summaryrefslogtreecommitdiffstats
path: root/security/selinux/xfrm.c
Commit message (Expand)AuthorAgeFilesLines
* selinux: look for IPsec labels on both inbound and outbound packetsPaul Moore2013-12-121-10/+41
* selinux: fix possible memory leakGeyslan G. Bem2013-12-041-4/+7
* selinux: Use kmemdup instead of kmalloc + memcpyDuan Jiong2013-09-261-2/+2
* selinux: cleanup selinux_xfrm_decode_session()Paul Moore2013-07-251-11/+12
* selinux: cleanup some comment and whitespace issues in the XFRM codePaul Moore2013-07-251-13/+10
* selinux: cleanup selinux_xfrm_sock_rcv_skb() and selinux_xfrm_postroute_last()Paul Moore2013-07-251-52/+33
* selinux: cleanup selinux_xfrm_policy_lookup() and selinux_xfrm_state_pol_flow...Paul Moore2013-07-251-36/+18
* selinux: cleanup and consolidate the XFRM alloc/clone/delete/free codePaul Moore2013-07-251-31/+40
* lsm: split the xfrm_state_alloc_security() hook implementationPaul Moore2013-07-251-109/+90
* selinux: fix the labeled xfrm/IPsec reference count handlingPaul Moore2013-05-311-20/+14
* selinux: use GFP_ATOMIC under spin_lockDan Carpenter2013-03-191-1/+1
* atomic: use <linux/atomic.h>Arun Sharma2011-07-261-1/+1
* Merge git://git.kernel.org/pub/scm/linux/kernel/git/davem/net-next-2.6Linus Torvalds2011-03-161-3/+3
|\
| * net: Put flowi_* prefix on AF independent members of struct flowiDavid S. Miller2011-03-121-2/+2
| * xfrm: Mark flowi arg to security_xfrm_state_pol_flow_match() const.David S. Miller2011-02-221-1/+1
* | selinux: Fix check for xfrm selinux context algorithmSteffen Klassert2011-02-251-1/+1
|/
* include cleanup: Update gfp.h and slab.h includes to prepare for breaking imp...Tejun Heo2010-03-301-0/+1
* SELinux: Convert avc_audit to use lsm_audit.hThomas Liu2009-08-171-2/+2
* Revert "SELinux: Convert avc_audit to use lsm_audit.h"James Morris2009-07-131-2/+2
* SELinux: Convert avc_audit to use lsm_audit.hThomas Liu2009-07-131-2/+2
* net: skb->dst accessorsEric Dumazet2009-06-031-1/+1
* CRED: Wrap current->cred and a few other accessorsDavid Howells2008-11-141-3/+3
* CRED: Separate task security context from task_structDavid Howells2008-11-141-3/+3
* Merge branch 'for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/jmo...Linus Torvalds2008-04-211-6/+3
|\
| * SELinux: xfrm.c whitespace, syntax, and static declaraction cleanupsEric Paris2008-04-211-6/+3
* | security: Remove unnecessary inclusions of asm/semaphore.hMatthew Wilcox2008-04-181-1/+0
|/
* LSM: Make the Labeled IPsec hooks more stack friendlyPaul Moore2008-04-121-23/+16
* SELinux: Enable dynamic enable/disable of the network access checksPaul Moore2008-01-301-2/+16
* SELinux: suppress a warning for 64k pages.Stephen Rothwell2007-11-081-6/+7
* sparse pointer use of zero as nullStephen Hemminger2007-10-181-1/+1
* security: Convert LSM into a static interfaceJames Morris2007-10-171-1/+0
* SELinux: null-terminate context string in selinux_xfrm_sec_ctx_allocVenkat Yekkirala2007-07-251-1/+2
* SELinux: peer secid consolidation for external network labelingPaul Moore2006-12-021-33/+0
* SELinux: Fix SA selection semanticsVenkat Yekkirala2006-12-021-52/+49
* SELinux: Return correct context for SO_PEERSECVenkat Yekkirala2006-12-021-37/+3
* SELinux: Various xfrm labeling fixesVenkat Yekkirala2006-12-021-26/+9
* IPsec: correct semantics for SELinux policy matchingVenkat Yekkirala2006-10-111-12/+41
* [MLSXFRM]: Auto-labeling of child socketsVenkat Yekkirala2006-09-221-1/+0
* [MLSXFRM]: Default labeling of socket specific IPSec policiesVenkat Yekkirala2006-09-221-11/+22
* [MLSXFRM]: Add flow labelingVenkat Yekkirala2006-09-221-4/+7
* [MLSXFRM]: Flow based matching of xfrm policy and stateVenkat Yekkirala2006-09-221-33/+166
* Remove obsolete #include <linux/config.h>Jörn Engel2006-06-301-1/+0
* [SECMARK]: Add new packet controls to SELinuxJames Morris2006-06-171-9/+3
* [LSM-IPsec]: SELinux AuthorizeCatherine Zhang2006-06-171-4/+35
* [SELINUX] Fix build after ipsec decap state changes.Dave Jones2006-04-091-2/+2
* [SECURITY]: TCP/UDP getpeersecCatherine Zhang2006-03-201-0/+68
* [XFRM]: Fix sparse warning.Luiz Capitulino2006-01-071-1/+1
* [LSM-IPSec]: Corrections to LSM-IPSec NethooksTrent Jaeger2006-01-061-7/+1
* [LSM-IPSec]: Per-packet access control.Trent Jaeger2006-01-031-0/+311