secdata          1693 include/linux/lsm_hooks.h 	int (*secid_to_secctx)(u32 secid, char **secdata, u32 *seclen);
secdata          1694 include/linux/lsm_hooks.h 	int (*secctx_to_secid)(const char *secdata, u32 seclen, u32 *secid);
secdata          1695 include/linux/lsm_hooks.h 	void (*release_secctx)(char *secdata, u32 seclen);
secdata           440 include/linux/security.h int security_secid_to_secctx(u32 secid, char **secdata, u32 *seclen);
secdata           441 include/linux/security.h int security_secctx_to_secid(const char *secdata, u32 seclen, u32 *secid);
secdata           442 include/linux/security.h void security_release_secctx(char *secdata, u32 seclen);
secdata          1239 include/linux/security.h static inline int security_secid_to_secctx(u32 secid, char **secdata, u32 *seclen)
secdata          1244 include/linux/security.h static inline int security_secctx_to_secid(const char *secdata,
secdata          1251 include/linux/security.h static inline void security_release_secctx(char *secdata, u32 seclen)
secdata            95 include/net/scm.h 	char *secdata;
secdata           100 include/net/scm.h 		err = security_secid_to_secctx(scm->secid, &secdata, &seclen);
secdata           103 include/net/scm.h 			put_cmsg(msg, SOL_SOCKET, SCM_SECURITY, seclen, secdata);
secdata           104 include/net/scm.h 			security_release_secctx(secdata, seclen);
secdata           133 net/ipv4/ip_sockglue.c 	char *secdata;
secdata           141 net/ipv4/ip_sockglue.c 	err = security_secid_to_secctx(secid, &secdata, &seclen);
secdata           145 net/ipv4/ip_sockglue.c 	put_cmsg(msg, SOL_IP, SCM_SECURITY, seclen, secdata);
secdata           146 net/ipv4/ip_sockglue.c 	security_release_secctx(secdata, seclen);
secdata           304 net/netfilter/nfnetlink_queue.c static u32 nfqnl_get_sk_secctx(struct sk_buff *skb, char **secdata)
secdata           314 net/netfilter/nfnetlink_queue.c 		security_secid_to_secctx(skb->secmark, secdata, &seclen);
secdata           394 net/netfilter/nfnetlink_queue.c 	char *secdata = NULL;
secdata           461 net/netfilter/nfnetlink_queue.c 		seclen = nfqnl_get_sk_secctx(entskb, &secdata);
secdata           596 net/netfilter/nfnetlink_queue.c 	if (seclen && nla_put(skb, NFQA_SECCTX, seclen, secdata))
secdata           625 net/netfilter/nfnetlink_queue.c 		security_release_secctx(secdata, seclen);
secdata           634 net/netfilter/nfnetlink_queue.c 		security_release_secctx(secdata, seclen);
secdata            25 security/apparmor/include/secid.h int apparmor_secid_to_secctx(u32 secid, char **secdata, u32 *seclen);
secdata            26 security/apparmor/include/secid.h int apparmor_secctx_to_secid(const char *secdata, u32 seclen, u32 *secid);
secdata            27 security/apparmor/include/secid.h void apparmor_release_secctx(char *secdata, u32 seclen);
secdata            70 security/apparmor/secid.c int apparmor_secid_to_secctx(u32 secid, char **secdata, u32 *seclen)
secdata            81 security/apparmor/secid.c 	if (secdata)
secdata            82 security/apparmor/secid.c 		len = aa_label_asxprint(secdata, root_ns, label,
secdata            98 security/apparmor/secid.c int apparmor_secctx_to_secid(const char *secdata, u32 seclen, u32 *secid)
secdata           102 security/apparmor/secid.c 	label = aa_label_strn_parse(&root_ns->unconfined->label, secdata,
secdata           111 security/apparmor/secid.c void apparmor_release_secctx(char *secdata, u32 seclen)
secdata           113 security/apparmor/secid.c 	kfree(secdata);
secdata          1915 security/security.c int security_secid_to_secctx(u32 secid, char **secdata, u32 *seclen)
secdata          1917 security/security.c 	return call_int_hook(secid_to_secctx, -EOPNOTSUPP, secid, secdata,
secdata          1922 security/security.c int security_secctx_to_secid(const char *secdata, u32 seclen, u32 *secid)
secdata          1925 security/security.c 	return call_int_hook(secctx_to_secid, 0, secdata, seclen, secid);
secdata          1929 security/security.c void security_release_secctx(char *secdata, u32 seclen)
secdata          1931 security/security.c 	call_void_hook(release_secctx, secdata, seclen);
secdata          6492 security/selinux/hooks.c static int selinux_secid_to_secctx(u32 secid, char **secdata, u32 *seclen)
secdata          6495 security/selinux/hooks.c 				       secdata, seclen);
secdata          6498 security/selinux/hooks.c static int selinux_secctx_to_secid(const char *secdata, u32 seclen, u32 *secid)
secdata          6500 security/selinux/hooks.c 	return security_context_to_sid(&selinux_state, secdata, seclen,
secdata          6504 security/selinux/hooks.c static void selinux_release_secctx(char *secdata, u32 seclen)
secdata          6506 security/selinux/hooks.c 	kfree(secdata);
secdata          4445 security/smack/smack_lsm.c static int smack_secid_to_secctx(u32 secid, char **secdata, u32 *seclen)
secdata          4449 security/smack/smack_lsm.c 	if (secdata)
secdata          4450 security/smack/smack_lsm.c 		*secdata = skp->smk_known;
secdata          4463 security/smack/smack_lsm.c static int smack_secctx_to_secid(const char *secdata, u32 seclen, u32 *secid)
secdata          4465 security/smack/smack_lsm.c 	struct smack_known *skp = smk_find_entry(secdata);