| /OK3568_Linux_fs/kernel/security/apparmor/ |
| H A D | secid.c | 70 int apparmor_secid_to_secctx(u32 secid, char **secdata, u32 *seclen) in apparmor_secid_to_secctx() argument 76 AA_BUG(!seclen); in apparmor_secid_to_secctx() 93 *seclen = len; in apparmor_secid_to_secctx() 98 int apparmor_secctx_to_secid(const char *secdata, u32 seclen, u32 *secid) in apparmor_secctx_to_secid() argument 103 seclen, GFP_KERNEL, false, false); in apparmor_secctx_to_secid() 111 void apparmor_release_secctx(char *secdata, u32 seclen) in apparmor_release_secctx() argument
|
| /OK3568_Linux_fs/external/mpp/utils/ |
| H A D | iniparser.c | 300 int seclen ; in iniparser_dumpsection_ini() local 305 seclen = (int)strlen(s); in iniparser_dumpsection_ini() 311 if (!strncmp(d->key[j], keym, seclen + 1)) { in iniparser_dumpsection_ini() 314 d->key[j] + seclen + 1, in iniparser_dumpsection_ini() 332 int seclen, nkeys ; in iniparser_getsecnkeys() local 341 seclen = (int)strlen(s); in iniparser_getsecnkeys() 343 keym[seclen] = ':'; in iniparser_getsecnkeys() 348 if (!strncmp(d->key[j], keym, seclen + 1)) in iniparser_getsecnkeys() 374 int i, j, seclen ; in iniparser_getseckeys() local 380 seclen = (int)strlen(s); in iniparser_getseckeys() [all …]
|
| /OK3568_Linux_fs/kernel/security/apparmor/include/ |
| H A D | secid.h | 25 int apparmor_secid_to_secctx(u32 secid, char **secdata, u32 *seclen); 26 int apparmor_secctx_to_secid(const char *secdata, u32 seclen, u32 *secid); 27 void apparmor_release_secctx(char *secdata, u32 seclen);
|
| /OK3568_Linux_fs/kernel/include/net/ |
| H A D | scm.h | 96 u32 seclen; in scm_passec() local 100 err = security_secid_to_secctx(scm->secid, &secdata, &seclen); in scm_passec() 103 put_cmsg(msg, SOL_SOCKET, SCM_SECURITY, seclen, secdata); in scm_passec() 104 security_release_secctx(secdata, seclen); in scm_passec()
|
| /OK3568_Linux_fs/kernel/drivers/media/dvb-core/ |
| H A D | dvb_demux.c | 162 return feed->cb.sec(feed->feed.sec.secbuf, feed->feed.sec.seclen, in dvb_dmx_swfilter_sectionfilter() 182 demux->check_crc32(feed, sec->secbuf, sec->seclen)) { in dvb_dmx_swfilter_section_feed() 193 sec->seclen = 0; in dvb_dmx_swfilter_section_feed() 219 sec->tsfeedp = sec->secbufp = sec->seclen = 0; in dvb_dmx_swfilter_section_new() 246 u16 limit, seclen, n; in dvb_dmx_swfilter_section_copy_dump() local 276 seclen = section_length(sec->secbuf); in dvb_dmx_swfilter_section_copy_dump() 277 if (seclen <= 0 || seclen > DMX_MAX_SECTION_SIZE in dvb_dmx_swfilter_section_copy_dump() 278 || seclen + sec->secbufp > limit) in dvb_dmx_swfilter_section_copy_dump() 280 sec->seclen = seclen; in dvb_dmx_swfilter_section_copy_dump() 290 sec->secbufp += seclen; /* secbufp and secbuf moving together is */ in dvb_dmx_swfilter_section_copy_dump() [all …]
|
| /OK3568_Linux_fs/kernel/net/netfilter/ |
| H A D | nfnetlink_queue.c | 306 u32 seclen = 0; in nfqnl_get_sk_secctx() local 314 security_secid_to_secctx(skb->secmark, secdata, &seclen); in nfqnl_get_sk_secctx() 318 return seclen; in nfqnl_get_sk_secctx() 394 u32 seclen = 0; in nfqnl_build_packet_message() local 460 seclen = nfqnl_get_sk_secctx(entskb, &secdata); in nfqnl_build_packet_message() 461 if (seclen) in nfqnl_build_packet_message() 462 size += nla_total_size(seclen); in nfqnl_build_packet_message() 593 if (seclen && nla_put(skb, NFQA_SECCTX, seclen, secdata)) in nfqnl_build_packet_message() 621 if (seclen) in nfqnl_build_packet_message() 622 security_release_secctx(secdata, seclen); in nfqnl_build_packet_message() [all …]
|
