Home
last modified time | relevance | path

Searched refs:req (Results 1 – 11 of 11) sorted by relevance

/security/keys/
A Ddh.c135 struct kpp_request *req; in __keyctl_dh_compute() local
245 req = kpp_request_alloc(tfm, GFP_KERNEL); in __keyctl_dh_compute()
246 if (!req) { in __keyctl_dh_compute()
251 kpp_request_set_input(req, NULL, 0); in __keyctl_dh_compute()
252 kpp_request_set_output(req, &outsg, outlen); in __keyctl_dh_compute()
253 kpp_request_set_callback(req, CRYPTO_TFM_REQ_MAY_BACKLOG | in __keyctl_dh_compute()
261 ret = crypto_kpp_generate_public_key(req); in __keyctl_dh_compute()
278 req->dst_len + kdfcopy->otherinfolen); in __keyctl_dh_compute()
279 } else if (copy_to_user(buffer, outbuf, req->dst_len) == 0) { in __keyctl_dh_compute()
280 ret = req->dst_len; in __keyctl_dh_compute()
[all …]
/security/integrity/ima/
A Dima_crypto.c331 struct ahash_request *req; in ima_calc_file_hash_atfm() local
338 req = ahash_request_alloc(tfm, GFP_KERNEL); in ima_calc_file_hash_atfm()
339 if (!req) in ima_calc_file_hash_atfm()
415 ahash_rc = crypto_ahash_update(req); in ima_calc_file_hash_atfm()
431 ahash_request_free(req); in ima_calc_file_hash_atfm()
662 struct ahash_request *req; in calc_buffer_ahash_atfm() local
669 req = ahash_request_alloc(tfm, GFP_KERNEL); in calc_buffer_ahash_atfm()
670 if (!req) in calc_buffer_ahash_atfm()
683 ahash_request_set_crypt(req, &sg, NULL, len); in calc_buffer_ahash_atfm()
685 ahash_rc = crypto_ahash_update(req); in calc_buffer_ahash_atfm()
[all …]
/security/keys/encrypted-keys/
A Dencrypted.c386 struct skcipher_request *req; in init_skcipher_req() local
405 if (!req) { in init_skcipher_req()
413 return req; in init_skcipher_req()
459 struct skcipher_request *req; in derived_key_encrypt() local
467 ret = PTR_ERR(req); in derived_key_encrypt()
468 if (IS_ERR(req)) in derived_key_encrypt()
484 skcipher_request_free(req); in derived_key_encrypt()
561 struct skcipher_request *req; in derived_key_decrypt() local
574 ret = PTR_ERR(req); in derived_key_decrypt()
575 if (IS_ERR(req)) in derived_key_decrypt()
[all …]
/security/keys/trusted-keys/
A Dtrusted_dcp.c79 struct skcipher_request *req = NULL; in do_dcp_crypto() local
99 req = skcipher_request_alloc(tfm, GFP_NOFS); in do_dcp_crypto()
100 if (!req) { in do_dcp_crypto()
105 skcipher_request_set_callback(req, CRYPTO_TFM_REQ_MAY_BACKLOG | in do_dcp_crypto()
114 skcipher_request_set_crypt(req, &src_sg, &dst_sg, AES_KEYSIZE_128, in do_dcp_crypto()
118 res = crypto_wait_req(crypto_skcipher_encrypt(req), &wait); in do_dcp_crypto()
120 res = crypto_wait_req(crypto_skcipher_decrypt(req), &wait); in do_dcp_crypto()
123 skcipher_request_free(req); in do_dcp_crypto()
/security/selinux/include/
A Dnetlabel.h40 int selinux_netlbl_inet_conn_request(struct request_sock *req, u16 family);
96 static inline int selinux_netlbl_inet_conn_request(struct request_sock *req, in selinux_netlbl_inet_conn_request() argument
/security/selinux/
A Dnetlabel.c330 int selinux_netlbl_inet_conn_request(struct request_sock *req, u16 family) in selinux_netlbl_inet_conn_request() argument
339 rc = security_netlbl_sid_to_secattr(req->secid, &secattr); in selinux_netlbl_inet_conn_request()
342 rc = netlbl_req_setattr(req, &secattr); in selinux_netlbl_inet_conn_request()
A Dselinuxfs.c733 char *req = NULL; in sel_write_validatetrans() local
752 req = memdup_user_nul(buf, count); in sel_write_validatetrans()
753 if (IS_ERR(req)) { in sel_write_validatetrans()
754 rc = PTR_ERR(req); in sel_write_validatetrans()
755 req = NULL; in sel_write_validatetrans()
773 if (sscanf(req, "%s %s %hu %s", oldcon, newcon, &tclass, taskcon) != 4) in sel_write_validatetrans()
792 kfree(req); in sel_write_validatetrans()
A Dhooks.c5680 struct request_sock *req) in selinux_inet_conn_request() argument
5684 u16 family = req->rsk_ops->family; in selinux_inet_conn_request()
5694 req->secid = connsid; in selinux_inet_conn_request()
5695 req->peer_secid = peersid; in selinux_inet_conn_request()
5697 return selinux_netlbl_inet_conn_request(req, family); in selinux_inet_conn_request()
5701 const struct request_sock *req) in selinux_inet_csk_clone() argument
5705 newsksec->sid = req->secid; in selinux_inet_csk_clone()
5706 newsksec->peer_sid = req->peer_secid; in selinux_inet_csk_clone()
5714 selinux_netlbl_inet_csk_clone(newsk, req->rsk_ops->family); in selinux_inet_csk_clone()
5745 static void selinux_req_classify_flow(const struct request_sock *req, in selinux_req_classify_flow() argument
[all …]
/security/
A Dsecurity.c4941 void security_req_classify_flow(const struct request_sock *req, in security_req_classify_flow() argument
4944 call_void_hook(req_classify_flow, req, flic); in security_req_classify_flow()
4973 struct sk_buff *skb, struct request_sock *req) in security_inet_conn_request() argument
4975 return call_int_hook(inet_conn_request, sk, skb, req); in security_inet_conn_request()
4987 const struct request_sock *req) in security_inet_csk_clone() argument
4989 call_void_hook(inet_csk_clone, newsk, req); in security_inet_csk_clone()
/security/smack/
A Dsmack_lsm.c4356 struct request_sock *req) in smack_inet_conn_request() argument
4415 req->peer_secid = skp->smk_secid; in smack_inet_conn_request()
4429 rc = netlbl_req_setattr(req, &ssp->smk_out->smk_netlabel); in smack_inet_conn_request()
4431 netlbl_req_delattr(req); in smack_inet_conn_request()
4444 const struct request_sock *req) in smack_inet_csk_clone() argument
4449 if (req->peer_secid != 0) { in smack_inet_csk_clone()
4450 skp = smack_from_secid(req->peer_secid); in smack_inet_csk_clone()
/security/apparmor/
A Dlsm.c1639 struct request_sock *req) in apparmor_inet_conn_request() argument

Completed in 52 milliseconds