/security/keys/ |
D | dh.c | 71 static void dh_crypto_done(struct crypto_async_request *req, int err) in dh_crypto_done() argument 73 struct dh_completion *compl = req->data; in dh_crypto_done() 240 struct kpp_request *req; in __keyctl_dh_compute() local 350 req = kpp_request_alloc(tfm, GFP_KERNEL); in __keyctl_dh_compute() 351 if (!req) { in __keyctl_dh_compute() 356 kpp_request_set_input(req, NULL, 0); in __keyctl_dh_compute() 357 kpp_request_set_output(req, &outsg, outlen); in __keyctl_dh_compute() 359 kpp_request_set_callback(req, CRYPTO_TFM_REQ_MAY_BACKLOG | in __keyctl_dh_compute() 367 ret = crypto_kpp_generate_public_key(req); in __keyctl_dh_compute() 380 if (copy_from_user(outbuf + req->dst_len, kdfcopy->otherinfo, in __keyctl_dh_compute() [all …]
|
/security/integrity/ima/ |
D | ima_crypto.c | 211 struct ahash_request *req; in ima_calc_file_hash_atfm() local 218 req = ahash_request_alloc(tfm, GFP_KERNEL); in ima_calc_file_hash_atfm() 219 if (!req) in ima_calc_file_hash_atfm() 223 ahash_request_set_callback(req, CRYPTO_TFM_REQ_MAY_BACKLOG | in ima_calc_file_hash_atfm() 227 rc = ahash_wait(crypto_ahash_init(req), &wait); in ima_calc_file_hash_atfm() 293 ahash_request_set_crypt(req, sg, NULL, rbuf_len); in ima_calc_file_hash_atfm() 295 ahash_rc = crypto_ahash_update(req); in ima_calc_file_hash_atfm() 307 ahash_request_set_crypt(req, NULL, hash->digest, 0); in ima_calc_file_hash_atfm() 308 rc = ahash_wait(crypto_ahash_final(req), &wait); in ima_calc_file_hash_atfm() 311 ahash_request_free(req); in ima_calc_file_hash_atfm() [all …]
|
/security/keys/encrypted-keys/ |
D | encrypted.c | 392 struct skcipher_request *req; in init_skcipher_req() local 410 req = skcipher_request_alloc(tfm, GFP_KERNEL); in init_skcipher_req() 411 if (!req) { in init_skcipher_req() 418 skcipher_request_set_callback(req, 0, NULL, NULL); in init_skcipher_req() 419 return req; in init_skcipher_req() 465 struct skcipher_request *req; in derived_key_encrypt() local 472 req = init_skcipher_req(derived_key, derived_keylen); in derived_key_encrypt() 473 ret = PTR_ERR(req); in derived_key_encrypt() 474 if (IS_ERR(req)) in derived_key_encrypt() 487 skcipher_request_set_crypt(req, sg_in, sg_out, encrypted_datalen, iv); in derived_key_encrypt() [all …]
|
/security/selinux/include/ |
D | netlabel.h | 44 int selinux_netlbl_inet_conn_request(struct request_sock *req, u16 family); 112 static inline int selinux_netlbl_inet_conn_request(struct request_sock *req, in selinux_netlbl_inet_conn_request() argument
|
/security/selinux/ |
D | netlabel.c | 324 int selinux_netlbl_inet_conn_request(struct request_sock *req, u16 family) in selinux_netlbl_inet_conn_request() argument 333 rc = security_netlbl_sid_to_secattr(&selinux_state, req->secid, in selinux_netlbl_inet_conn_request() 337 rc = netlbl_req_setattr(req, &secattr); in selinux_netlbl_inet_conn_request()
|
D | selinuxfs.c | 688 char *req = NULL; in sel_write_validatetrans() local 708 req = memdup_user_nul(buf, count); in sel_write_validatetrans() 709 if (IS_ERR(req)) { in sel_write_validatetrans() 710 rc = PTR_ERR(req); in sel_write_validatetrans() 711 req = NULL; in sel_write_validatetrans() 729 if (sscanf(req, "%s %s %hu %s", oldcon, newcon, &tclass, taskcon) != 4) in sel_write_validatetrans() 748 kfree(req); in sel_write_validatetrans()
|
D | hooks.c | 5354 struct request_sock *req) in selinux_inet_conn_request() argument 5358 u16 family = req->rsk_ops->family; in selinux_inet_conn_request() 5368 req->secid = connsid; in selinux_inet_conn_request() 5369 req->peer_secid = peersid; in selinux_inet_conn_request() 5371 return selinux_netlbl_inet_conn_request(req, family); in selinux_inet_conn_request() 5375 const struct request_sock *req) in selinux_inet_csk_clone() argument 5379 newsksec->sid = req->secid; in selinux_inet_csk_clone() 5380 newsksec->peer_sid = req->peer_secid; in selinux_inet_csk_clone() 5388 selinux_netlbl_inet_csk_clone(newsk, req->rsk_ops->family); in selinux_inet_csk_clone() 5426 static void selinux_req_classify_flow(const struct request_sock *req, in selinux_req_classify_flow() argument [all …]
|
/security/ |
D | security.c | 2090 void security_req_classify_flow(const struct request_sock *req, struct flowi *fl) in security_req_classify_flow() argument 2092 call_void_hook(req_classify_flow, req, fl); in security_req_classify_flow() 2103 struct sk_buff *skb, struct request_sock *req) in security_inet_conn_request() argument 2105 return call_int_hook(inet_conn_request, 0, sk, skb, req); in security_inet_conn_request() 2110 const struct request_sock *req) in security_inet_csk_clone() argument 2112 call_void_hook(inet_csk_clone, newsk, req); in security_inet_csk_clone()
|
/security/smack/ |
D | smack_lsm.c | 4087 struct request_sock *req) in smack_inet_conn_request() argument 4159 req->peer_secid = skp->smk_secid; in smack_inet_conn_request() 4173 rc = netlbl_req_setattr(req, &skp->smk_netlabel); in smack_inet_conn_request() 4175 netlbl_req_delattr(req); in smack_inet_conn_request() 4188 const struct request_sock *req) in smack_inet_csk_clone() argument 4193 if (req->peer_secid != 0) { in smack_inet_csk_clone() 4194 skp = smack_from_secid(req->peer_secid); in smack_inet_csk_clone()
|
/security/apparmor/ |
D | lsm.c | 1133 struct request_sock *req) in apparmor_inet_conn_request() argument
|