aboutsummaryrefslogtreecommitdiffstats
path: root/security/dummy.c
diff options
context:
space:
mode:
authorVenkat Yekkirala <vyekkirala@TrustedCS.com>2006-08-05 02:12:42 -0400
committerDavid S. Miller <davem@sunset.davemloft.net>2006-09-22 17:53:27 -0400
commitbeb8d13bed80f8388f1a9a107d07ddd342e627e8 (patch)
tree19d5763b9b3b8ff3969997565e5ec0edd6e4bd33 /security/dummy.c
parent4e2ba18eae7f370c7c3ed96eaca747cc9b39f917 (diff)
[MLSXFRM]: Add flow labeling
This labels the flows that could utilize IPSec xfrms at the points the flows are defined so that IPSec policy and SAs at the right label can be used. The following protos are currently not handled, but they should continue to be able to use single-labeled IPSec like they currently do. ipmr ip_gre ipip igmp sit sctp ip6_tunnel (IPv6 over IPv6 tunnel device) decnet Signed-off-by: Venkat Yekkirala <vyekkirala@TrustedCS.com> Signed-off-by: David S. Miller <davem@davemloft.net>
Diffstat (limited to 'security/dummy.c')
-rw-r--r--security/dummy.c7
1 files changed, 3 insertions, 4 deletions
diff --git a/security/dummy.c b/security/dummy.c
index c1f10654871e..c0ff6b9bfd7d 100644
--- a/security/dummy.c
+++ b/security/dummy.c
@@ -809,9 +809,8 @@ static inline void dummy_sk_clone_security (const struct sock *sk, struct sock *
809{ 809{
810} 810}
811 811
812static unsigned int dummy_sk_getsid(struct sock *sk, struct flowi *fl, u8 dir) 812static inline void dummy_sk_getsecid(struct sock *sk, u32 *secid)
813{ 813{
814 return 0;
815} 814}
816#endif /* CONFIG_SECURITY_NETWORK */ 815#endif /* CONFIG_SECURITY_NETWORK */
817 816
@@ -866,7 +865,7 @@ static int dummy_xfrm_flow_state_match(struct flowi *fl, struct xfrm_state *xfrm
866 return 1; 865 return 1;
867} 866}
868 867
869static int dummy_xfrm_decode_session(struct sk_buff *skb, struct flowi *fl) 868static int dummy_xfrm_decode_session(struct sk_buff *skb, u32 *fl, int ckall)
870{ 869{
871 return 0; 870 return 0;
872} 871}
@@ -1083,7 +1082,7 @@ void security_fixup_ops (struct security_operations *ops)
1083 set_to_dummy_if_null(ops, sk_alloc_security); 1082 set_to_dummy_if_null(ops, sk_alloc_security);
1084 set_to_dummy_if_null(ops, sk_free_security); 1083 set_to_dummy_if_null(ops, sk_free_security);
1085 set_to_dummy_if_null(ops, sk_clone_security); 1084 set_to_dummy_if_null(ops, sk_clone_security);
1086 set_to_dummy_if_null(ops, sk_getsid); 1085 set_to_dummy_if_null(ops, sk_getsecid);
1087 #endif /* CONFIG_SECURITY_NETWORK */ 1086 #endif /* CONFIG_SECURITY_NETWORK */
1088#ifdef CONFIG_SECURITY_NETWORK_XFRM 1087#ifdef CONFIG_SECURITY_NETWORK_XFRM
1089 set_to_dummy_if_null(ops, xfrm_policy_alloc_security); 1088 set_to_dummy_if_null(ops, xfrm_policy_alloc_security);