Home
last modified time | relevance | path

Searched refs:security (Results 1 – 25 of 195) sorted by relevance

12345678

/linux-2.6.39/net/rxrpc/
Dar-security.c147 conn->security = sec; in rxrpc_init_client_conn_security()
149 ret = conn->security->init_connection_security(conn); in rxrpc_init_client_conn_security()
151 rxrpc_security_put(conn->security); in rxrpc_init_client_conn_security()
152 conn->security = NULL; in rxrpc_init_client_conn_security()
217 conn->security = sec; in rxrpc_init_server_conn_security()
231 if (call->conn->security) in rxrpc_secure_packet()
232 return call->conn->security->secure_packet( in rxrpc_secure_packet()
243 if (call->conn->security) in rxrpc_verify_packet()
244 return call->conn->security->verify_packet( in rxrpc_verify_packet()
256 if (conn->security) { in rxrpc_clear_conn_security()
[all …]
Dar-connevent.c174 if (conn->security) in rxrpc_process_event()
175 return conn->security->respond_to_challenge( in rxrpc_process_event()
180 if (!conn->security) in rxrpc_process_event()
183 ret = conn->security->verify_response(conn, skb, _abort_code); in rxrpc_process_event()
187 ret = conn->security->init_connection_security(conn); in rxrpc_process_event()
191 conn->security->prime_packet_security(conn); in rxrpc_process_event()
238 ASSERT(conn->security != NULL); in rxrpc_secure_connection()
240 if (conn->security->issue_challenge(conn) < 0) { in rxrpc_secure_connection()
DKconfig33 tristate "RxRPC Kerberos security"
41 Provide kerberos 4 and AFS kaserver security handling for AF_RXRPC
/linux-2.6.39/Documentation/
DSecurityBugs1 Linux kernel developers take security very seriously. As such, we'd
2 like to know when a security bug is found so that it can be fixed and
3 disclosed as quickly as possible. Please report security bugs to the
4 Linux kernel security team.
8 The Linux kernel security team can be contacted by email at
9 <security@kernel.org>. This is a private list of security officers
11 It is possible that the security team will bring in extra help from
12 area maintainers to understand and fix the security vulnerability.
22 The goal of the Linux kernel security team is to work with the
28 A disclosure date is negotiated by the security team working with the
[all …]
Dapparmor.txt3 AppArmor is MAC style security extension for the Linux kernel. It implements
13 If AppArmor should be selected as the default security module then
19 If AppArmor is not the default security module it can be enabled by passing
20 security=apparmor on the kernel's command line.
22 If AppArmor is the default security module it can be disabled by passing
23 apparmor=0, security=XXXX (where XXX is valid security module), on the
Dtomoyo.txt13 Build the kernel with CONFIG_SECURITY_TOMOYO=y and pass "security=tomoyo" on
30 TOMOYO Linux: pragmatic and manageable security for Linux
38 The role of "pathname based access control" in security.
47 We believe that inode based security and name based security are complementary
/linux-2.6.39/Documentation/netlabel/
Dintroduction.txt9 NetLabel is a mechanism which can be used by kernel security modules to attach
10 security attributes to outgoing network packets generated from user space
11 applications and read security attributes from incoming network packets. It
13 layer, and the kernel security module API.
18 network packet's security attributes. If any translation between the network
19 security attributes and those on the host are required then the protocol
22 the NetLabel kernel security module API described below.
38 The purpose of the NetLabel security module API is to provide a protocol
40 to protocol independence, the security module API is designed to be completely
44 Detailed information about the NetLabel security module API can be found in the
Dlsm_interface.txt9 NetLabel is a mechanism which can set and retrieve security attributes from
12 The NetLabel security module API is defined in 'include/net/netlabel.h' but a
18 it uses the concept of security attributes to refer to the packet's security
19 labels. The NetLabel security attributes are defined by the
21 NetLabel subsystem converts the security attributes to and from the correct
24 security attributes into whatever security identifiers are in use for their
38 label and the internal LSM security identifier can be time consuming. The
41 LSM has received a packet, used NetLabel to decode its security attributes,
42 and translated the security attributes into a LSM internal identifier the LSM
Dcipso_ipv4.txt22 label by using the NetLabel security module API; if the NetLabel "domain" is
31 NetLabel security module API to extract the security attributes of the packet.
37 The CIPSO/IPv4 protocol engine contains a mechanism to translate CIPSO security
42 different security attribute mapping table.
