Lines Matching refs:secattr

215  * @secattr: the security attribute struct to use
220 * @secattr struct is populated with the correct LSM security attributes. The
235 struct netlbl_lsm_secattr *secattr)
254 secattr->cache = entry->lsm_data;
255 secattr->flags |= NETLBL_SECATTR_CACHE;
256 secattr->type = NETLBL_NLTYPE_CIPSOV4;
286 * @secattr: the packet's security attributes
297 const struct netlbl_lsm_secattr *secattr)
321 refcount_inc(&secattr->cache->refcount);
322 entry->lsm_data = secattr->cache;
774 * @secattr: the security attributes
785 const struct netlbl_lsm_secattr *secattr,
802 host_spot = netlbl_catmap_walk(secattr->attr.mls.cat,
837 * @secattr: the security attributes
848 struct netlbl_lsm_secattr *secattr)
885 ret_val = netlbl_catmap_setbit(&secattr->attr.mls.cat,
931 * @secattr: the security attributes
943 const struct netlbl_lsm_secattr *secattr,
951 cat = netlbl_catmap_walk(secattr->attr.mls.cat, cat + 1);
969 * @secattr: the security attributes
980 struct netlbl_lsm_secattr *secattr)
986 ret_val = netlbl_catmap_setbit(&secattr->attr.mls.cat,
1039 * @secattr: the security attributes
1051 const struct netlbl_lsm_secattr *secattr,
1066 iter = netlbl_catmap_walk(secattr->attr.mls.cat, iter + 1);
1074 iter = netlbl_catmap_walkrng(secattr->attr.mls.cat, iter);
1101 * @secattr: the security attributes
1112 struct netlbl_lsm_secattr *secattr)
1126 ret_val = netlbl_catmap_setrng(&secattr->attr.mls.cat,
1163 * @secattr: the security attributes
1175 const struct netlbl_lsm_secattr *secattr,
1183 if ((secattr->flags & NETLBL_SECATTR_MLS_LVL) == 0)
1187 secattr->attr.mls.lvl,
1192 if (secattr->flags & NETLBL_SECATTR_MLS_CAT) {
1194 secattr,
1222 * @secattr: the security attributes
1226 * attributes in @secattr. Return zero on success, negatives values on
1232 struct netlbl_lsm_secattr *secattr)
1241 secattr->attr.mls.lvl = level;
1242 secattr->flags |= NETLBL_SECATTR_MLS_LVL;
1248 secattr);
1250 netlbl_catmap_free(secattr->attr.mls.cat);
1254 if (secattr->attr.mls.cat)
1255 secattr->flags |= NETLBL_SECATTR_MLS_CAT;
1264 * @secattr: the security attributes
1274 const struct netlbl_lsm_secattr *secattr,
1282 if (!(secattr->flags & NETLBL_SECATTR_MLS_LVL))
1286 secattr->attr.mls.lvl,
1291 if (secattr->flags & NETLBL_SECATTR_MLS_CAT) {
1293 secattr,
1314 * @secattr: the security attributes
1318 * attributes in @secattr. Return zero on success, negatives values on
1324 struct netlbl_lsm_secattr *secattr)
1333 secattr->attr.mls.lvl = level;
1334 secattr->flags |= NETLBL_SECATTR_MLS_LVL;
1340 secattr);
1342 netlbl_catmap_free(secattr->attr.mls.cat);
1346 secattr->flags |= NETLBL_SECATTR_MLS_CAT;
1355 * @secattr: the security attributes
1365 const struct netlbl_lsm_secattr *secattr,
1373 if (!(secattr->flags & NETLBL_SECATTR_MLS_LVL))
1377 secattr->attr.mls.lvl,
1382 if (secattr->flags & NETLBL_SECATTR_MLS_CAT) {
1384 secattr,
1405 * @secattr: the security attributes
1409 * in @secattr. Return zero on success, negatives values on failure.
1414 struct netlbl_lsm_secattr *secattr)
1423 secattr->attr.mls.lvl = level;
1424 secattr->flags |= NETLBL_SECATTR_MLS_LVL;
1430 secattr);
1432 netlbl_catmap_free(secattr->attr.mls.cat);
1436 if (secattr->attr.mls.cat)
1437 secattr->flags |= NETLBL_SECATTR_MLS_CAT;
1446 * @secattr: the security attributes
1456 const struct netlbl_lsm_secattr *secattr,
1460 if (!(secattr->flags & NETLBL_SECATTR_SECID))
1465 *(u32 *)&buffer[2] = secattr->attr.secid;
1474 * @secattr: the security attributes
1477 * Parse a CIPSO local tag and return the security attributes in @secattr.
1483 struct netlbl_lsm_secattr *secattr)
1485 secattr->attr.secid = *(u32 *)&tag[2];
1486 secattr->flags |= NETLBL_SECATTR_SECID;
1753 * @secattr: the security attributes
1763 const struct netlbl_lsm_secattr *secattr)
1780 secattr,
1786 secattr,
1792 secattr,
1798 secattr,
1820 * @secattr: the specific security attributes of the socket
1832 const struct netlbl_lsm_secattr *secattr)
1859 ret_val = cipso_v4_genopt(buf, buf_len, doi_def, secattr);
1907 * @secattr: the specific security attributes of the socket
1917 const struct netlbl_lsm_secattr *secattr)
1936 ret_val = cipso_v4_genopt(buf, buf_len, doi_def, secattr);
2077 * @secattr: the security attributes
2080 * Inspect @cipso and return the security attributes in @secattr. Returns zero
2085 struct netlbl_lsm_secattr *secattr)
2091 if (cipso_v4_cache_check(cipso, cipso[1], secattr) == 0)
2104 ret_val = cipso_v4_parsetag_rbm(doi_def, &cipso[6], secattr);
2107 ret_val = cipso_v4_parsetag_enum(doi_def, &cipso[6], secattr);
2110 ret_val = cipso_v4_parsetag_rng(doi_def, &cipso[6], secattr);
2113 ret_val = cipso_v4_parsetag_loc(doi_def, &cipso[6], secattr);
2117 secattr->type = NETLBL_NLTYPE_CIPSOV4;
2127 * @secattr: the security attributes
2131 * there is return the CIPSO security attributes in @secattr. This function
2136 int cipso_v4_sock_getattr(struct sock *sk, struct netlbl_lsm_secattr *secattr)
2147 secattr);
2156 * @secattr: the security attributes
2165 const struct netlbl_lsm_secattr *secattr)
2175 ret_val = cipso_v4_genopt(buf, buf_len, doi_def, secattr);