Source
199
199
.getsockopt = sock_no_getsockopt,
200
200
.mmap = sock_no_mmap,
201
201
.bind = sock_no_bind,
202
202
.accept = sock_no_accept,
203
203
.setsockopt = sock_no_setsockopt,
204
204
205
205
.release = af_alg_release,
206
206
.sendmsg = skcipher_sendmsg,
207
207
.sendpage = af_alg_sendpage,
208
208
.recvmsg = skcipher_recvmsg,
209
-
.poll_mask = af_alg_poll_mask,
209
+
.poll = af_alg_poll,
210
210
};
211
211
212
212
static int skcipher_check_key(struct socket *sock)
213
213
{
214
214
int err = 0;
215
215
struct sock *psk;
216
216
struct alg_sock *pask;
217
217
struct crypto_skcipher *tfm;
218
218
struct sock *sk = sock->sk;
219
219
struct alg_sock *ask = alg_sk(sk);
295
295
.getsockopt = sock_no_getsockopt,
296
296
.mmap = sock_no_mmap,
297
297
.bind = sock_no_bind,
298
298
.accept = sock_no_accept,
299
299
.setsockopt = sock_no_setsockopt,
300
300
301
301
.release = af_alg_release,
302
302
.sendmsg = skcipher_sendmsg_nokey,
303
303
.sendpage = skcipher_sendpage_nokey,
304
304
.recvmsg = skcipher_recvmsg_nokey,
305
-
.poll_mask = af_alg_poll_mask,
305
+
.poll = af_alg_poll,
306
306
};
307
307
308
308
static void *skcipher_bind(const char *name, u32 type, u32 mask)
309
309
{
310
310
return crypto_alloc_skcipher(name, type, mask);
311
311
}
312
312
313
313
static void skcipher_release(void *private)
314
314
{
315
315
crypto_free_skcipher(private);