seclen            162 drivers/media/dvb-core/dvb_demux.c 	return feed->cb.sec(feed->feed.sec.secbuf, feed->feed.sec.seclen,
seclen            182 drivers/media/dvb-core/dvb_demux.c 		    demux->check_crc32(feed, sec->secbuf, sec->seclen)) {
seclen            193 drivers/media/dvb-core/dvb_demux.c 	sec->seclen = 0;
seclen            219 drivers/media/dvb-core/dvb_demux.c 	sec->tsfeedp = sec->secbufp = sec->seclen = 0;
seclen            246 drivers/media/dvb-core/dvb_demux.c 	u16 limit, seclen, n;
seclen            276 drivers/media/dvb-core/dvb_demux.c 		seclen = section_length(sec->secbuf);
seclen            277 drivers/media/dvb-core/dvb_demux.c 		if (seclen <= 0 || seclen > DMX_MAX_SECTION_SIZE
seclen            278 drivers/media/dvb-core/dvb_demux.c 		    || seclen + sec->secbufp > limit)
seclen            280 drivers/media/dvb-core/dvb_demux.c 		sec->seclen = seclen;
seclen            290 drivers/media/dvb-core/dvb_demux.c 		sec->secbufp += seclen;	/* secbufp and secbuf moving together is */
seclen            291 drivers/media/dvb-core/dvb_demux.c 		sec->secbuf += seclen;	/* redundant but saves pointer arithmetic */
seclen            402 drivers/media/dvb-core/dvb_demux.c 			feed->feed.sec.seclen = feed->feed.sec.secbufp = 0;
seclen            973 drivers/media/dvb-core/dvb_demux.c 	dvbdmxfeed->feed.sec.seclen = 0;
seclen           1080 drivers/media/dvb-core/dvb_demux.c 	dvbdmxfeed->feed.sec.secbufp = dvbdmxfeed->feed.sec.seclen = 0;
seclen           1693 include/linux/lsm_hooks.h 	int (*secid_to_secctx)(u32 secid, char **secdata, u32 *seclen);
seclen           1694 include/linux/lsm_hooks.h 	int (*secctx_to_secid)(const char *secdata, u32 seclen, u32 *secid);
seclen           1695 include/linux/lsm_hooks.h 	void (*release_secctx)(char *secdata, u32 seclen);
seclen            440 include/linux/security.h int security_secid_to_secctx(u32 secid, char **secdata, u32 *seclen);
seclen            441 include/linux/security.h int security_secctx_to_secid(const char *secdata, u32 seclen, u32 *secid);
seclen            442 include/linux/security.h void security_release_secctx(char *secdata, u32 seclen);
seclen           1239 include/linux/security.h static inline int security_secid_to_secctx(u32 secid, char **secdata, u32 *seclen)
seclen           1245 include/linux/security.h 					   u32 seclen,
seclen           1251 include/linux/security.h static inline void security_release_secctx(char *secdata, u32 seclen)
seclen            175 include/media/demux.h 	u16 secbufp, seclen, tsfeedp;
seclen             96 include/net/scm.h 	u32 seclen;
seclen            100 include/net/scm.h 		err = security_secid_to_secctx(scm->secid, &secdata, &seclen);
seclen            103 include/net/scm.h 			put_cmsg(msg, SOL_SOCKET, SCM_SECURITY, seclen, secdata);
seclen            104 include/net/scm.h 			security_release_secctx(secdata, seclen);
seclen            134 net/ipv4/ip_sockglue.c 	u32 seclen, secid;
seclen            141 net/ipv4/ip_sockglue.c 	err = security_secid_to_secctx(secid, &secdata, &seclen);
seclen            145 net/ipv4/ip_sockglue.c 	put_cmsg(msg, SOL_IP, SCM_SECURITY, seclen, secdata);
seclen            146 net/ipv4/ip_sockglue.c 	security_release_secctx(secdata, seclen);
seclen            306 net/netfilter/nfnetlink_queue.c 	u32 seclen = 0;
seclen            314 net/netfilter/nfnetlink_queue.c 		security_secid_to_secctx(skb->secmark, secdata, &seclen);
seclen            318 net/netfilter/nfnetlink_queue.c 	return seclen;
seclen            395 net/netfilter/nfnetlink_queue.c 	u32 seclen = 0;
