/security/keys/ |
D | dh.c | 71 static void dh_crypto_done(struct crypto_async_request *req, int err) in dh_crypto_done() argument 73 struct dh_completion *compl = req->data; in dh_crypto_done() 240 struct kpp_request *req; in __keyctl_dh_compute() local 350 req = kpp_request_alloc(tfm, GFP_KERNEL); in __keyctl_dh_compute() 351 if (!req) { in __keyctl_dh_compute() 356 kpp_request_set_input(req, NULL, 0); in __keyctl_dh_compute() 357 kpp_request_set_output(req, &outsg, outlen); in __keyctl_dh_compute() 359 kpp_request_set_callback(req, CRYPTO_TFM_REQ_MAY_BACKLOG | in __keyctl_dh_compute() 367 ret = crypto_kpp_generate_public_key(req); in __keyctl_dh_compute() 380 if (copy_from_user(outbuf + req->dst_len, kdfcopy->otherinfo, in __keyctl_dh_compute() [all …]
|
/security/integrity/ima/ |
D | ima_crypto.c | 336 struct ahash_request *req; in ima_calc_file_hash_atfm() local 343 req = ahash_request_alloc(tfm, GFP_KERNEL); in ima_calc_file_hash_atfm() 344 if (!req) in ima_calc_file_hash_atfm() 348 ahash_request_set_callback(req, CRYPTO_TFM_REQ_MAY_BACKLOG | in ima_calc_file_hash_atfm() 352 rc = ahash_wait(crypto_ahash_init(req), &wait); in ima_calc_file_hash_atfm() 418 ahash_request_set_crypt(req, sg, NULL, rbuf_len); in ima_calc_file_hash_atfm() 420 ahash_rc = crypto_ahash_update(req); in ima_calc_file_hash_atfm() 432 ahash_request_set_crypt(req, NULL, hash->digest, 0); in ima_calc_file_hash_atfm() 433 rc = ahash_wait(crypto_ahash_final(req), &wait); in ima_calc_file_hash_atfm() 436 ahash_request_free(req); in ima_calc_file_hash_atfm() [all …]
|
/security/keys/encrypted-keys/ |
D | encrypted.c | 380 struct skcipher_request *req; in init_skcipher_req() local 398 req = skcipher_request_alloc(tfm, GFP_KERNEL); in init_skcipher_req() 399 if (!req) { in init_skcipher_req() 406 skcipher_request_set_callback(req, 0, NULL, NULL); in init_skcipher_req() 407 return req; in init_skcipher_req() 453 struct skcipher_request *req; in derived_key_encrypt() local 460 req = init_skcipher_req(derived_key, derived_keylen); in derived_key_encrypt() 461 ret = PTR_ERR(req); in derived_key_encrypt() 462 if (IS_ERR(req)) in derived_key_encrypt() 475 skcipher_request_set_crypt(req, sg_in, sg_out, encrypted_datalen, iv); in derived_key_encrypt() [all …]
|
/security/selinux/include/ |
D | netlabel.h | 44 int selinux_netlbl_inet_conn_request(struct request_sock *req, u16 family); 106 static inline int selinux_netlbl_inet_conn_request(struct request_sock *req, in selinux_netlbl_inet_conn_request() argument
|
/security/selinux/ |
D | netlabel.c | 324 int selinux_netlbl_inet_conn_request(struct request_sock *req, u16 family) in selinux_netlbl_inet_conn_request() argument 333 rc = security_netlbl_sid_to_secattr(&selinux_state, req->secid, in selinux_netlbl_inet_conn_request() 337 rc = netlbl_req_setattr(req, &secattr); in selinux_netlbl_inet_conn_request()
|
D | selinuxfs.c | 784 char *req = NULL; in sel_write_validatetrans() local 804 req = memdup_user_nul(buf, count); in sel_write_validatetrans() 805 if (IS_ERR(req)) { in sel_write_validatetrans() 806 rc = PTR_ERR(req); in sel_write_validatetrans() 807 req = NULL; in sel_write_validatetrans() 825 if (sscanf(req, "%s %s %hu %s", oldcon, newcon, &tclass, taskcon) != 4) in sel_write_validatetrans() 844 kfree(req); in sel_write_validatetrans()
|
D | hooks.c | 5570 struct request_sock *req) in selinux_inet_conn_request() argument 5574 u16 family = req->rsk_ops->family; in selinux_inet_conn_request() 5584 req->secid = connsid; in selinux_inet_conn_request() 5585 req->peer_secid = peersid; in selinux_inet_conn_request() 5587 return selinux_netlbl_inet_conn_request(req, family); in selinux_inet_conn_request() 5591 const struct request_sock *req) in selinux_inet_csk_clone() argument 5595 newsksec->sid = req->secid; in selinux_inet_csk_clone() 5596 newsksec->peer_sid = req->peer_secid; in selinux_inet_csk_clone() 5604 selinux_netlbl_inet_csk_clone(newsk, req->rsk_ops->family); in selinux_inet_csk_clone() 5642 static void selinux_req_classify_flow(const struct request_sock *req, in selinux_req_classify_flow() argument [all …]
|
/security/ |
D | security.c | 2329 void security_req_classify_flow(const struct request_sock *req, in security_req_classify_flow() argument 2332 call_void_hook(req_classify_flow, req, flic); in security_req_classify_flow() 2343 struct sk_buff *skb, struct request_sock *req) in security_inet_conn_request() argument 2345 return call_int_hook(inet_conn_request, 0, sk, skb, req); in security_inet_conn_request() 2350 const struct request_sock *req) in security_inet_csk_clone() argument 2352 call_void_hook(inet_csk_clone, newsk, req); in security_inet_csk_clone()
|
/security/smack/ |
D | smack_lsm.c | 4145 struct request_sock *req) in smack_inet_conn_request() argument 4204 req->peer_secid = skp->smk_secid; in smack_inet_conn_request() 4218 rc = netlbl_req_setattr(req, &skp->smk_netlabel); in smack_inet_conn_request() 4220 netlbl_req_delattr(req); in smack_inet_conn_request() 4233 const struct request_sock *req) in smack_inet_csk_clone() argument 4238 if (req->peer_secid != 0) { in smack_inet_csk_clone() 4239 skp = smack_from_secid(req->peer_secid); in smack_inet_csk_clone()
|
/security/apparmor/ |
D | lsm.c | 1160 struct request_sock *req) in apparmor_inet_conn_request() argument
|