Searched refs:secdata (Results 1 – 3 of 3) sorted by relevance
/security/ |
D | security.c | 1288 int security_secid_to_secctx(u32 secid, char **secdata, u32 *seclen) in security_secid_to_secctx() argument 1290 return call_int_hook(secid_to_secctx, -EOPNOTSUPP, secid, secdata, in security_secid_to_secctx() 1295 int security_secctx_to_secid(const char *secdata, u32 seclen, u32 *secid) in security_secctx_to_secid() argument 1298 return call_int_hook(secctx_to_secid, 0, secdata, seclen, secid); in security_secctx_to_secid() 1302 void security_release_secctx(char *secdata, u32 seclen) in security_release_secctx() argument 1304 call_void_hook(release_secctx, secdata, seclen); in security_release_secctx()
|
/security/selinux/ |
D | hooks.c | 2775 char *secdata, **mount_options; in selinux_sb_remount() local 2788 secdata = alloc_secdata(); in selinux_sb_remount() 2789 if (!secdata) in selinux_sb_remount() 2791 rc = selinux_sb_copy_data(data, secdata); in selinux_sb_remount() 2795 rc = selinux_parse_opts_str(secdata, &opts); in selinux_sb_remount() 2845 free_secdata(secdata); in selinux_sb_remount() 6120 static int selinux_secid_to_secctx(u32 secid, char **secdata, u32 *seclen) in selinux_secid_to_secctx() argument 6122 return security_sid_to_context(secid, secdata, seclen); in selinux_secid_to_secctx() 6125 static int selinux_secctx_to_secid(const char *secdata, u32 seclen, u32 *secid) in selinux_secctx_to_secid() argument 6127 return security_context_to_sid(secdata, seclen, secid, GFP_KERNEL); in selinux_secctx_to_secid() [all …]
|
/security/smack/ |
D | smack_lsm.c | 4561 static int smack_secid_to_secctx(u32 secid, char **secdata, u32 *seclen) in smack_secid_to_secctx() argument 4565 if (secdata) in smack_secid_to_secctx() 4566 *secdata = skp->smk_known; in smack_secid_to_secctx() 4579 static int smack_secctx_to_secid(const char *secdata, u32 seclen, u32 *secid) in smack_secctx_to_secid() argument 4581 struct smack_known *skp = smk_find_entry(secdata); in smack_secctx_to_secid()
|