seclen            461 net/netfilter/nfnetlink_queue.c 		seclen = nfqnl_get_sk_secctx(entskb, &secdata);
seclen            462 net/netfilter/nfnetlink_queue.c 		if (seclen)
seclen            463 net/netfilter/nfnetlink_queue.c 			size += nla_total_size(seclen);
seclen            596 net/netfilter/nfnetlink_queue.c 	if (seclen && nla_put(skb, NFQA_SECCTX, seclen, secdata))
seclen            624 net/netfilter/nfnetlink_queue.c 	if (seclen)
seclen            625 net/netfilter/nfnetlink_queue.c 		security_release_secctx(secdata, seclen);
seclen            633 net/netfilter/nfnetlink_queue.c 	if (seclen)
seclen            634 net/netfilter/nfnetlink_queue.c 		security_release_secctx(secdata, seclen);
seclen            191 net/sunrpc/auth_gss/auth_gss.c 	unsigned int seclen;
seclen            231 net/sunrpc/auth_gss/auth_gss.c 	p  = simple_get_bytes(p, end, &seclen, sizeof(seclen));
seclen            234 net/sunrpc/auth_gss/auth_gss.c 	q = (const void *)((const char *)p + seclen);
seclen            239 net/sunrpc/auth_gss/auth_gss.c 	ret = gss_import_sec_context(p, seclen, gm, &ctx->gc_gss_ctx, NULL, GFP_NOFS);
seclen             25 security/apparmor/include/secid.h int apparmor_secid_to_secctx(u32 secid, char **secdata, u32 *seclen);
seclen             26 security/apparmor/include/secid.h int apparmor_secctx_to_secid(const char *secdata, u32 seclen, u32 *secid);
seclen             27 security/apparmor/include/secid.h void apparmor_release_secctx(char *secdata, u32 seclen);
seclen             70 security/apparmor/secid.c int apparmor_secid_to_secctx(u32 secid, char **secdata, u32 *seclen)
seclen             76 security/apparmor/secid.c 	AA_BUG(!seclen);
seclen             93 security/apparmor/secid.c 	*seclen = len;
seclen             98 security/apparmor/secid.c int apparmor_secctx_to_secid(const char *secdata, u32 seclen, u32 *secid)
seclen            103 security/apparmor/secid.c 				    seclen, GFP_KERNEL, false, false);
seclen            111 security/apparmor/secid.c void apparmor_release_secctx(char *secdata, u32 seclen)
seclen           1915 security/security.c int security_secid_to_secctx(u32 secid, char **secdata, u32 *seclen)
seclen           1918 security/security.c 				seclen);
seclen           1922 security/security.c int security_secctx_to_secid(const char *secdata, u32 seclen, u32 *secid)
seclen           1925 security/security.c 	return call_int_hook(secctx_to_secid, 0, secdata, seclen, secid);
seclen           1929 security/security.c void security_release_secctx(char *secdata, u32 seclen)
seclen           1931 security/security.c 	call_void_hook(release_secctx, secdata, seclen);
seclen           6492 security/selinux/hooks.c static int selinux_secid_to_secctx(u32 secid, char **secdata, u32 *seclen)
seclen           6495 security/selinux/hooks.c 				       secdata, seclen);
seclen           6498 security/selinux/hooks.c static int selinux_secctx_to_secid(const char *secdata, u32 seclen, u32 *secid)
seclen           6500 security/selinux/hooks.c 	return security_context_to_sid(&selinux_state, secdata, seclen,
seclen           6504 security/selinux/hooks.c static void selinux_release_secctx(char *secdata, u32 seclen)
seclen           4445 security/smack/smack_lsm.c static int smack_secid_to_secctx(u32 secid, char **secdata, u32 *seclen)
seclen           4451 security/smack/smack_lsm.c 	*seclen = strlen(skp->smk_known);
seclen           4463 security/smack/smack_lsm.c static int smack_secctx_to_secid(const char *secdata, u32 seclen, u32 *secid)