| /net/rxrpc/ |
| A D | Kconfig | 58 bool "RxRPC Kerberos security" 65 Provide kerberos 4 and AFS kaserver security handling for AF_RXRPC 71 bool "RxRPC GSSAPI security" 88 Provide the GSSAPI-based RxGK security class for AFS. Keys are added
|
| A D | security.c | 93 call->security = sec; in rxrpc_init_client_call_security() 110 if (token->security_index == conn->security->security_index) in rxrpc_init_client_conn_security() 118 ret = conn->security->init_connection_security(conn, token); in rxrpc_init_client_conn_security()
|
| A D | conn_event.c | 259 ret = conn->security->respond_to_challenge(conn, skb); in rxrpc_process_event() 265 ret = conn->security->verify_response(conn, skb); in rxrpc_process_event() 269 ret = conn->security->init_connection_security( in rxrpc_process_event() 304 if (conn->security->issue_challenge(conn) < 0) in rxrpc_secure_connection() 422 if (!conn->security->challenge_to_recvmsg) { in rxrpc_post_challenge() 487 if (!conn->security->validate_challenge(conn, skb)) in rxrpc_input_conn_packet()
|
| A D | conn_client.c | 84 bundle->security = call->security; in rxrpc_alloc_bundle() 180 conn->security = bundle->security; in rxrpc_alloc_client_connection() 188 if (conn->security == &rxrpc_no_security) in rxrpc_alloc_client_connection()
|
| A D | oob.c | 198 if (!conn->security->sendmsg_respond_to_challenge) in rxrpc_respond_to_oob() 205 ret = conn->security->sendmsg_respond_to_challenge(skb, msg); in rxrpc_respond_to_oob()
|
| A D | Makefile | 33 security.o \
|
| A D | conn_object.c | 75 conn->security = &rxrpc_no_security; in rxrpc_alloc_connection() 337 conn->security->clear(conn); in rxrpc_clean_up_connection()
|
| A D | call_event.c | 475 if (call->security) in rxrpc_input_call_event() 476 call->security->free_call_crypto(call); in rxrpc_input_call_event()
|
| A D | call_accept.c | 315 call->security = conn->security; in rxrpc_alloc_incoming_call()
|
| A D | conn_service.c | 163 conn->security = sec; in rxrpc_new_incoming_connection()
|
| A D | recvmsg.c | 158 return call->security->verify_packet(call, skb); in rxrpc_verify_data() 192 return conn->security->challenge_to_recvmsg(conn, challenge, msg); in rxrpc_recvmsg_challenge()
|
| A D | rxgk_app.c | 243 ret = conn->security->default_decode_ticket(conn, skb, ticket_offset, in rxgk_extract_token()
|
| A D | ar-internal.h | 502 const struct rxrpc_security *security; /* applied security module */ member 564 const struct rxrpc_security *security; /* applied security module */ member 702 const struct rxrpc_security *security; /* applied security module */ member
|
| A D | sendmsg.c | 408 txb = call->conn->security->alloc_txbuf(call, remain, sk->sk_allocation); in rxrpc_send_data() 445 ret = call->security->secure_packet(call, txb); in rxrpc_send_data()
|
| /net/xfrm/ |
| A D | Kconfig | 65 A feature to update locator(s) of a given IPsec security 129 locator(s) of a given IPsec security association.
