Home
last modified time | relevance | path

Searched refs:req (Results 1 – 9 of 9) sorted by relevance

/security/keys/
Ddh.c75 static void dh_crypto_done(struct crypto_async_request *req, int err) in dh_crypto_done() argument
77 struct dh_completion *compl = req->data; in dh_crypto_done()
252 struct kpp_request *req; in __keyctl_dh_compute() local
362 req = kpp_request_alloc(tfm, GFP_KERNEL); in __keyctl_dh_compute()
363 if (!req) { in __keyctl_dh_compute()
368 kpp_request_set_input(req, NULL, 0); in __keyctl_dh_compute()
369 kpp_request_set_output(req, &outsg, outlen); in __keyctl_dh_compute()
371 kpp_request_set_callback(req, CRYPTO_TFM_REQ_MAY_BACKLOG | in __keyctl_dh_compute()
379 ret = crypto_kpp_generate_public_key(req); in __keyctl_dh_compute()
392 if (copy_from_user(outbuf + req->dst_len, kdfcopy->otherinfo, in __keyctl_dh_compute()
[all …]
/security/integrity/ima/
Dima_crypto.c201 static void ahash_complete(struct crypto_async_request *req, int err) in ahash_complete() argument
203 struct ahash_completion *res = req->data; in ahash_complete()
236 struct ahash_request *req; in ima_calc_file_hash_atfm() local
243 req = ahash_request_alloc(tfm, GFP_KERNEL); in ima_calc_file_hash_atfm()
244 if (!req) in ima_calc_file_hash_atfm()
248 ahash_request_set_callback(req, CRYPTO_TFM_REQ_MAY_BACKLOG | in ima_calc_file_hash_atfm()
252 rc = ahash_wait(crypto_ahash_init(req), &res); in ima_calc_file_hash_atfm()
313 ahash_request_set_crypt(req, sg, NULL, rbuf_len); in ima_calc_file_hash_atfm()
315 ahash_rc = crypto_ahash_update(req); in ima_calc_file_hash_atfm()
327 ahash_request_set_crypt(req, NULL, hash->digest, 0); in ima_calc_file_hash_atfm()
[all …]
/security/keys/encrypted-keys/
Dencrypted.c392 struct skcipher_request *req; in init_skcipher_req() local
410 req = skcipher_request_alloc(tfm, GFP_KERNEL); in init_skcipher_req()
411 if (!req) { in init_skcipher_req()
418 skcipher_request_set_callback(req, 0, NULL, NULL); in init_skcipher_req()
419 return req; in init_skcipher_req()
465 struct skcipher_request *req; in derived_key_encrypt() local
472 req = init_skcipher_req(derived_key, derived_keylen); in derived_key_encrypt()
473 ret = PTR_ERR(req); in derived_key_encrypt()
474 if (IS_ERR(req)) in derived_key_encrypt()
487 skcipher_request_set_crypt(req, sg_in, sg_out, encrypted_datalen, iv); in derived_key_encrypt()
[all …]
/security/selinux/include/
Dnetlabel.h57 int selinux_netlbl_inet_conn_request(struct request_sock *req, u16 family);
117 static inline int selinux_netlbl_inet_conn_request(struct request_sock *req, in selinux_netlbl_inet_conn_request() argument
/security/selinux/
Dnetlabel.c284 int selinux_netlbl_inet_conn_request(struct request_sock *req, u16 family) in selinux_netlbl_inet_conn_request() argument
293 rc = security_netlbl_sid_to_secattr(req->secid, &secattr); in selinux_netlbl_inet_conn_request()
296 rc = netlbl_req_setattr(req, &secattr); in selinux_netlbl_inet_conn_request()
Dselinuxfs.c633 char *req = NULL; in sel_write_validatetrans() local
652 req = memdup_user_nul(buf, count); in sel_write_validatetrans()
653 if (IS_ERR(req)) { in sel_write_validatetrans()
654 rc = PTR_ERR(req); in sel_write_validatetrans()
655 req = NULL; in sel_write_validatetrans()
673 if (sscanf(req, "%s %s %hu %s", oldcon, newcon, &tclass, taskcon) != 4) in sel_write_validatetrans()
692 kfree(req); in sel_write_validatetrans()
Dhooks.c4985 struct request_sock *req) in selinux_inet_conn_request() argument
4989 u16 family = req->rsk_ops->family; in selinux_inet_conn_request()
4999 req->secid = connsid; in selinux_inet_conn_request()
5000 req->peer_secid = peersid; in selinux_inet_conn_request()
5002 return selinux_netlbl_inet_conn_request(req, family); in selinux_inet_conn_request()
5006 const struct request_sock *req) in selinux_inet_csk_clone() argument
5010 newsksec->sid = req->secid; in selinux_inet_csk_clone()
5011 newsksec->peer_sid = req->peer_secid; in selinux_inet_csk_clone()
5019 selinux_netlbl_inet_csk_clone(newsk, req->rsk_ops->family); in selinux_inet_csk_clone()
5055 static void selinux_req_classify_flow(const struct request_sock *req, in selinux_req_classify_flow() argument
[all …]
/security/
Dsecurity.c1456 void security_req_classify_flow(const struct request_sock *req, struct flowi *fl) in security_req_classify_flow() argument
1458 call_void_hook(req_classify_flow, req, fl); in security_req_classify_flow()
1469 struct sk_buff *skb, struct request_sock *req) in security_inet_conn_request() argument
1471 return call_int_hook(inet_conn_request, 0, sk, skb, req); in security_inet_conn_request()
1476 const struct request_sock *req) in security_inet_csk_clone() argument
1478 call_void_hook(inet_csk_clone, newsk, req); in security_inet_csk_clone()
/security/smack/
Dsmack_lsm.c4192 struct request_sock *req) in smack_inet_conn_request() argument
4264 req->peer_secid = skp->smk_secid; in smack_inet_conn_request()
4278 rc = netlbl_req_setattr(req, &skp->smk_netlabel); in smack_inet_conn_request()
4280 netlbl_req_delattr(req); in smack_inet_conn_request()
4293 const struct request_sock *req) in smack_inet_csk_clone() argument
4298 if (req->peer_secid != 0) { in smack_inet_csk_clone()
4299 skp = smack_from_secid(req->peer_secid); in smack_inet_csk_clone()