Lines Matching refs:secattr

216  * @secattr: the security attribute struct to use
221 * @secattr struct is populated with the correct LSM security attributes. The
236 struct netlbl_lsm_secattr *secattr)
255 secattr->cache = entry->lsm_data;
256 secattr->flags |= NETLBL_SECATTR_CACHE;
257 secattr->type = NETLBL_NLTYPE_CIPSOV4;
287 * @secattr: the packet's security attributes
298 const struct netlbl_lsm_secattr *secattr)
322 refcount_inc(&secattr->cache->refcount);
323 entry->lsm_data = secattr->cache;
775 * @secattr: the security attributes
786 const struct netlbl_lsm_secattr *secattr,
803 host_spot = netlbl_catmap_walk(secattr->attr.mls.cat,
838 * @secattr: the security attributes
849 struct netlbl_lsm_secattr *secattr)
886 ret_val = netlbl_catmap_setbit(&secattr->attr.mls.cat,
932 * @secattr: the security attributes
944 const struct netlbl_lsm_secattr *secattr,
952 cat = netlbl_catmap_walk(secattr->attr.mls.cat, cat + 1);
970 * @secattr: the security attributes
981 struct netlbl_lsm_secattr *secattr)
987 ret_val = netlbl_catmap_setbit(&secattr->attr.mls.cat,
1040 * @secattr: the security attributes
1052 const struct netlbl_lsm_secattr *secattr,
1067 iter = netlbl_catmap_walk(secattr->attr.mls.cat, iter + 1);
1075 iter = netlbl_catmap_walkrng(secattr->attr.mls.cat, iter);
1102 * @secattr: the security attributes
1113 struct netlbl_lsm_secattr *secattr)
1127 ret_val = netlbl_catmap_setrng(&secattr->attr.mls.cat,
1164 * @secattr: the security attributes
1176 const struct netlbl_lsm_secattr *secattr,
1184 if ((secattr->flags & NETLBL_SECATTR_MLS_LVL) == 0)
1188 secattr->attr.mls.lvl,
1193 if (secattr->flags & NETLBL_SECATTR_MLS_CAT) {
1195 secattr,
1223 * @secattr: the security attributes
1227 * attributes in @secattr. Return zero on success, negatives values on
1233 struct netlbl_lsm_secattr *secattr)
1242 secattr->attr.mls.lvl = level;
1243 secattr->flags |= NETLBL_SECATTR_MLS_LVL;
1249 secattr);
1251 netlbl_catmap_free(secattr->attr.mls.cat);
1255 if (secattr->attr.mls.cat)
1256 secattr->flags |= NETLBL_SECATTR_MLS_CAT;
1265 * @secattr: the security attributes
1275 const struct netlbl_lsm_secattr *secattr,
1283 if (!(secattr->flags & NETLBL_SECATTR_MLS_LVL))
1287 secattr->attr.mls.lvl,
1292 if (secattr->flags & NETLBL_SECATTR_MLS_CAT) {
1294 secattr,
1315 * @secattr: the security attributes
1319 * attributes in @secattr. Return zero on success, negatives values on
1325 struct netlbl_lsm_secattr *secattr)
1334 secattr->attr.mls.lvl = level;
1335 secattr->flags |= NETLBL_SECATTR_MLS_LVL;
1341 secattr);
1343 netlbl_catmap_free(secattr->attr.mls.cat);
1347 secattr->flags |= NETLBL_SECATTR_MLS_CAT;
1356 * @secattr: the security attributes
1366 const struct netlbl_lsm_secattr *secattr,
1374 if (!(secattr->flags & NETLBL_SECATTR_MLS_LVL))
1378 secattr->attr.mls.lvl,
1383 if (secattr->flags & NETLBL_SECATTR_MLS_CAT) {
1385 secattr,
1406 * @secattr: the security attributes
1410 * in @secattr. Return zero on success, negatives values on failure.
1415 struct netlbl_lsm_secattr *secattr)
1424 secattr->attr.mls.lvl = level;
1425 secattr->flags |= NETLBL_SECATTR_MLS_LVL;
1431 secattr);
1433 netlbl_catmap_free(secattr->attr.mls.cat);
1437 if (secattr->attr.mls.cat)
1438 secattr->flags |= NETLBL_SECATTR_MLS_CAT;
1447 * @secattr: the security attributes
1457 const struct netlbl_lsm_secattr *secattr,
1461 if (!(secattr->flags & NETLBL_SECATTR_SECID))
1466 *(u32 *)&buffer[2] = secattr->attr.secid;
1475 * @secattr: the security attributes
1478 * Parse a CIPSO local tag and return the security attributes in @secattr.
1484 struct netlbl_lsm_secattr *secattr)
1486 secattr->attr.secid = *(u32 *)&tag[2];
1487 secattr->flags |= NETLBL_SECATTR_SECID;
1754 * @secattr: the security attributes
1764 const struct netlbl_lsm_secattr *secattr)
1781 secattr,
1787 secattr,
1793 secattr,
1799 secattr,
1821 * @secattr: the specific security attributes of the socket
1833 const struct netlbl_lsm_secattr *secattr)
1860 ret_val = cipso_v4_genopt(buf, buf_len, doi_def, secattr);
1908 * @secattr: the specific security attributes of the socket
1918 const struct netlbl_lsm_secattr *secattr)
1937 ret_val = cipso_v4_genopt(buf, buf_len, doi_def, secattr);
2078 * @secattr: the security attributes
2081 * Inspect @cipso and return the security attributes in @secattr. Returns zero
2086 struct netlbl_lsm_secattr *secattr)
2092 if (cipso_v4_cache_check(cipso, cipso[1], secattr) == 0)
2105 ret_val = cipso_v4_parsetag_rbm(doi_def, &cipso[6], secattr);
2108 ret_val = cipso_v4_parsetag_enum(doi_def, &cipso[6], secattr);
2111 ret_val = cipso_v4_parsetag_rng(doi_def, &cipso[6], secattr);
2114 ret_val = cipso_v4_parsetag_loc(doi_def, &cipso[6], secattr);
2118 secattr->type = NETLBL_NLTYPE_CIPSOV4;
2128 * @secattr: the security attributes
2132 * there is return the CIPSO security attributes in @secattr. This function
2137 int cipso_v4_sock_getattr(struct sock *sk, struct netlbl_lsm_secattr *secattr)
2148 secattr);
2157 * @secattr: the security attributes
2166 const struct netlbl_lsm_secattr *secattr)
2176 ret_val = cipso_v4_genopt(buf, buf_len, doi_def, secattr);