Searched defs:req (Results 1 - 7 of 7) sorted by relevance

/security/selinux/include/
H A Dnetlabel.h56 int selinux_netlbl_inet_conn_request(struct request_sock *req, u16 family);
115 static inline int selinux_netlbl_inet_conn_request(struct request_sock *req, argument
/security/selinux/
H A Dnetlabel.c273 * @req: incoming connection request socket
276 * A new incoming connection request is represented by @req, we need to label
282 int selinux_netlbl_inet_conn_request(struct request_sock *req, u16 family) argument
291 rc = security_netlbl_sid_to_secattr(req->secid, &secattr);
294 rc = netlbl_req_setattr(req, &secattr);
H A Dhooks.c4643 struct request_sock *req)
4647 u16 family = req->rsk_ops->family;
4657 req->secid = connsid;
4658 req->peer_secid = peersid;
4660 return selinux_netlbl_inet_conn_request(req, family);
4664 const struct request_sock *req)
4668 newsksec->sid = req->secid;
4669 newsksec->peer_sid = req->peer_secid;
4677 selinux_netlbl_inet_csk_clone(newsk, req->rsk_ops->family);
4718 static void selinux_req_classify_flow(const struct request_sock *req, argument
4642 selinux_inet_conn_request(struct sock *sk, struct sk_buff *skb, struct request_sock *req) argument
4663 selinux_inet_csk_clone(struct sock *newsk, const struct request_sock *req) argument
[all...]
/security/integrity/ima/
H A Dima_crypto.c229 static void ahash_complete(struct crypto_async_request *req, int err) argument
231 struct ahash_completion *res = req->data;
264 struct ahash_request *req; local
271 req = ahash_request_alloc(tfm, GFP_KERNEL);
272 if (!req)
276 ahash_request_set_callback(req, CRYPTO_TFM_REQ_MAY_BACKLOG |
280 rc = ahash_wait(crypto_ahash_init(req), &res);
342 ahash_request_set_crypt(req, sg, NULL, rbuf_len);
344 ahash_rc = crypto_ahash_update(req);
358 ahash_request_set_crypt(req, NUL
[all...]
/security/
H A Dcapability.c716 struct request_sock *req)
722 const struct request_sock *req)
743 static void cap_req_classify_flow(const struct request_sock *req, argument
715 cap_inet_conn_request(struct sock *sk, struct sk_buff *skb, struct request_sock *req) argument
721 cap_inet_csk_clone(struct sock *newsk, const struct request_sock *req) argument
H A Dsecurity.c1275 void security_req_classify_flow(const struct request_sock *req, struct flowi *fl) argument
1277 security_ops->req_classify_flow(req, fl);
1288 struct sk_buff *skb, struct request_sock *req)
1290 return security_ops->inet_conn_request(sk, skb, req);
1295 const struct request_sock *req)
1297 security_ops->inet_csk_clone(newsk, req);
1287 security_inet_conn_request(struct sock *sk, struct sk_buff *skb, struct request_sock *req) argument
1294 security_inet_csk_clone(struct sock *newsk, const struct request_sock *req) argument
/security/smack/
H A Dsmack_lsm.c3696 * @req: unused
3702 struct request_sock *req)
3756 req->peer_secid = skp->smk_secid;
3770 rc = netlbl_req_setattr(req, &skp->smk_netlabel);
3772 netlbl_req_delattr(req);
3780 * @req: the connection's request_sock
3785 const struct request_sock *req)
3790 if (req->peer_secid != 0) {
3791 skp = smack_from_secid(req->peer_secid);
3701 smack_inet_conn_request(struct sock *sk, struct sk_buff *skb, struct request_sock *req) argument
3784 smack_inet_csk_clone(struct sock *sk, const struct request_sock *req) argument

Completed in 367 milliseconds