Signed-off-by: Miloslav Trmač m...@redhat.com
---
crypto/algif_hash.c |6 ++
crypto/algif_skcipher.c |6 ++
include/crypto/if_alg.h |1 +
3 files changed, 13 insertions(+), 0 deletions(-)
diff --git a/crypto/algif_hash.c b/crypto/algif_hash.c
index f08a42c..3a61e9d
Signed-off-by: Miloslav Trmač m...@redhat.com
---
crypto/af_alg.c | 30 ++
1 files changed, 30 insertions(+), 0 deletions(-)
diff --git a/crypto/af_alg.c b/crypto/af_alg.c
index 490ae43..fc1b0f7 100644
--- a/crypto/af_alg.c
+++ b/crypto/af_alg.c
@@ -14,6 +14,7 @@
Signed-off-by: Miloslav Trmač m...@redhat.com
---
crypto/af_alg.c | 14 ++
crypto/algif_hash.c | 27 +++
crypto/algif_skcipher.c | 15 +++
include/crypto/if_alg.h |6 ++
4 files changed, 58 insertions(+), 4 deletions(-)
Hello,
attached is an user-space patch that adds support for auditing uses of the
AF_ALG protocol family developed by Herbert Xu to provide user-space access to
kernel crypto accelerators. Kernel patches will follow.
One new record is defined: AUDIT_CRYPTO_USERSPACE_OP. An audited event is
Collect audited crypto operations in a list, because a single _exit()
can cause several AF_ALG sockets to be closed, and each needs to be
audited.
Add the AUDIT_CRYPTO_OP field so that crypto operations are not audited
by default, but auditing can be enabled using a rule (probably
-F
On Tue, 2010-11-23 at 13:50 +0100, Miloslav Trmač wrote:
Collect audited crypto operations in a list, because a single _exit()
can cause several AF_ALG sockets to be closed, and each needs to be
audited.
Add the AUDIT_CRYPTO_OP field so that crypto operations are not audited
by default, but
On Tue, 2010-11-23 at 13:25 -0500, Miloslav Trmac wrote:
- Eric Paris epa...@redhat.com wrote:
On Tue, 2010-11-23 at 13:50 +0100, Miloslav Trmač wrote:
Collect audited crypto operations in a list, because a single _exit()
can cause several AF_ALG sockets to be closed, and each needs