Home
last modified time | relevance | path

Searched refs:req (Results 1 – 10 of 10) sorted by relevance

/security/keys/
Ddh.c71 static void dh_crypto_done(struct crypto_async_request *req, int err) in dh_crypto_done() argument
73 struct dh_completion *compl = req->data; in dh_crypto_done()
240 struct kpp_request *req; in __keyctl_dh_compute() local
350 req = kpp_request_alloc(tfm, GFP_KERNEL); in __keyctl_dh_compute()
351 if (!req) { in __keyctl_dh_compute()
356 kpp_request_set_input(req, NULL, 0); in __keyctl_dh_compute()
357 kpp_request_set_output(req, &outsg, outlen); in __keyctl_dh_compute()
359 kpp_request_set_callback(req, CRYPTO_TFM_REQ_MAY_BACKLOG | in __keyctl_dh_compute()
367 ret = crypto_kpp_generate_public_key(req); in __keyctl_dh_compute()
380 if (copy_from_user(outbuf + req->dst_len, kdfcopy->otherinfo, in __keyctl_dh_compute()
[all …]
/security/integrity/ima/
Dima_crypto.c211 struct ahash_request *req; in ima_calc_file_hash_atfm() local
218 req = ahash_request_alloc(tfm, GFP_KERNEL); in ima_calc_file_hash_atfm()
219 if (!req) in ima_calc_file_hash_atfm()
223 ahash_request_set_callback(req, CRYPTO_TFM_REQ_MAY_BACKLOG | in ima_calc_file_hash_atfm()
227 rc = ahash_wait(crypto_ahash_init(req), &wait); in ima_calc_file_hash_atfm()
293 ahash_request_set_crypt(req, sg, NULL, rbuf_len); in ima_calc_file_hash_atfm()
295 ahash_rc = crypto_ahash_update(req); in ima_calc_file_hash_atfm()
307 ahash_request_set_crypt(req, NULL, hash->digest, 0); in ima_calc_file_hash_atfm()
308 rc = ahash_wait(crypto_ahash_final(req), &wait); in ima_calc_file_hash_atfm()
311 ahash_request_free(req); in ima_calc_file_hash_atfm()
[all …]
/security/keys/encrypted-keys/
Dencrypted.c392 struct skcipher_request *req; in init_skcipher_req() local
410 req = skcipher_request_alloc(tfm, GFP_KERNEL); in init_skcipher_req()
411 if (!req) { in init_skcipher_req()
418 skcipher_request_set_callback(req, 0, NULL, NULL); in init_skcipher_req()
419 return req; in init_skcipher_req()
465 struct skcipher_request *req; in derived_key_encrypt() local
472 req = init_skcipher_req(derived_key, derived_keylen); in derived_key_encrypt()
473 ret = PTR_ERR(req); in derived_key_encrypt()
474 if (IS_ERR(req)) in derived_key_encrypt()
487 skcipher_request_set_crypt(req, sg_in, sg_out, encrypted_datalen, iv); in derived_key_encrypt()
[all …]
/security/selinux/include/
Dnetlabel.h44 int selinux_netlbl_inet_conn_request(struct request_sock *req, u16 family);
112 static inline int selinux_netlbl_inet_conn_request(struct request_sock *req, in selinux_netlbl_inet_conn_request() argument
/security/selinux/
Dnetlabel.c324 int selinux_netlbl_inet_conn_request(struct request_sock *req, u16 family) in selinux_netlbl_inet_conn_request() argument
333 rc = security_netlbl_sid_to_secattr(&selinux_state, req->secid, in selinux_netlbl_inet_conn_request()
337 rc = netlbl_req_setattr(req, &secattr); in selinux_netlbl_inet_conn_request()
Dselinuxfs.c688 char *req = NULL; in sel_write_validatetrans() local
708 req = memdup_user_nul(buf, count); in sel_write_validatetrans()
709 if (IS_ERR(req)) { in sel_write_validatetrans()
710 rc = PTR_ERR(req); in sel_write_validatetrans()
711 req = NULL; in sel_write_validatetrans()
729 if (sscanf(req, "%s %s %hu %s", oldcon, newcon, &tclass, taskcon) != 4) in sel_write_validatetrans()
748 kfree(req); in sel_write_validatetrans()
Dhooks.c5354 struct request_sock *req) in selinux_inet_conn_request() argument
5358 u16 family = req->rsk_ops->family; in selinux_inet_conn_request()
5368 req->secid = connsid; in selinux_inet_conn_request()
5369 req->peer_secid = peersid; in selinux_inet_conn_request()
5371 return selinux_netlbl_inet_conn_request(req, family); in selinux_inet_conn_request()
5375 const struct request_sock *req) in selinux_inet_csk_clone() argument
5379 newsksec->sid = req->secid; in selinux_inet_csk_clone()
5380 newsksec->peer_sid = req->peer_secid; in selinux_inet_csk_clone()
5388 selinux_netlbl_inet_csk_clone(newsk, req->rsk_ops->family); in selinux_inet_csk_clone()
5426 static void selinux_req_classify_flow(const struct request_sock *req, in selinux_req_classify_flow() argument
[all …]
/security/
Dsecurity.c2090 void security_req_classify_flow(const struct request_sock *req, struct flowi *fl) in security_req_classify_flow() argument
2092 call_void_hook(req_classify_flow, req, fl); in security_req_classify_flow()
2103 struct sk_buff *skb, struct request_sock *req) in security_inet_conn_request() argument
2105 return call_int_hook(inet_conn_request, 0, sk, skb, req); in security_inet_conn_request()
2110 const struct request_sock *req) in security_inet_csk_clone() argument
2112 call_void_hook(inet_csk_clone, newsk, req); in security_inet_csk_clone()
/security/smack/
Dsmack_lsm.c4087 struct request_sock *req) in smack_inet_conn_request() argument
4159 req->peer_secid = skp->smk_secid; in smack_inet_conn_request()
4173 rc = netlbl_req_setattr(req, &skp->smk_netlabel); in smack_inet_conn_request()
4175 netlbl_req_delattr(req); in smack_inet_conn_request()
4188 const struct request_sock *req) in smack_inet_csk_clone() argument
4193 if (req->peer_secid != 0) { in smack_inet_csk_clone()
4194 skp = smack_from_secid(req->peer_secid); in smack_inet_csk_clone()
/security/apparmor/
Dlsm.c1133 struct request_sock *req) in apparmor_inet_conn_request() argument