Skip to content

Commit

Permalink
---
Browse files Browse the repository at this point in the history
yaml
---
r: 71848
b: refs/heads/master
c: 6da34ba
h: refs/heads/master
v: v3
  • Loading branch information
Serge Hallyn authored and Adrian Bunk committed Oct 19, 2007
1 parent d71826a commit 06b06e2
Show file tree
Hide file tree
Showing 2 changed files with 16 additions and 3 deletions.
2 changes: 1 addition & 1 deletion [refs]
Original file line number Diff line number Diff line change
@@ -1,2 +1,2 @@
---
refs/heads/master: 118e78d1cd7023c3b155f861072ba10df0265fda
refs/heads/master: 6da34bae29f51c35b300d89c1bbfe96cdf44d4d5
17 changes: 15 additions & 2 deletions trunk/include/linux/security.h
Original file line number Diff line number Diff line change
Expand Up @@ -832,9 +832,11 @@ struct request_sock;
* incoming sk_buff @skb has been associated with a particular socket, @sk.
* @sk contains the sock (not socket) associated with the incoming sk_buff.
* @skb contains the incoming network data.
* @socket_getpeersec:
* @socket_getpeersec_stream:
* This hook allows the security module to provide peer socket security
* state to userspace via getsockopt SO_GETPEERSEC.
* state for unix or connected tcp sockets to userspace via getsockopt
* SO_GETPEERSEC. For tcp sockets this can be meaningful if the
* socket is associated with an ipsec SA.
* @sock is the local socket.
* @optval userspace memory where the security state is to be copied.
* @optlen userspace int where the module should copy the actual length
Expand All @@ -843,6 +845,17 @@ struct request_sock;
* by the caller.
* Return 0 if all is well, otherwise, typical getsockopt return
* values.
* @socket_getpeersec_dgram:
* This hook allows the security module to provide peer socket security
* state for udp sockets on a per-packet basis to userspace via
* getsockopt SO_GETPEERSEC. The application must first have indicated
* the IP_PASSSEC option via getsockopt. It can then retrieve the
* security state returned by this hook for a packet via the SCM_SECURITY
* ancillary message type.
* @skb is the skbuff for the packet being queried
* @secdata is a pointer to a buffer in which to copy the security data
* @seclen is the maximum length for @secdata
* Return 0 on success, error on failure.
* @sk_alloc_security:
* Allocate and attach a security structure to the sk->sk_security field,
* which is used to copy security attributes between local stream sockets.
Expand Down

0 comments on commit 06b06e2

Please sign in to comment.