| /security/tomoyo/ |
| A D | network.c | 26 u8 protocol; member 198 return p1->protocol == p2->protocol && in tomoyo_same_inet_acl() 217 return p1->protocol == p2->protocol && in tomoyo_same_unix_acl() 290 for (e.protocol = 0; e.protocol < TOMOYO_SOCK_MAX; e.protocol++) in tomoyo_write_inet_network() 291 if (!strcmp(protocol, tomoyo_proto_keyword[e.protocol])) in tomoyo_write_inet_network() 335 for (e.protocol = 0; e.protocol < TOMOYO_SOCK_MAX; e.protocol++) in tomoyo_write_unix_network() 336 if (!strcmp(protocol, tomoyo_proto_keyword[e.protocol])) in tomoyo_write_unix_network() 477 r.param.inet_network.protocol = address->protocol; in tomoyo_inet_entry() 569 r.param.unix_network.protocol = address->protocol; in tomoyo_unix_entry() 668 address.protocol = type; in tomoyo_socket_listen_permission() [all …]
|
| A D | common.h | 471 u8 protocol; member 479 u8 protocol; member 765 u8 protocol; member 774 u8 protocol; member
|
| A D | common.c | 1504 [ptr->protocol]); in tomoyo_print_entry() 1537 [ptr->protocol]); in tomoyo_print_entry()
|
| /security/selinux/ |
| A D | netport.c | 77 static struct sel_netport *sel_netport_find(u8 protocol, u16 pnum) in sel_netport_find() argument 84 if (port->psec.port == pnum && port->psec.protocol == protocol) in sel_netport_find() 131 static int sel_netport_sid_slow(u8 protocol, u16 pnum, u32 *sid) in sel_netport_sid_slow() argument 138 port = sel_netport_find(protocol, pnum); in sel_netport_sid_slow() 145 ret = security_port_sid(protocol, pnum, sid); in sel_netport_sid_slow() 155 new->psec.protocol = protocol; in sel_netport_sid_slow() 181 int sel_netport_sid(u8 protocol, u16 pnum, u32 *sid) in sel_netport_sid() argument 186 port = sel_netport_find(protocol, pnum); in sel_netport_sid() 194 return sel_netport_sid_slow(protocol, pnum, sid); in sel_netport_sid()
|
| A D | hooks.c | 1158 return (protocol == IPPROTO_IP || protocol == IPPROTO_TCP || in default_protocol_stream() 1159 protocol == IPPROTO_MPTCP); in default_protocol_stream() 1164 return (protocol == IPPROTO_IP || protocol == IPPROTO_UDP); in default_protocol_dgram() 1187 if (default_protocol_stream(protocol)) in socket_type_to_security_class() 1194 if (default_protocol_dgram(protocol)) in socket_type_to_security_class() 1197 protocol == IPPROTO_ICMPV6)) in socket_type_to_security_class() 1206 switch (protocol) { in socket_type_to_security_class() 4498 *proto = ih->protocol; in selinux_parse_skb_ipv4() 4500 switch (ih->protocol) { in selinux_parse_skb_ipv4() 4794 int protocol, int kern) in selinux_socket_create() argument [all …]
|
| /security/apparmor/include/ |
| A D | net.h | 71 NAME.net.protocol = (P) 93 u32 request, u16 af, int type, int protocol, 98 u32 request, u16 family, int type, int protocol); 101 int type, int protocol);
|
| A D | af_unix.h | 41 int protocol);
|
| A D | audit.h | 140 int type, protocol; member
|
| /security/apparmor/ |
| A D | net.c | 131 audit_log_format(ab, " protocol=%d", ad->net.protocol); in audit_net_cb() 225 u32 request, u16 af, int type, int protocol, in aa_match_to_prot() argument 238 state = aa_dfa_match_be16(policy->dfa, state, (u16)protocol); in aa_match_to_prot() 252 int type, int protocol) in aa_profile_af_perm() argument 268 protocol, &p, &ad->info); in aa_profile_af_perm() 273 const char *op, u32 request, u16 family, int type, int protocol) in aa_af_perm() argument 276 DEFINE_AUDIT_NET(ad, op, subj_cred, NULL, family, type, protocol); in aa_af_perm() 280 type, protocol)); in aa_af_perm()
|
| A D | af_unix.c | 86 int type, int protocol, in match_to_local() argument 92 protocol, NULL, info); in match_to_local() 202 int type, int protocol, in profile_create_perm() argument 214 PF_UNIX, type, protocol, NULL, in profile_create_perm() 222 protocol); in profile_create_perm() 430 int protocol) in aa_unix_create_perm() argument 435 type, protocol); in aa_unix_create_perm() 439 protocol, &ad)); in aa_unix_create_perm()
|
| A D | lsm.c | 1261 static int apparmor_socket_create(int family, int type, int protocol, int kern) in apparmor_socket_create() argument 1275 protocol); in apparmor_socket_create() 1279 protocol); in apparmor_socket_create() 1301 int type, int protocol, int kern) in apparmor_socket_post_create() argument
|
| /security/selinux/include/ |
| A D | netport.h | 23 int sel_netport_sid(u8 protocol, u16 pnum, u32 *sid);
|
| A D | objsec.h | 124 u8 protocol; /* transport protocol */ member
|
| A D | security.h | 306 int security_port_sid(u8 protocol, u16 port, u32 *out_sid);
|
| /security/ |
| A D | lsm_audit.c | 50 *proto = ih->protocol; in ipv4_skb_to_auditdata() 55 switch (ih->protocol) { in ipv4_skb_to_auditdata()
|
| A D | security.c | 4581 int security_socket_create(int family, int type, int protocol, int kern) in security_socket_create() argument 4583 return call_int_hook(socket_create, family, type, protocol, kern); in security_socket_create() 4605 int type, int protocol, int kern) in security_socket_post_create() argument 4608 protocol, kern); in security_socket_post_create()
|
| /security/selinux/ss/ |
| A D | policydb.h | 175 u8 protocol; member
|
| A D | services.c | 2446 int security_port_sid(u8 protocol, u16 port, u32 *out_sid) in security_port_sid() argument 2468 if (c->u.port.protocol == protocol && in security_port_sid()
|
| A D | policydb.c | 2318 c->u.port.protocol = le32_to_cpu(buf[0]); in ocontext_read() 3356 buf[0] = cpu_to_le32(c->u.port.protocol); in ocontext_write()
|
| /security/smack/ |
| A D | smack_lsm.c | 2942 int type, int protocol, int kern) in smack_socket_post_create() argument 4172 if (family == PF_INET6 && skb->protocol == htons(ETH_P_IP)) in smack_socket_sock_rcv_skb() 4302 if (skb->protocol == htons(ETH_P_IP)) in smack_socket_getpeersec_dgram() 4305 else if (skb->protocol == htons(ETH_P_IPV6)) in smack_socket_getpeersec_dgram() 4377 if (skb->protocol == htons(ETH_P_IP)) in smack_inet_conn_request()
|