diff options
Diffstat (limited to 'include/linux/security.h')
-rw-r--r-- | include/linux/security.h | 26 |
1 files changed, 18 insertions, 8 deletions
diff --git a/include/linux/security.h b/include/linux/security.h index 4686491852a7..e5a5e8a41e55 100644 --- a/include/linux/security.h +++ b/include/linux/security.h | |||
@@ -1039,17 +1039,25 @@ static inline void security_free_mnt_opts(struct security_mnt_opts *opts) | |||
1039 | * @xfrm_policy_delete_security: | 1039 | * @xfrm_policy_delete_security: |
1040 | * @ctx contains the xfrm_sec_ctx. | 1040 | * @ctx contains the xfrm_sec_ctx. |
1041 | * Authorize deletion of xp->security. | 1041 | * Authorize deletion of xp->security. |
1042 | * @xfrm_state_alloc_security: | 1042 | * @xfrm_state_alloc: |
1043 | * @x contains the xfrm_state being added to the Security Association | 1043 | * @x contains the xfrm_state being added to the Security Association |
1044 | * Database by the XFRM system. | 1044 | * Database by the XFRM system. |
1045 | * @sec_ctx contains the security context information being provided by | 1045 | * @sec_ctx contains the security context information being provided by |
1046 | * the user-level SA generation program (e.g., setkey or racoon). | 1046 | * the user-level SA generation program (e.g., setkey or racoon). |
1047 | * @secid contains the secid from which to take the mls portion of the context. | ||
1048 | * Allocate a security structure to the x->security field; the security | 1047 | * Allocate a security structure to the x->security field; the security |
1049 | * field is initialized to NULL when the xfrm_state is allocated. Set the | 1048 | * field is initialized to NULL when the xfrm_state is allocated. Set the |
1050 | * context to correspond to either sec_ctx or polsec, with the mls portion | 1049 | * context to correspond to sec_ctx. Return 0 if operation was successful |
1051 | * taken from secid in the latter case. | 1050 | * (memory to allocate, legal context). |
1052 | * Return 0 if operation was successful (memory to allocate, legal context). | 1051 | * @xfrm_state_alloc_acquire: |
1052 | * @x contains the xfrm_state being added to the Security Association | ||
1053 | * Database by the XFRM system. | ||
1054 | * @polsec contains the policy's security context. | ||
1055 | * @secid contains the secid from which to take the mls portion of the | ||
1056 | * context. | ||
1057 | * Allocate a security structure to the x->security field; the security | ||
1058 | * field is initialized to NULL when the xfrm_state is allocated. Set the | ||
1059 | * context to correspond to secid. Return 0 if operation was successful | ||
1060 | * (memory to allocate, legal context). | ||
1053 | * @xfrm_state_free_security: | 1061 | * @xfrm_state_free_security: |
1054 | * @x contains the xfrm_state. | 1062 | * @x contains the xfrm_state. |
1055 | * Deallocate x->security. | 1063 | * Deallocate x->security. |
@@ -1651,9 +1659,11 @@ struct security_operations { | |||
1651 | int (*xfrm_policy_clone_security) (struct xfrm_sec_ctx *old_ctx, struct xfrm_sec_ctx **new_ctx); | 1659 | int (*xfrm_policy_clone_security) (struct xfrm_sec_ctx *old_ctx, struct xfrm_sec_ctx **new_ctx); |
1652 | void (*xfrm_policy_free_security) (struct xfrm_sec_ctx *ctx); | 1660 | void (*xfrm_policy_free_security) (struct xfrm_sec_ctx *ctx); |
1653 | int (*xfrm_policy_delete_security) (struct xfrm_sec_ctx *ctx); | 1661 | int (*xfrm_policy_delete_security) (struct xfrm_sec_ctx *ctx); |
1654 | int (*xfrm_state_alloc_security) (struct xfrm_state *x, | 1662 | int (*xfrm_state_alloc) (struct xfrm_state *x, |
1655 | struct xfrm_user_sec_ctx *sec_ctx, | 1663 | struct xfrm_user_sec_ctx *sec_ctx); |
1656 | u32 secid); | 1664 | int (*xfrm_state_alloc_acquire) (struct xfrm_state *x, |
1665 | struct xfrm_sec_ctx *polsec, | ||
1666 | u32 secid); | ||
1657 | void (*xfrm_state_free_security) (struct xfrm_state *x); | 1667 | void (*xfrm_state_free_security) (struct xfrm_state *x); |
1658 | int (*xfrm_state_delete_security) (struct xfrm_state *x); | 1668 | int (*xfrm_state_delete_security) (struct xfrm_state *x); |
1659 | int (*xfrm_policy_lookup) (struct xfrm_sec_ctx *ctx, u32 fl_secid, u8 dir); | 1669 | int (*xfrm_policy_lookup) (struct xfrm_sec_ctx *ctx, u32 fl_secid, u8 dir); |