/security/selinux/include/ |
H A D | netport.h | 31 int sel_netport_sid(u8 protocol, u16 pnum, u32 *sid);
|
H A D | objsec.h | 99 u8 protocol; /* transport protocol */ member in struct:netport_security_struct
|
H A D | security.h | 180 int security_port_sid(u8 protocol, u16 port, u32 *out_sid);
|
/security/selinux/ |
H A D | netport.c | 86 * @protocol: protocol 94 static struct sel_netport *sel_netport_find(u8 protocol, u16 pnum) argument 101 if (port->psec.port == pnum && port->psec.protocol == protocol) 138 * @protocol: protocol 148 static int sel_netport_sid_slow(u8 protocol, u16 pnum, u32 *sid) argument 155 port = sel_netport_find(protocol, pnum); 164 ret = security_port_sid(protocol, pnu 197 sel_netport_sid(u8 protocol, u16 pnum, u32 *sid) argument [all...] |
H A D | hooks.c | 1158 static inline int default_protocol_stream(int protocol) argument 1160 return (protocol == IPPROTO_IP || protocol == IPPROTO_TCP); 1163 static inline int default_protocol_dgram(int protocol) argument 1165 return (protocol == IPPROTO_IP || protocol == IPPROTO_UDP); 1168 static inline u16 socket_type_to_security_class(int family, int type, int protocol) argument 1184 if (default_protocol_stream(protocol)) 1189 if (default_protocol_dgram(protocol)) 1200 switch (protocol) { 4071 selinux_socket_create(int family, int type, int protocol, int kern) argument 4090 selinux_socket_post_create(struct socket *sock, int family, int type, int protocol, int kern) argument [all...] |
/security/tomoyo/ |
H A D | network.c | 25 u8 protocol; member in struct:tomoyo_addr_info 197 return p1->protocol == p2->protocol && 216 return p1->protocol == p2->protocol && 286 const char *protocol = tomoyo_read_token(param); local 289 for (e.protocol = 0; e.protocol < TOMOYO_SOCK_MAX; e.protocol++) 290 if (!strcmp(protocol, tomoyo_proto_keywor 331 const char *protocol = tomoyo_read_token(param); local 362 tomoyo_audit_net_log(struct tomoyo_request_info *r, const char *family, const u8 protocol, const u8 operation, const char *address) argument [all...] |
H A D | common.h | 467 u8 protocol; member in struct:tomoyo_request_info::__anon33::__anon39 475 u8 protocol; member in struct:tomoyo_request_info::__anon33::__anon40 760 u8 protocol; member in struct:tomoyo_inet_acl 769 u8 protocol; member in struct:tomoyo_unix_acl
|
H A D | common.c | 1475 [ptr->protocol]); 1507 [ptr->protocol]);
|
/security/ |
H A D | lsm_audit.c | 38 * @proto : the layer 4 protocol 56 *proto = ih->protocol; 61 switch (ih->protocol) { 107 * @proto : the layer 4 protocol
|
H A D | security.c | 1167 int security_socket_create(int family, int type, int protocol, int kern) argument 1169 return security_ops->socket_create(family, type, protocol, kern); 1173 int type, int protocol, int kern) 1176 protocol, kern); 1172 security_socket_post_create(struct socket *sock, int family, int type, int protocol, int kern) argument
|
H A D | capability.c | 607 static int cap_socket_create(int family, int type, int protocol, int kern) argument 613 int protocol, int kern) 612 cap_socket_post_create(struct socket *sock, int family, int type, int protocol, int kern) argument
|
/security/selinux/ss/ |
H A D | policydb.h | 178 u8 protocol; member in struct:ocontext::__anon27::__anon28
|
H A D | services.c | 2160 * @protocol: protocol number 2164 int security_port_sid(u8 protocol, u16 port, u32 *out_sid) argument 2173 if (c->u.port.protocol == protocol && 2793 * @nlbl_type: NetLabel labeling protocol type
|
H A D | policydb.c | 2164 c->u.port.protocol = le32_to_cpu(buf[0]); 3100 buf[0] = cpu_to_le32(c->u.port.protocol);
|
/security/smack/ |
H A D | smack_lsm.c | 2432 * @family: protocol family 2434 * @protocol: unused 2442 int type, int protocol, int kern) 3638 if (skb->protocol == htons(ETH_P_IP)) 3640 else if (skb->protocol == htons(ETH_P_IPV6)) 3723 if (skb->protocol == htons(ETH_P_IP)) 2441 smack_socket_post_create(struct socket *sock, int family, int type, int protocol, int kern) argument
|