|
| A D | xfrm_state.c | 1526 error = security_xfrm_state_alloc_acquire(x, pol->security, fl->flowi_secid); in xfrm_state_find() 1943 static inline int clone_security(struct xfrm_state *x, struct xfrm_sec_ctx *security) in clone_security() argument 1946 int size = sizeof(*uctx) + security->ctx_len; in clone_security() 1955 uctx->ctx_doi = security->ctx_doi; in clone_security() 1956 uctx->ctx_alg = security->ctx_alg; in clone_security() 1957 uctx->ctx_len = security->ctx_len; in clone_security() 1958 memcpy(uctx + 1, security->ctx_str, security->ctx_len); in clone_security() 2024 if (orig->security) in xfrm_state_clone_and_setup() 2025 if (clone_security(x, orig->security)) in xfrm_state_clone_and_setup() 3321 struct xfrm_sec_ctx *ctx = x->security; in xfrm_audit_helper_sainfo()
|
| A D | xfrm_policy.c | 455 security_xfrm_policy_free(policy->security); in xfrm_policy_destroy_rcu() 1552 xfrm_sec_ctx_match(pol->security, policy->security) && in xfrm_policy_insert_list() 1643 xfrm_sec_ctx_match(ctx, pol->security)) in __xfrm_policy_bysel_ctx() 1701 *err = security_xfrm_policy_delete(pol->security); in xfrm_policy_bysel_ctx() 1741 pol->security); in xfrm_policy_byid() 1773 err = security_xfrm_policy_delete(pol->security); in xfrm_policy_flush_secctx_check() 1795 err = security_xfrm_policy_delete(pol->security); in xfrm_dev_policy_flush_secctx_check() 2265 err = security_xfrm_policy_lookup(pol->security, in xfrm_sk_policy_lookup() 2422 if (security_xfrm_policy_clone(old->security, in clone_policy() 2423 &newp->security)) { in clone_policy() [all …]
|
| A D | xfrm_user.c | 1406 if (x->security) { in copy_to_user_state_extra() 1407 ret = copy_sec_ctx(x->security, skb); in copy_to_user_state_extra() 2258 security_xfrm_policy_free(xp->security); in xfrm_add_policy() 2307 if (x->security) { in copy_to_user_state_sec_ctx() 2308 return copy_sec_ctx(x->security, skb); in copy_to_user_state_sec_ctx() 2315 if (xp->security) in copy_to_user_sec_ctx() 2316 return copy_sec_ctx(xp->security, skb); in copy_to_user_sec_ctx() 3655 if (x->security) in xfrm_sa_len() 3657 x->security->ctx_len); in xfrm_sa_len() 3780 + nla_total_size(xfrm_user_sec_ctx_size(x->security)) in xfrm_acquire_msgsize() [all …]
|
| /net/ipv6/netfilter/ |
| A D | Kconfig | 256 # security table for MAC policy 263 This option adds a `security' table to iptables, for use
|
| /net/ipv4/netfilter/ |
| A D | Kconfig | 312 # security table for MAC policy 319 This option adds a `security' table to iptables, for use
|
| /net/netfilter/ |
| A D | Kconfig | 124 bool 'Connection tracking security mark support' 128 This option enables security markings to be applied to 631 tristate "Netfilter nf_tables xfrm/IPSec security association matching" 635 of a packets security association. 868 The CONNSECMARK target copies security markings from packets 869 to connections, and restores security markings from connections 1122 The SECMARK target allows security marking of network 1123 packets, for use with security subsystems.
|
| /net/mac80211/ |
| A D | mesh_plink.c | 557 sdata->u.mesh.security & IEEE80211_MESH_SEC_AUTHED) { in mesh_sta_info_alloc() 1138 sdata->u.mesh.security == IEEE80211_MESH_SEC_NONE) { in mesh_process_plink_frame()
|
| A D | mesh.c | 1019 sdata->u.mesh.security ? WLAN_CAPABILITY_PRIVACY : 0); in ieee80211_mesh_build_beacon() 1485 (elems->rsn && sdata->u.mesh.security == IEEE80211_MESH_SEC_NONE) || in ieee80211_mesh_rx_bcn_presp() 1486 (!elems->rsn && sdata->u.mesh.security != IEEE80211_MESH_SEC_NONE)) in ieee80211_mesh_rx_bcn_presp()
|
| /net/key/ |
| A D | af_key.c | 795 if ((xfrm_ctx = x->security)) { in __pfkey_xfrm_state2msg() 2019 struct xfrm_sec_ctx *xfrm_ctx = xp->security; in pfkey_xfrm_policy2sec_ctx_size() 2196 if ((xfrm_ctx = xp->security)) { in pfkey_xfrm_policy2msg() 2307 err = security_xfrm_policy_alloc(&xp->security, uctx, GFP_KERNEL); in pfkey_spdadd() 3181 if ((xfrm_ctx = x->security)) { in pfkey_send_acquire() 3338 *dir = security_xfrm_policy_alloc(&xp->security, uctx, GFP_ATOMIC); in pfkey_compile_policy()
|
| /net/ |
| A D | Kconfig | 145 This enables security marking of network packets, similar 146 to nfmark, but designated for security purposes.
|