Home
last modified time | relevance | path

Searched refs:secdata (Results 1 – 10 of 10) sorted by relevance

/Linux-v5.10/security/apparmor/
Dsecid.c70 int apparmor_secid_to_secctx(u32 secid, char **secdata, u32 *seclen) in apparmor_secid_to_secctx() argument
81 if (secdata) in apparmor_secid_to_secctx()
82 len = aa_label_asxprint(secdata, root_ns, label, in apparmor_secid_to_secctx()
98 int apparmor_secctx_to_secid(const char *secdata, u32 seclen, u32 *secid) in apparmor_secctx_to_secid() argument
102 label = aa_label_strn_parse(&root_ns->unconfined->label, secdata, in apparmor_secctx_to_secid()
111 void apparmor_release_secctx(char *secdata, u32 seclen) in apparmor_release_secctx() argument
113 kfree(secdata); in apparmor_release_secctx()
/Linux-v5.10/security/apparmor/include/
Dsecid.h25 int apparmor_secid_to_secctx(u32 secid, char **secdata, u32 *seclen);
26 int apparmor_secctx_to_secid(const char *secdata, u32 seclen, u32 *secid);
27 void apparmor_release_secctx(char *secdata, u32 seclen);
/Linux-v5.10/include/net/
Dscm.h95 char *secdata; in scm_passec() local
100 err = security_secid_to_secctx(scm->secid, &secdata, &seclen); in scm_passec()
103 put_cmsg(msg, SOL_SOCKET, SCM_SECURITY, seclen, secdata); in scm_passec()
104 security_release_secctx(secdata, seclen); in scm_passec()
/Linux-v5.10/net/netfilter/
Dnfnetlink_queue.c304 static u32 nfqnl_get_sk_secctx(struct sk_buff *skb, char **secdata) in nfqnl_get_sk_secctx() argument
314 security_secid_to_secctx(skb->secmark, secdata, &seclen); in nfqnl_get_sk_secctx()
394 char *secdata = NULL; in nfqnl_build_packet_message() local
461 seclen = nfqnl_get_sk_secctx(entskb, &secdata); in nfqnl_build_packet_message()
596 if (seclen && nla_put(skb, NFQA_SECCTX, seclen, secdata)) in nfqnl_build_packet_message()
625 security_release_secctx(secdata, seclen); in nfqnl_build_packet_message()
634 security_release_secctx(secdata, seclen); in nfqnl_build_packet_message()
/Linux-v5.10/include/linux/
Dsecurity.h451 int security_secid_to_secctx(u32 secid, char **secdata, u32 *seclen);
452 int security_secctx_to_secid(const char *secdata, u32 seclen, u32 *secid);
453 void security_release_secctx(char *secdata, u32 seclen);
1271 static inline int security_secid_to_secctx(u32 secid, char **secdata, u32 *seclen) in security_secid_to_secctx() argument
1276 static inline int security_secctx_to_secid(const char *secdata, in security_secctx_to_secid() argument
1283 static inline void security_release_secctx(char *secdata, u32 seclen) in security_release_secctx() argument
Dlsm_hook_defs.h251 LSM_HOOK(int, -EOPNOTSUPP, secid_to_secctx, u32 secid, char **secdata,
253 LSM_HOOK(int, 0, secctx_to_secid, const char *secdata, u32 seclen, u32 *secid)
254 LSM_HOOK(void, LSM_RET_VOID, release_secctx, char *secdata, u32 seclen)
/Linux-v5.10/security/
Dsecurity.c2014 int security_secid_to_secctx(u32 secid, char **secdata, u32 *seclen) in security_secid_to_secctx() argument
2024 rc = hp->hook.secid_to_secctx(secid, secdata, seclen); in security_secid_to_secctx()
2033 int security_secctx_to_secid(const char *secdata, u32 seclen, u32 *secid) in security_secctx_to_secid() argument
2036 return call_int_hook(secctx_to_secid, 0, secdata, seclen, secid); in security_secctx_to_secid()
2040 void security_release_secctx(char *secdata, u32 seclen) in security_release_secctx() argument
2042 call_void_hook(release_secctx, secdata, seclen); in security_release_secctx()
/Linux-v5.10/net/ipv4/
Dip_sockglue.c133 char *secdata; in ip_cmsg_recv_security() local
141 err = security_secid_to_secctx(secid, &secdata, &seclen); in ip_cmsg_recv_security()
145 put_cmsg(msg, SOL_IP, SCM_SECURITY, seclen, secdata); in ip_cmsg_recv_security()
146 security_release_secctx(secdata, seclen); in ip_cmsg_recv_security()
/Linux-v5.10/security/smack/
Dsmack_lsm.c4564 static int smack_secid_to_secctx(u32 secid, char **secdata, u32 *seclen) in smack_secid_to_secctx() argument
4568 if (secdata) in smack_secid_to_secctx()
4569 *secdata = skp->smk_known; in smack_secid_to_secctx()
4582 static int smack_secctx_to_secid(const char *secdata, u32 seclen, u32 *secid) in smack_secctx_to_secid() argument
4584 struct smack_known *skp = smk_find_entry(secdata); in smack_secctx_to_secid()
/Linux-v5.10/security/selinux/
Dhooks.c6479 static int selinux_secid_to_secctx(u32 secid, char **secdata, u32 *seclen) in selinux_secid_to_secctx() argument
6482 secdata, seclen); in selinux_secid_to_secctx()
6485 static int selinux_secctx_to_secid(const char *secdata, u32 seclen, u32 *secid) in selinux_secctx_to_secid() argument
6487 return security_context_to_sid(&selinux_state, secdata, seclen, in selinux_secctx_to_secid()
6491 static void selinux_release_secctx(char *secdata, u32 seclen) in selinux_release_secctx() argument
6493 kfree(secdata); in selinux_release_secctx()