Home
Sort by
last modified time
|
relevance
|
path
Repository(s)
applications
arkcompiler
base
build
commonlibrary
developtools
device
docs
domains
drivers
foundation
ide
interface
kernel
napi_generator
productdefine
test
third_party
vendor
select all
invert selection
clear
Full Search
Search through all text tokens(words,strings,identifiers,numbers) in index.
Definition
Only finds symbol definitions(where e.g a variable(function,...) is defined).
Symbol
Only finds symbol(e.g. methods classes,function,variables).
File Path
Path of the source file(use "/").If you want just exact path,enclose it in "".Source files end with: .jar/.bz2/.a/.h/.java...
History
History log comments.
Type
Any
Bzip(2)
C
Clojure
C#
C++
ELF
Erlang
Image file
Fortran
Golang
GZIP
Haskell
Jar
Java
Java class
JavaScript
Lisp
Lua
Pascal
Perl
PHP
Plain Text
PL/SQL
Python
Rust
Scala
Shell script
SQL
Tar
Tcl
Troff
UUEncoded
Visual Basic
XML
Zip
Type of analyzer used to filter file types include with selected(e.g. just C sources).
Help
Searched
refs:peer_secid
(Results
1 - 8
of
8
) sorted by relevance
/kernel/linux/linux-5.10/include/net/
H
A
D
request_sock.h
72
u32
peer_secid
;
member
/kernel/linux/linux-6.6/include/net/
H
A
D
request_sock.h
72
u32
peer_secid
;
member
/kernel/linux/linux-6.6/security/selinux/
H
A
D
hooks.c
5170
u32
peer_secid
= SECSID_NULL;
in selinux_socket_getpeersec_dgram()
local
5185
peer_secid
= isec->sid;
in selinux_socket_getpeersec_dgram()
5187
selinux_skb_peerlbl_sid(skb, family, &
peer_secid
);
in selinux_socket_getpeersec_dgram()
5190
*secid =
peer_secid
;
in selinux_socket_getpeersec_dgram()
5191
if (
peer_secid
== SECSID_NULL)
in selinux_socket_getpeersec_dgram()
5258
* Determines
peer_secid
for the asoc and updates socket's peer label
5276
asoc->
peer_secid
= SECSID_NULL;
in selinux_sctp_process_new_assoc()
5281
err = selinux_skb_peerlbl_sid(skb, family, &asoc->
peer_secid
);
in selinux_sctp_process_new_assoc()
5285
if (asoc->
peer_secid
== SECSID_NULL)
in selinux_sctp_process_new_assoc()
5286
asoc->
peer_secid
in selinux_sctp_process_new_assoc()
[all...]
/kernel/linux/linux-5.10/security/selinux/
H
A
D
hooks.c
5153
u32
peer_secid
= SECSID_NULL;
in selinux_socket_getpeersec_dgram()
local
5168
peer_secid
= isec->sid;
in selinux_socket_getpeersec_dgram()
5170
selinux_skb_peerlbl_sid(skb, family, &
peer_secid
);
in selinux_socket_getpeersec_dgram()
5173
*secid =
peer_secid
;
in selinux_socket_getpeersec_dgram()
5174
if (
peer_secid
== SECSID_NULL)
in selinux_socket_getpeersec_dgram()
5307
ep->
peer_secid
= peer_sid;
in selinux_sctp_assoc_request()
5408
newsksec->peer_sid = ep->
peer_secid
;
in selinux_sctp_sk_clone()
5429
req->
peer_secid
= peersid;
in selinux_inet_conn_request()
5440
newsksec->peer_sid = req->
peer_secid
;
in selinux_inet_csk_clone()
/kernel/linux/linux-5.10/security/smack/
H
A
D
smack_lsm.c
4206
req->
peer_secid
= skp->smk_secid;
in smack_inet_conn_request()
4240
if (req->
peer_secid
!= 0) {
in smack_inet_csk_clone()
4241
skp = smack_from_secid(req->
peer_secid
);
in smack_inet_csk_clone()
/kernel/linux/linux-6.6/security/smack/
H
A
D
smack_lsm.c
4343
req->
peer_secid
= skp->smk_secid;
in smack_inet_conn_request()
4377
if (req->
peer_secid
!= 0) {
in smack_inet_csk_clone()
4378
skp = smack_from_secid(req->
peer_secid
);
in smack_inet_csk_clone()
/kernel/linux/linux-5.10/include/net/sctp/
H
A
D
structs.h
1341
u32
peer_secid
;
member
/kernel/linux/linux-6.6/include/net/sctp/
H
A
D
structs.h
2114
u32
peer_secid
;
member
Completed in 36 milliseconds