->ctx_alg = security->ctx_alg; in clone_security()
1957 uctx->ctx_len = security->ctx_len; in clone_security()
1958 memcpy(uctx + 1, security->ctx_str, security->ctx_len); in clone_security()
2024 if (orig->security) in xfrm_state_clone_and_setup()
2025 if (clone_security(x, orig->security)) in xfrm_state_clone_and_setup()
3321 struct xfrm_sec_ctx *ctx = x->security; in xfrm_audit_helper_sainfo()
A Dxfrm_policy.c455 security_xfrm_policy_free(policy->security); in xfrm_policy_destroy_rcu()
1552 xfrm_sec_ctx_match(pol->security, policy->security) && in xfrm_policy_insert_list()
1643 xfrm_sec_ctx_match(ctx, pol->security)) in __xfrm_policy_bysel_ctx()
1701 *err = security_xfrm_policy_delete(pol->security); in xfrm_policy_bysel_ctx()
1741 pol->security); in xfrm_policy_byid()
1773 err = security_xfrm_policy_delete(pol->security); in xfrm_policy_flush_secctx_check()
1795 err = security_xfrm_policy_delete(pol->security); in xfrm_dev_policy_flush_secctx_check()
2265 err = security_xfrm_policy_lookup(pol->security, in xfrm_sk_policy_lookup()
2422 if (security_xfrm_policy_clone(old->security, in clone_policy()
2423 &newp->security)) { in clone_policy()
[all …]
A Dxfrm_user.c1406 if (x->security) { in copy_to_user_state_extra()
1407 ret = copy_sec_ctx(x->security, skb); in copy_to_user_state_extra()
2258 security_xfrm_policy_free(xp->security); in xfrm_add_policy()
2307 if (x->security) { in copy_to_user_state_sec_ctx()
2308 return copy_sec_ctx(x->security, skb); in copy_to_user_state_sec_ctx()
2315 if (xp->security) in copy_to_user_sec_ctx()
2316 return copy_sec_ctx(xp->security, skb); in copy_to_user_sec_ctx()
3655 if (x->security) in xfrm_sa_len()
3657 x->security->ctx_len); in xfrm_sa_len()
3780 + nla_total_size(xfrm_user_sec_ctx_size(x->security)) in xfrm_acquire_msgsize()
[all …]
/net/ipv6/netfilter/
A DKconfig256 # security table for MAC policy
263 This option adds a `security' table to iptables, for use
/net/ipv4/netfilter/
A DKconfig312 # security table for MAC policy
319 This option adds a `security' table to iptables, for use
/net/netfilter/
A DKconfig124 bool 'Connection tracking security mark support'
128 This option enables security markings to be applied to
631 tristate "Netfilter nf_tables xfrm/IPSec security association matching"
635 of a packets security association.
868 The CONNSECMARK target copies security markings from packets
869 to connections, and restores security markings from connections
1122 The SECMARK target allows security marking of network
1123 packets, for use with security subsystems.
/net/mac80211/
A Dmesh_plink.c557 sdata->u.mesh.security & IEEE80211_MESH_SEC_AUTHED) { in mesh_sta_info_alloc()
1138 sdata->u.mesh.security == IEEE80211_MESH_SEC_NONE) { in mesh_process_plink_frame()
A Dmesh.c1019 sdata->u.mesh.security ? WLAN_CAPABILITY_PRIVACY : 0); in ieee80211_mesh_build_beacon()
1485 (elems->rsn && sdata->u.mesh.security == IEEE80211_MESH_SEC_NONE) || in ieee80211_mesh_rx_bcn_presp()
1486 (!elems->rsn && sdata->u.mesh.security != IEEE80211_MESH_SEC_NONE)) in ieee80211_mesh_rx_bcn_presp()
/net/key/
A Daf_key.c795 if ((xfrm_ctx = x->security)) { in __pfkey_xfrm_state2msg()
2019 struct xfrm_sec_ctx *xfrm_ctx = xp->security; in pfkey_xfrm_policy2sec_ctx_size()
2196 if ((xfrm_ctx = xp->security)) { in pfkey_xfrm_policy2msg()
2307 err = security_xfrm_policy_alloc(&xp->security, uctx, GFP_KERNEL); in pfkey_spdadd()
3181 if ((xfrm_ctx = x->security)) { in pfkey_send_acquire()
3338 *dir = security_xfrm_policy_alloc(&xp->security, uctx, GFP_ATOMIC); in pfkey_compile_policy()
/net/
A DKconfig145 This enables security marking of network packets, similar
146 to nfmark, but designated for security purposes.

Completed in 65 milliseconds

12