Home
last modified time | relevance | path

Searched refs:SECSID_NULL (Results 1 - 18 of 18) sorted by relevance

/kernel/linux/linux-5.10/security/selinux/
H A Dxfrm.c219 return SECSID_NULL; in selinux_xfrm_skb_sid_egress()
222 return SECSID_NULL; in selinux_xfrm_skb_sid_egress()
230 u32 sid_session = SECSID_NULL; in selinux_xfrm_skb_sid_ingress()
241 if (sid_session == SECSID_NULL) { in selinux_xfrm_skb_sid_ingress()
246 *sid = SECSID_NULL; in selinux_xfrm_skb_sid_ingress()
265 *sid = SECSID_NULL; in selinux_xfrm_decode_session()
276 if (rc == 0 && *sid == SECSID_NULL) in selinux_xfrm_skb_sid()
H A Dnetlabel.c197 *sid = SECSID_NULL; in selinux_netlbl_skbuff_getsid()
207 *sid = SECSID_NULL; in selinux_netlbl_skbuff_getsid()
H A Dhooks.c4455 * returns zero if the value in @sid is valid (although it may be SECSID_NULL)
4502 if (skb_sid != SECSID_NULL) in selinux_conn_sid()
4516 if (tsec->sockcreate_sid > SECSID_NULL) { in socket_sockcreate_sid()
5122 u32 peer_sid = SECSID_NULL; in selinux_socket_getpeersec_stream()
5128 if (peer_sid == SECSID_NULL) in selinux_socket_getpeersec_stream()
5153 u32 peer_secid = SECSID_NULL; in selinux_socket_getpeersec_dgram()
5174 if (peer_secid == SECSID_NULL) in selinux_socket_getpeersec_dgram()
5261 /* This will return peer_sid = SECSID_NULL if there are in selinux_sctp_assoc_request()
5269 if (peer_sid == SECSID_NULL) in selinux_sctp_assoc_request()
5816 /* At this point, if the returned skb peerlbl is SECSID_NULL in selinux_ip_postroute()
[all...]
/kernel/linux/linux-6.6/security/selinux/
H A Dxfrm.c216 return SECSID_NULL; in selinux_xfrm_skb_sid_egress()
219 return SECSID_NULL; in selinux_xfrm_skb_sid_egress()
227 u32 sid_session = SECSID_NULL; in selinux_xfrm_skb_sid_ingress()
238 if (sid_session == SECSID_NULL) { in selinux_xfrm_skb_sid_ingress()
243 *sid = SECSID_NULL; in selinux_xfrm_skb_sid_ingress()
262 *sid = SECSID_NULL; in selinux_xfrm_decode_session()
273 if (rc == 0 && *sid == SECSID_NULL) in selinux_xfrm_skb_sid()
H A Dnetlabel.c202 *sid = SECSID_NULL; in selinux_netlbl_skbuff_getsid()
212 *sid = SECSID_NULL; in selinux_netlbl_skbuff_getsid()
H A Dhooks.c4499 * returns zero if the value in @sid is valid (although it may be SECSID_NULL)
4546 if (skb_sid != SECSID_NULL) in selinux_conn_sid()
4560 if (tsec->sockcreate_sid > SECSID_NULL) { in socket_sockcreate_sid()
5141 u32 peer_sid = SECSID_NULL; in selinux_socket_getpeersec_stream()
5147 if (peer_sid == SECSID_NULL) in selinux_socket_getpeersec_stream()
5170 u32 peer_secid = SECSID_NULL; in selinux_socket_getpeersec_dgram()
5191 if (peer_secid == SECSID_NULL) in selinux_socket_getpeersec_dgram()
5276 asoc->peer_secid = SECSID_NULL; in selinux_sctp_process_new_assoc()
5278 /* This will return peer_sid = SECSID_NULL if there are in selinux_sctp_process_new_assoc()
5285 if (asoc->peer_secid == SECSID_NULL) in selinux_sctp_process_new_assoc()
[all...]
/kernel/linux/linux-5.10/security/selinux/include/
H A Dxfrm.h77 *sid = SECSID_NULL; in selinux_xfrm_decode_session()
87 *sid = SECSID_NULL; in selinux_xfrm_skb_sid()
H A Dnetlabel.h91 *sid = SECSID_NULL; in selinux_netlbl_skbuff_getsid()
H A Dsecurity.h22 #define SECSID_NULL 0x00000000 /* unspecified SID */ macro
/kernel/linux/linux-6.6/security/selinux/include/
H A Dxfrm.h79 *sid = SECSID_NULL; in selinux_xfrm_decode_session()
89 *sid = SECSID_NULL; in selinux_xfrm_skb_sid()
H A Dnetlabel.h91 *sid = SECSID_NULL; in selinux_netlbl_skbuff_getsid()
H A Dsecurity.h24 #define SECSID_NULL 0x00000000 /* unspecified SID */ macro
/kernel/linux/linux-5.10/security/selinux/ss/
H A Dmls.c252 if (oldc && def_sid == SECSID_NULL) in mls_context_to_sid()
264 if (def_sid == SECSID_NULL) in mls_context_to_sid()
375 NULL, SECSID_NULL); in mls_from_string()
H A Dservices.c1547 *sid = SECSID_NULL; in security_context_to_sid_core()
1605 sid, SECSID_NULL, gfp, 0); in security_context_to_sid()
1646 sid, SECSID_NULL, GFP_KERNEL, 1); in security_context_to_sid_force()
2034 newc, SECSID_NULL); in convert_context()
3288 * returns zero. Otherwise @peer_sid is set to SECSID_NULL and the function
3293 * no peer labels | 0 | SECSID_NULL
3296 * multiple, inconsistent labels | -<errno> | SECSID_NULL
3311 *peer_sid = SECSID_NULL; in security_net_peersid_resolve()
3316 if (xfrm_sid == SECSID_NULL) { in security_net_peersid_resolve()
3321 * and is treated as if nlbl_sid == SECSID_NULL whe in security_net_peersid_resolve()
[all...]
H A Dpolicydb.c885 if (sid == SECSID_NULL) { in policydb_load_isids()
/kernel/linux/linux-6.6/security/selinux/ss/
H A Dmls.c252 if (oldc && def_sid == SECSID_NULL) in mls_context_to_sid()
264 if (def_sid == SECSID_NULL) in mls_context_to_sid()
375 NULL, SECSID_NULL); in mls_from_string()
H A Dservices.c1527 *sid = SECSID_NULL; in security_context_to_sid_core()
1584 sid, SECSID_NULL, gfp, 0); in security_context_to_sid()
1623 sid, SECSID_NULL, GFP_KERNEL, 1); in security_context_to_sid_force()
2006 rc = string_to_context_struct(args->newp, NULL, s, newc, SECSID_NULL); in services_convert_context()
3243 * returns zero. Otherwise @peer_sid is set to SECSID_NULL and the function
3248 * no peer labels | 0 | SECSID_NULL
3251 * multiple, inconsistent labels | -<errno> | SECSID_NULL
3265 *peer_sid = SECSID_NULL; in security_net_peersid_resolve()
3270 if (xfrm_sid == SECSID_NULL) { in security_net_peersid_resolve()
3275 * and is treated as if nlbl_sid == SECSID_NULL whe in security_net_peersid_resolve()
[all...]
H A Dpolicydb.c880 if (sid == SECSID_NULL) { in policydb_load_isids()

Completed in 43 milliseconds