| /OK3568_Linux_fs/kernel/include/linux/ |
| H A D | security.h | 455 int security_secid_to_secctx(u32 secid, char **secdata, u32 *seclen); 456 int security_secctx_to_secid(const char *secdata, u32 seclen, u32 *secid); 457 void security_release_secctx(char *secdata, u32 seclen); 1287 static inline int security_secid_to_secctx(u32 secid, char **secdata, u32 *seclen) in security_secid_to_secctx() argument 1293 u32 seclen, in security_secctx_to_secid() argument 1299 static inline void security_release_secctx(char *secdata, u32 seclen) in security_release_secctx() argument
|
| H A D | lsm_hook_defs.h | 254 u32 *seclen) 255 LSM_HOOK(int, 0, secctx_to_secid, const char *secdata, u32 seclen, u32 *secid) 256 LSM_HOOK(void, LSM_RET_VOID, release_secctx, char *secdata, u32 seclen)
|
| /OK3568_Linux_fs/kernel/include/media/ |
| H A D | demux.h | 175 u16 secbufp, seclen, tsfeedp; member
|
| /OK3568_Linux_fs/kernel/drivers/s390/crypto/ |
| H A D | zcrypt_ccamisc.h | 105 u16 seclen; /* section length */ member
|
| /OK3568_Linux_fs/kernel/security/ |
| H A D | security.c | 2002 int security_secid_to_secctx(u32 secid, char **secdata, u32 *seclen) in security_secid_to_secctx() argument 2012 rc = hp->hook.secid_to_secctx(secid, secdata, seclen); in security_secid_to_secctx() 2021 int security_secctx_to_secid(const char *secdata, u32 seclen, u32 *secid) in security_secctx_to_secid() argument 2024 return call_int_hook(secctx_to_secid, 0, secdata, seclen, secid); in security_secctx_to_secid() 2028 void security_release_secctx(char *secdata, u32 seclen) in security_release_secctx() argument 2030 call_void_hook(release_secctx, secdata, seclen); in security_release_secctx()
|
| /OK3568_Linux_fs/kernel/net/ipv4/ |
| H A D | ip_sockglue.c | 134 u32 seclen, secid; in ip_cmsg_recv_security() local 141 err = security_secid_to_secctx(secid, &secdata, &seclen); in ip_cmsg_recv_security() 145 put_cmsg(msg, SOL_IP, SCM_SECURITY, seclen, secdata); in ip_cmsg_recv_security() 146 security_release_secctx(secdata, seclen); in ip_cmsg_recv_security()
|
| /OK3568_Linux_fs/kernel/net/sunrpc/auth_gss/ |
| H A D | auth_gss.c | 163 unsigned int seclen; in gss_fill_context() local 203 p = simple_get_bytes(p, end, &seclen, sizeof(seclen)); in gss_fill_context() 206 q = (const void *)((const char *)p + seclen); in gss_fill_context() 211 ret = gss_import_sec_context(p, seclen, gm, &ctx->gc_gss_ctx, NULL, GFP_NOFS); in gss_fill_context()
|
| /OK3568_Linux_fs/buildroot/dl/rtmpdump/git/librtmp/ |
| H A D | dh.h | 188 #define MDH_compute_key(secret, seclen, pub, dh) DH_compute_key(secret, pub, dh) argument
|
| /OK3568_Linux_fs/kernel/security/selinux/ |
| H A D | hooks.c | 6557 static int selinux_secid_to_secctx(u32 secid, char **secdata, u32 *seclen) in selinux_secid_to_secctx() argument 6560 secdata, seclen); in selinux_secid_to_secctx() 6563 static int selinux_secctx_to_secid(const char *secdata, u32 seclen, u32 *secid) in selinux_secctx_to_secid() argument 6565 return security_context_to_sid(&selinux_state, secdata, seclen, in selinux_secctx_to_secid() 6569 static void selinux_release_secctx(char *secdata, u32 seclen) in selinux_release_secctx() argument
|
| /OK3568_Linux_fs/kernel/security/smack/ |
| H A D | smack_lsm.c | 4565 static int smack_secid_to_secctx(u32 secid, char **secdata, u32 *seclen) in smack_secid_to_secctx() argument 4571 *seclen = strlen(skp->smk_known); in smack_secid_to_secctx() 4583 static int smack_secctx_to_secid(const char *secdata, u32 seclen, u32 *secid) in smack_secctx_to_secid() argument
|