summaryrefslogtreecommitdiffstats
path: root/security/selinux/include/xfrm.h (follow)
Commit message (Expand)AuthorAgeFilesLines
* xfrm: invalidate dst on policy insertion/deletionNicolas Dichtel2012-09-181-0/+1
* SELinux: selinux/xfrm.h needs net/flow.hDavid Howells2012-03-261-0/+2
* xfrm: Mark flowi arg to security_xfrm_state_pol_flow_match() const.David S. Miller2011-02-231-1/+1
* SELinux: Convert avc_audit to use lsm_audit.hThomas Liu2009-08-171-4/+4
* Revert "SELinux: Convert avc_audit to use lsm_audit.h"James Morris2009-07-131-4/+4
* SELinux: Convert avc_audit to use lsm_audit.hThomas Liu2009-07-121-4/+4
* LSM: Make the Labeled IPsec hooks more stack friendlyPaul Moore2008-04-131-6/+7
* SELinux: Enable dynamic enable/disable of the network access checksPaul Moore2008-01-291-0/+12
* [SELINUX]: Fix 2.6.20-rc6 build when no xfrmVenkat Yekkirala2007-01-271-0/+9
* SELinux: peer secid consolidation for external network labelingPaul Moore2006-12-031-5/+0
* SELinux: Fix SA selection semanticsVenkat Yekkirala2006-12-031-5/+2
* SELinux: Return correct context for SO_PEERSECVenkat Yekkirala2006-12-031-6/+6
* SELinux: Various xfrm labeling fixesVenkat Yekkirala2006-12-031-2/+2
* IPsec: correct semantics for SELinux policy matchingVenkat Yekkirala2006-10-121-1/+2
* [MLSXFRM]: Fix build with SECURITY_NETWORK_XFRM disabled.Venkat Yekkirala2006-09-221-1/+6
* [MLSXFRM]: Default labeling of socket specific IPSec policiesVenkat Yekkirala2006-09-221-1/+2
* [MLSXFRM]: Add flow labelingVenkat Yekkirala2006-09-221-13/+1
* [MLSXFRM]: Flow based matching of xfrm policy and stateVenkat Yekkirala2006-09-221-6/+17
* [SECMARK]: Add new packet controls to SELinuxJames Morris2006-06-181-1/+1
* [LSM-IPsec]: SELinux AuthorizeCatherine Zhang2006-06-181-0/+2
* [SELINUX]: selinux_socket_getpeer_{stream,dgram} fixupCatherine Zhang2006-03-211-0/+10
* [SECURITY]: TCP/UDP getpeersecCatherine Zhang2006-03-211-0/+2
* [LSM-IPSec]: Per-packet access control.Trent Jaeger2006-01-031-0/+54