Searched defs:req (Results 1 - 7 of 7) sorted by relevance
/security/selinux/include/ |
H A D | netlabel.h | 56 int selinux_netlbl_inet_conn_request(struct request_sock *req, u16 family); 115 static inline int selinux_netlbl_inet_conn_request(struct request_sock *req, argument
|
/security/selinux/ |
H A D | netlabel.c | 273 * @req: incoming connection request socket 276 * A new incoming connection request is represented by @req, we need to label 282 int selinux_netlbl_inet_conn_request(struct request_sock *req, u16 family) argument 291 rc = security_netlbl_sid_to_secattr(req->secid, &secattr); 294 rc = netlbl_req_setattr(req, &secattr);
|
H A D | hooks.c | 4643 struct request_sock *req) 4647 u16 family = req->rsk_ops->family; 4657 req->secid = connsid; 4658 req->peer_secid = peersid; 4660 return selinux_netlbl_inet_conn_request(req, family); 4664 const struct request_sock *req) 4668 newsksec->sid = req->secid; 4669 newsksec->peer_sid = req->peer_secid; 4677 selinux_netlbl_inet_csk_clone(newsk, req->rsk_ops->family); 4718 static void selinux_req_classify_flow(const struct request_sock *req, argument 4642 selinux_inet_conn_request(struct sock *sk, struct sk_buff *skb, struct request_sock *req) argument 4663 selinux_inet_csk_clone(struct sock *newsk, const struct request_sock *req) argument [all...] |
/security/integrity/ima/ |
H A D | ima_crypto.c | 229 static void ahash_complete(struct crypto_async_request *req, int err) argument 231 struct ahash_completion *res = req->data; 264 struct ahash_request *req; local 271 req = ahash_request_alloc(tfm, GFP_KERNEL); 272 if (!req) 276 ahash_request_set_callback(req, CRYPTO_TFM_REQ_MAY_BACKLOG | 280 rc = ahash_wait(crypto_ahash_init(req), &res); 342 ahash_request_set_crypt(req, sg, NULL, rbuf_len); 344 ahash_rc = crypto_ahash_update(req); 358 ahash_request_set_crypt(req, NUL [all...] |
/security/ |
H A D | capability.c | 716 struct request_sock *req) 722 const struct request_sock *req) 743 static void cap_req_classify_flow(const struct request_sock *req, argument 715 cap_inet_conn_request(struct sock *sk, struct sk_buff *skb, struct request_sock *req) argument 721 cap_inet_csk_clone(struct sock *newsk, const struct request_sock *req) argument
|
H A D | security.c | 1275 void security_req_classify_flow(const struct request_sock *req, struct flowi *fl) argument 1277 security_ops->req_classify_flow(req, fl); 1288 struct sk_buff *skb, struct request_sock *req) 1290 return security_ops->inet_conn_request(sk, skb, req); 1295 const struct request_sock *req) 1297 security_ops->inet_csk_clone(newsk, req); 1287 security_inet_conn_request(struct sock *sk, struct sk_buff *skb, struct request_sock *req) argument 1294 security_inet_csk_clone(struct sock *newsk, const struct request_sock *req) argument
|
/security/smack/ |
H A D | smack_lsm.c | 3696 * @req: unused 3702 struct request_sock *req) 3756 req->peer_secid = skp->smk_secid; 3770 rc = netlbl_req_setattr(req, &skp->smk_netlabel); 3772 netlbl_req_delattr(req); 3780 * @req: the connection's request_sock 3785 const struct request_sock *req) 3790 if (req->peer_secid != 0) { 3791 skp = smack_from_secid(req->peer_secid); 3701 smack_inet_conn_request(struct sock *sk, struct sk_buff *skb, struct request_sock *req) argument 3784 smack_inet_csk_clone(struct sock *sk, const struct request_sock *req) argument
|
Completed in 367 milliseconds