Searched refs:SMK_LABELLEN (Results 1 - 4 of 4) sorted by relevance

/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/security/smack/
H A Dsmack.h32 #define SMK_LABELLEN (SMK_MAXLEN+1) macro
46 char smk_packet[SMK_LABELLEN]; /* TCP peer label */
76 char smk_catset[SMK_LABELLEN];
112 char smk_known[SMK_LABELLEN];
230 if (cat > SMK_LABELLEN * 8)
H A Dsmackfs.c103 #define SMK_CIPSOMIN (SMK_LABELLEN + 2 * SMK_DIGITLEN)
114 #define SMK_LOADLEN (SMK_LABELLEN + SMK_LABELLEN + SMK_ACCESSLEN)
255 * char subject[SMK_LABELLEN]
256 * char object[SMK_LABELLEN]
259 * writes must be SMK_LABELLEN+SMK_LABELLEN+SMK_ACCESSLEN bytes.
298 rule->smk_object = smk_import(data + SMK_LABELLEN, 0);
304 switch (data[SMK_LABELLEN + SMK_LABELLEN]) {
[all...]
H A Dsmack_access.c313 char smack[SMK_LABELLEN];
320 for (i = 0, found = 0; i < SMK_LABELLEN; i++) {
464 memcmp(kp->smk_cipso->smk_catset, cp, SMK_LABELLEN) == 0)
H A Dsmack_lsm.c49 char in[SMK_LABELLEN];
54 rc = ip->i_op->getxattr(dp, XATTR_NAME_SMACK, in, SMK_LABELLEN);
678 if (size == 0 || size >= SMK_LABELLEN ||
1505 for (cat = 1, cp = catset, byte = 0; byte < SMK_LABELLEN; cp++, byte++)
1647 if (value == NULL || size > SMK_LABELLEN || size == 0)
2390 if (value == NULL || size == 0 || size >= SMK_LABELLEN)
2489 char smack[SMK_LABELLEN];
2504 memset(smack, '\0', SMK_LABELLEN);
2564 char smack[SMK_LABELLEN];
2649 char smack[SMK_LABELLEN];
[all...]

Completed in 70 milliseconds