| /security/keys/ |
| A D | dh.c | 135 struct kpp_request *req; in __keyctl_dh_compute() local 245 req = kpp_request_alloc(tfm, GFP_KERNEL); in __keyctl_dh_compute() 246 if (!req) { in __keyctl_dh_compute() 251 kpp_request_set_input(req, NULL, 0); in __keyctl_dh_compute() 252 kpp_request_set_output(req, &outsg, outlen); in __keyctl_dh_compute() 253 kpp_request_set_callback(req, CRYPTO_TFM_REQ_MAY_BACKLOG | in __keyctl_dh_compute() 261 ret = crypto_kpp_generate_public_key(req); in __keyctl_dh_compute() 278 req->dst_len + kdfcopy->otherinfolen); in __keyctl_dh_compute() 279 } else if (copy_to_user(buffer, outbuf, req->dst_len) == 0) { in __keyctl_dh_compute() 280 ret = req->dst_len; in __keyctl_dh_compute() [all …]
|
| /security/integrity/ima/ |
| A D | ima_crypto.c | 331 struct ahash_request *req; in ima_calc_file_hash_atfm() local 338 req = ahash_request_alloc(tfm, GFP_KERNEL); in ima_calc_file_hash_atfm() 339 if (!req) in ima_calc_file_hash_atfm() 415 ahash_rc = crypto_ahash_update(req); in ima_calc_file_hash_atfm() 431 ahash_request_free(req); in ima_calc_file_hash_atfm() 662 struct ahash_request *req; in calc_buffer_ahash_atfm() local 669 req = ahash_request_alloc(tfm, GFP_KERNEL); in calc_buffer_ahash_atfm() 670 if (!req) in calc_buffer_ahash_atfm() 683 ahash_request_set_crypt(req, &sg, NULL, len); in calc_buffer_ahash_atfm() 685 ahash_rc = crypto_ahash_update(req); in calc_buffer_ahash_atfm() [all …]
|
| /security/keys/encrypted-keys/ |
| A D | encrypted.c | 386 struct skcipher_request *req; in init_skcipher_req() local 405 if (!req) { in init_skcipher_req() 413 return req; in init_skcipher_req() 459 struct skcipher_request *req; in derived_key_encrypt() local 467 ret = PTR_ERR(req); in derived_key_encrypt() 468 if (IS_ERR(req)) in derived_key_encrypt() 484 skcipher_request_free(req); in derived_key_encrypt() 561 struct skcipher_request *req; in derived_key_decrypt() local 574 ret = PTR_ERR(req); in derived_key_decrypt() 575 if (IS_ERR(req)) in derived_key_decrypt() [all …]
|
| /security/keys/trusted-keys/ |
| A D | trusted_dcp.c | 79 struct skcipher_request *req = NULL; in do_dcp_crypto() local 99 req = skcipher_request_alloc(tfm, GFP_NOFS); in do_dcp_crypto() 100 if (!req) { in do_dcp_crypto() 105 skcipher_request_set_callback(req, CRYPTO_TFM_REQ_MAY_BACKLOG | in do_dcp_crypto() 114 skcipher_request_set_crypt(req, &src_sg, &dst_sg, AES_KEYSIZE_128, in do_dcp_crypto() 118 res = crypto_wait_req(crypto_skcipher_encrypt(req), &wait); in do_dcp_crypto() 120 res = crypto_wait_req(crypto_skcipher_decrypt(req), &wait); in do_dcp_crypto() 123 skcipher_request_free(req); in do_dcp_crypto()
|
| /security/selinux/include/ |
| A D | netlabel.h | 40 int selinux_netlbl_inet_conn_request(struct request_sock *req, u16 family); 96 static inline int selinux_netlbl_inet_conn_request(struct request_sock *req, in selinux_netlbl_inet_conn_request() argument
|
| /security/selinux/ |
| A D | netlabel.c | 330 int selinux_netlbl_inet_conn_request(struct request_sock *req, u16 family) in selinux_netlbl_inet_conn_request() argument 339 rc = security_netlbl_sid_to_secattr(req->secid, &secattr); in selinux_netlbl_inet_conn_request() 342 rc = netlbl_req_setattr(req, &secattr); in selinux_netlbl_inet_conn_request()
|
| A D | selinuxfs.c | 733 char *req = NULL; in sel_write_validatetrans() local 752 req = memdup_user_nul(buf, count); in sel_write_validatetrans() 753 if (IS_ERR(req)) { in sel_write_validatetrans() 754 rc = PTR_ERR(req); in sel_write_validatetrans() 755 req = NULL; in sel_write_validatetrans() 773 if (sscanf(req, "%s %s %hu %s", oldcon, newcon, &tclass, taskcon) != 4) in sel_write_validatetrans() 792 kfree(req); in sel_write_validatetrans()
|
| A D | hooks.c | 5680 struct request_sock *req) in selinux_inet_conn_request() argument 5684 u16 family = req->rsk_ops->family; in selinux_inet_conn_request() 5694 req->secid = connsid; in selinux_inet_conn_request() 5695 req->peer_secid = peersid; in selinux_inet_conn_request() 5697 return selinux_netlbl_inet_conn_request(req, family); in selinux_inet_conn_request() 5701 const struct request_sock *req) in selinux_inet_csk_clone() argument 5705 newsksec->sid = req->secid; in selinux_inet_csk_clone() 5706 newsksec->peer_sid = req->peer_secid; in selinux_inet_csk_clone() 5714 selinux_netlbl_inet_csk_clone(newsk, req->rsk_ops->family); in selinux_inet_csk_clone() 5745 static void selinux_req_classify_flow(const struct request_sock *req, in selinux_req_classify_flow() argument [all …]
|
| /security/ |
| A D | security.c | 4941 void security_req_classify_flow(const struct request_sock *req, in security_req_classify_flow() argument 4944 call_void_hook(req_classify_flow, req, flic); in security_req_classify_flow() 4973 struct sk_buff *skb, struct request_sock *req) in security_inet_conn_request() argument 4975 return call_int_hook(inet_conn_request, sk, skb, req); in security_inet_conn_request() 4987 const struct request_sock *req) in security_inet_csk_clone() argument 4989 call_void_hook(inet_csk_clone, newsk, req); in security_inet_csk_clone()
|
| /security/smack/ |
| A D | smack_lsm.c | 4356 struct request_sock *req) in smack_inet_conn_request() argument 4415 req->peer_secid = skp->smk_secid; in smack_inet_conn_request() 4429 rc = netlbl_req_setattr(req, &ssp->smk_out->smk_netlabel); in smack_inet_conn_request() 4431 netlbl_req_delattr(req); in smack_inet_conn_request() 4444 const struct request_sock *req) in smack_inet_csk_clone() argument 4449 if (req->peer_secid != 0) { in smack_inet_csk_clone() 4450 skp = smack_from_secid(req->peer_secid); in smack_inet_csk_clone()
|
| /security/apparmor/ |
| A D | lsm.c | 1639 struct request_sock *req) in apparmor_inet_conn_request() argument
|