46 The NetLabel system provides a framework for caching security attribute
Ddraft-ietf-cipso-ipsecurity-01.txt35 Currently the Internet Protocol includes two security options. One of
37 IP datagrams to be labeled with security classifications. This option
38 provides sixteen security classifications and a variable number of handling
39 restrictions. To handle additional security information, such as security
40 categories or compartments, another security option (Type 133) exists and
46 mandatory access controls and multi-level security. These systems are
52 applications of a commercial security option. The BSO and ESO were
54 to support multiple security policies. This Internet Draft provides the
56 security policy. Support for additional security policies shall be
76 This option permits security related information to be passed between
[all …]
/linux-2.6.39/security/
DKconfig65 Note that LSM security checks are still performed, and may further
86 bool "Enable different security models"
89 This allows you to choose different security modules to be
92 If this option is not selected, the default Linux security
110 This enables the socket and networking security hooks.
111 If enabled, a security module can use these hooks to
119 This enables the XFRM (IPSec) networking security hooks.
120 If enabled, a security module can use these hooks to
132 This enables the security hooks for pathname based access control.
133 If enabled, a security module can use these hooks to
[all …]
/linux-2.6.39/security/selinux/
Dxfrm.c73 return selinux_authorizable_ctx(x->security); in selinux_authorizable_xfrm()
120 if (!xp->security) in selinux_xfrm_state_pol_flow_match()
121 if (x->security) in selinux_xfrm_state_pol_flow_match()
128 if (!x->security) in selinux_xfrm_state_pol_flow_match()
136 state_sid = x->security->ctx_sid; in selinux_xfrm_state_pol_flow_match()
176 struct xfrm_sec_ctx *ctx = x->security; in selinux_xfrm_decode_session()
362 err = selinux_xfrm_sec_ctx_alloc(&x->security, uctx, secid); in selinux_xfrm_state_alloc()
373 struct xfrm_sec_ctx *ctx = x->security; in selinux_xfrm_state_free()
383 struct xfrm_sec_ctx *ctx = x->security; in selinux_xfrm_state_delete()
418 struct xfrm_sec_ctx *ctx = x->security; in selinux_xfrm_sock_rcv_skb()
/linux-2.6.39/security/tomoyo/
Dtomoyo.c14 new->security = NULL; in tomoyo_cred_alloc_blank()
21 struct tomoyo_domain_info *domain = old->security; in tomoyo_cred_prepare()
22 new->security = domain; in tomoyo_cred_prepare()
35 struct tomoyo_domain_info *domain = cred->security; in tomoyo_cred_free()
67 bprm->cred->security)->users); in tomoyo_bprm_set_creds()
72 bprm->cred->security = NULL; in tomoyo_bprm_set_creds()
78 struct tomoyo_domain_info *domain = bprm->cred->security; in tomoyo_bprm_check_security()
284 cred->security = &tomoyo_kernel_domain; in tomoyo_init()
/linux-2.6.39/security/apparmor/
Dcontext.c79 struct aa_task_cxt *cxt = current_cred()->security; in aa_replace_current_profile()
90 cxt = new->security; in aa_replace_current_profile()
126 cxt = new->security; in aa_set_current_onexec()
153 cxt = new->security; in aa_set_current_hat()
190 cxt = new->security; in aa_restore_previous_profile()
Dlsm.c51 aa_free_task_context(cred->security); in apparmor_cred_free()
52 cred->security = NULL; in apparmor_cred_free()
65 cred->security = cxt; in apparmor_cred_alloc_blank()
80 aa_dup_task_context(cxt, old->security); in apparmor_cred_prepare()
81 new->security = cxt; in apparmor_cred_prepare()
90 const struct aa_task_cxt *old_cxt = old->security; in apparmor_cred_transfer()
91 struct aa_task_cxt *new_cxt = new->security; in apparmor_cred_transfer()
522 struct aa_task_cxt *cxt = cred->security; in apparmor_getprocattr()
894 cred->security = cxt; in set_init_cxt()
939 aa_free_task_context(current->real_cred->security); in apparmor_init()
/linux-2.6.39/Documentation/filesystems/caching/
Dcachefiles.txt23 (*) A note on security.
