/linux-4.4.14/include/net/ |
D | scm.h | 93 u32 seclen; in scm_passec() local 97 err = security_secid_to_secctx(scm->secid, &secdata, &seclen); in scm_passec() 100 put_cmsg(msg, SOL_SOCKET, SCM_SECURITY, seclen, secdata); in scm_passec() 101 security_release_secctx(secdata, seclen); in scm_passec()
|
/linux-4.4.14/drivers/media/dvb-core/ |
D | dvb_demux.c | 154 return feed->cb.sec(feed->feed.sec.secbuf, feed->feed.sec.seclen, in dvb_dmx_swfilter_sectionfilter() 174 demux->check_crc32(feed, sec->secbuf, sec->seclen)) in dvb_dmx_swfilter_section_feed() 183 sec->seclen = 0; in dvb_dmx_swfilter_section_feed() 212 sec->tsfeedp = sec->secbufp = sec->seclen = 0; in dvb_dmx_swfilter_section_new() 239 u16 limit, seclen, n; in dvb_dmx_swfilter_section_copy_dump() local 270 seclen = section_length(sec->secbuf); in dvb_dmx_swfilter_section_copy_dump() 271 if (seclen <= 0 || seclen > DMX_MAX_SECTION_SIZE in dvb_dmx_swfilter_section_copy_dump() 272 || seclen + sec->secbufp > limit) in dvb_dmx_swfilter_section_copy_dump() 274 sec->seclen = seclen; in dvb_dmx_swfilter_section_copy_dump() 283 sec->secbufp += seclen; /* secbufp and secbuf moving together is */ in dvb_dmx_swfilter_section_copy_dump() [all …]
|
D | demux.h | 175 u16 secbufp, seclen, tsfeedp; member
|
/linux-4.4.14/net/netfilter/ |
D | nfnetlink_queue.c | 283 u32 seclen = 0; in nfqnl_get_sk_secctx() local 291 security_secid_to_secctx(skb->secmark, secdata, &seclen); in nfqnl_get_sk_secctx() 295 return seclen; in nfqnl_get_sk_secctx() 319 u32 seclen = 0; in nfqnl_build_packet_message() local 384 seclen = nfqnl_get_sk_secctx(entskb, &secdata); in nfqnl_build_packet_message() 385 if (seclen) in nfqnl_build_packet_message() 386 size += nla_total_size(seclen); in nfqnl_build_packet_message() 517 if (seclen && nla_put(skb, NFQA_SECCTX, seclen, secdata)) in nfqnl_build_packet_message()
|
/linux-4.4.14/include/linux/ |
D | security.h | 352 int security_secid_to_secctx(u32 secid, char **secdata, u32 *seclen); 353 int security_secctx_to_secid(const char *secdata, u32 seclen, u32 *secid); 354 void security_release_secctx(char *secdata, u32 seclen); 1080 static inline int security_secid_to_secctx(u32 secid, char **secdata, u32 *seclen) in security_secid_to_secctx() argument 1086 u32 seclen, in security_secctx_to_secid() argument 1092 static inline void security_release_secctx(char *secdata, u32 seclen) in security_release_secctx() argument
|
D | lsm_hooks.h | 1515 int (*secid_to_secctx)(u32 secid, char **secdata, u32 *seclen); 1516 int (*secctx_to_secid)(const char *secdata, u32 seclen, u32 *secid); 1517 void (*release_secctx)(char *secdata, u32 seclen);
|
/linux-4.4.14/security/ |
D | security.c | 1144 int security_secid_to_secctx(u32 secid, char **secdata, u32 *seclen) in security_secid_to_secctx() argument 1147 seclen); in security_secid_to_secctx() 1151 int security_secctx_to_secid(const char *secdata, u32 seclen, u32 *secid) in security_secctx_to_secid() argument 1154 return call_int_hook(secctx_to_secid, 0, secdata, seclen, secid); in security_secctx_to_secid() 1158 void security_release_secctx(char *secdata, u32 seclen) in security_release_secctx() argument 1160 call_void_hook(release_secctx, secdata, seclen); in security_release_secctx()
|
/linux-4.4.14/net/ipv4/ |
D | ip_sockglue.c | 117 u32 seclen, secid; in ip_cmsg_recv_security() local 124 err = security_secid_to_secctx(secid, &secdata, &seclen); in ip_cmsg_recv_security() 128 put_cmsg(msg, SOL_IP, SCM_SECURITY, seclen, secdata); in ip_cmsg_recv_security() 129 security_release_secctx(secdata, seclen); in ip_cmsg_recv_security()
|
/linux-4.4.14/net/sunrpc/auth_gss/ |
D | auth_gss.c | 213 unsigned int seclen; in gss_fill_context() local 253 p = simple_get_bytes(p, end, &seclen, sizeof(seclen)); in gss_fill_context() 256 q = (const void *)((const char *)p + seclen); in gss_fill_context() 261 ret = gss_import_sec_context(p, seclen, gm, &ctx->gc_gss_ctx, NULL, GFP_NOFS); in gss_fill_context()
|
/linux-4.4.14/security/smack/ |
D | smack_lsm.c | 4517 static int smack_secid_to_secctx(u32 secid, char **secdata, u32 *seclen) in smack_secid_to_secctx() argument 4523 *seclen = strlen(skp->smk_known); in smack_secid_to_secctx() 4535 static int smack_secctx_to_secid(const char *secdata, u32 seclen, u32 *secid) in smack_secctx_to_secid() argument 4553 static void smack_release_secctx(char *secdata, u32 seclen) in smack_release_secctx() argument
|
/linux-4.4.14/security/selinux/ |
D | hooks.c | 5750 static int selinux_secid_to_secctx(u32 secid, char **secdata, u32 *seclen) in selinux_secid_to_secctx() argument 5752 return security_sid_to_context(secid, secdata, seclen); in selinux_secid_to_secctx() 5755 static int selinux_secctx_to_secid(const char *secdata, u32 seclen, u32 *secid) in selinux_secctx_to_secid() argument 5757 return security_context_to_sid(secdata, seclen, secid, GFP_KERNEL); in selinux_secctx_to_secid() 5760 static void selinux_release_secctx(char *secdata, u32 seclen) in selinux_release_secctx() argument
|