summaryrefslogtreecommitdiff
path: root/security/selinux/include/xfrm.h
AgeCommit message (Expand)Author
2013-07-25selinux: remove the BUG_ON() from selinux_skb_xfrm_sid()Paul Moore
2013-07-25selinux: cleanup the XFRM headerPaul Moore
2013-07-25selinux: cleanup selinux_xfrm_sock_rcv_skb() and selinux_xfrm_postroute_last()Paul Moore
2013-07-25lsm: split the xfrm_state_alloc_security() hook implementationPaul Moore
2012-09-18xfrm: invalidate dst on policy insertion/deletionNicolas Dichtel
2012-03-26SELinux: selinux/xfrm.h needs net/flow.hDavid Howells
2011-02-23xfrm: Mark flowi arg to security_xfrm_state_pol_flow_match() const.David S. Miller
2009-08-16SELinux: Convert avc_audit to use lsm_audit.hThomas Liu
2009-07-13Revert "SELinux: Convert avc_audit to use lsm_audit.h"James Morris
2009-07-12SELinux: Convert avc_audit to use lsm_audit.hThomas Liu
2008-04-13LSM: Make the Labeled IPsec hooks more stack friendlyPaul Moore
2008-01-29SELinux: Enable dynamic enable/disable of the network access checksPaul Moore
2007-01-27[SELINUX]: Fix 2.6.20-rc6 build when no xfrmVenkat Yekkirala
2006-12-03SELinux: peer secid consolidation for external network labelingPaul Moore
2006-12-03SELinux: Fix SA selection semanticsVenkat Yekkirala
2006-12-03SELinux: Return correct context for SO_PEERSECVenkat Yekkirala
2006-12-03SELinux: Various xfrm labeling fixesVenkat Yekkirala
2006-10-12IPsec: correct semantics for SELinux policy matchingVenkat Yekkirala
2006-09-22[MLSXFRM]: Fix build with SECURITY_NETWORK_XFRM disabled.Venkat Yekkirala
2006-09-22[MLSXFRM]: Default labeling of socket specific IPSec policiesVenkat Yekkirala
2006-09-22[MLSXFRM]: Add flow labelingVenkat Yekkirala
2006-09-22[MLSXFRM]: Flow based matching of xfrm policy and stateVenkat Yekkirala
2006-06-18[SECMARK]: Add new packet controls to SELinuxJames Morris
2006-06-18[LSM-IPsec]: SELinux AuthorizeCatherine Zhang
2006-03-21[SELINUX]: selinux_socket_getpeer_{stream,dgram} fixupCatherine Zhang
2006-03-21[SECURITY]: TCP/UDP getpeersecCatherine Zhang
2006-01-03[LSM-IPSec]: Per-packet access control.Trent Jaeger