314 CacheFiles is implemented to deal properly with the LSM security features of
319 security context that is not appropriate for accessing the cache - either
324 The way CacheFiles works is to temporarily change the security context (fsuid,
325 fsgid and actor security label) that the process acts as - without changing the
326 security context of the process when it the target of an operation performed by
332 (1) Finds the security label attached to the root cache directory and uses
333 that as the security label with which it will create files. By default,
338 (2) Finds the security label of the process which issued the bind request
343 and asks LSM to supply a security ID as which it should act given the
[all …]
/linux-2.6.39/security/apparmor/include/
Dcontext.h92 struct aa_task_cxt *cxt = __task_cred(task)->security; in __aa_task_is_confined()
111 struct aa_task_cxt *cxt = cred->security; in aa_cred_profile()
139 const struct aa_task_cxt *cxt = current_cred()->security; in aa_current_profile()
/linux-2.6.39/fs/jfs/
DKconfig29 implemented by security modules like SELinux. This option
30 enables an extended attribute handler for file security
33 If you are not using a security module that requires using
34 extended attributes for file security labels, say N.
/linux-2.6.39/drivers/char/tpm/
DKconfig11 If you have a TPM security chip in your system, which
31 If you have a TPM security chip that is compliant with the
39 If you have a TPM security chip from National Semiconductor
47 If you have a TPM security chip from Atmel say Yes and it
55 If you have a TPM security chip from Infineon Technologies
/linux-2.6.39/fs/ext2/
DKconfig39 implemented by security modules like SELinux. This option
40 enables an extended attribute handler for file security
43 If you are not using a security module that requires using
44 extended attributes for file security labels, say N.
/linux-2.6.39/security/smack/
Dsmack_lsm.c39 #define task_security(task) (task_cred_xxx((task), security))
443 struct task_smack *tsp = bprm->cred->security; in smack_bprm_set_creds()
1268 char *tsp = smk_of_task(tsk->cred->security); in smack_file_send_sigiotask()
1332 cred->security = tsp; in smack_cred_alloc_blank()
1345 struct task_smack *tsp = cred->security; in smack_cred_free()
1352 cred->security = NULL; in smack_cred_free()
1373 struct task_smack *old_tsp = old->security; in smack_cred_prepare()
1385 new->security = new_tsp; in smack_cred_prepare()
1398 struct task_smack *old_tsp = old->security; in smack_cred_transfer()
1399 struct task_smack *new_tsp = new->security; in smack_cred_transfer()
[all …]
/linux-2.6.39/kernel/
Dcred.c313 new->security = NULL; in prepare_creds()
680 new->security = NULL; in prepare_kernel_cred()
761 if (selinux_is_enabled() && cred->security) { in creds_are_invalid()
762 if ((unsigned long) cred->security < PAGE_SIZE) in creds_are_invalid()
764 if ((*(u32 *)cred->security & 0xffffff00) == in creds_are_invalid()
794 printk(KERN_ERR "CRED: ->security is %p\n", cred->security); in dump_invalid_creds()
795 if ((unsigned long) cred->security >= PAGE_SIZE && in dump_invalid_creds()
796 (((unsigned long) cred->security & 0xffffff00) != in dump_invalid_creds()
799 ((u32*)cred->security)[0], in dump_invalid_creds()
800 ((u32*)cred->security)[1]); in dump_invalid_creds()
/linux-2.6.39/fs/ext3/
DKconfig40 power failure, which can be a security issue. However,
84 implemented by security modules like SELinux. This option
85 enables an extended attribute handler for file security
88 If you are not using a security module that requires using
89 extended attributes for file security labels, say N.
/linux-2.6.39/drivers/net/
Dps3_gelic_wireless.h89 u16 security; member
120 u16 security; member
164 __be16 security; member
/linux-2.6.39/fs/ext4/
DKconfig71 implemented by security modules like SELinux. This option
72 enables an extended attribute handler for file security
75 If you are not using a security module that requires using
76 extended attributes for file security labels, say N.

12345678