Searched refs:SMK_LABELLEN (Results 1 - 4 of 4) sorted by relevance
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/security/smack/ |
H A D | smack.h | 32 #define SMK_LABELLEN (SMK_MAXLEN+1) macro 46 char smk_packet[SMK_LABELLEN]; /* TCP peer label */ 76 char smk_catset[SMK_LABELLEN]; 112 char smk_known[SMK_LABELLEN]; 230 if (cat > SMK_LABELLEN * 8)
|
H A D | smackfs.c | 103 #define SMK_CIPSOMIN (SMK_LABELLEN + 2 * SMK_DIGITLEN) 114 #define SMK_LOADLEN (SMK_LABELLEN + SMK_LABELLEN + SMK_ACCESSLEN) 255 * char subject[SMK_LABELLEN] 256 * char object[SMK_LABELLEN] 259 * writes must be SMK_LABELLEN+SMK_LABELLEN+SMK_ACCESSLEN bytes. 298 rule->smk_object = smk_import(data + SMK_LABELLEN, 0); 304 switch (data[SMK_LABELLEN + SMK_LABELLEN]) { [all...] |
H A D | smack_access.c | 313 char smack[SMK_LABELLEN]; 320 for (i = 0, found = 0; i < SMK_LABELLEN; i++) { 464 memcmp(kp->smk_cipso->smk_catset, cp, SMK_LABELLEN) == 0)
|
H A D | smack_lsm.c | 49 char in[SMK_LABELLEN]; 54 rc = ip->i_op->getxattr(dp, XATTR_NAME_SMACK, in, SMK_LABELLEN); 678 if (size == 0 || size >= SMK_LABELLEN || 1505 for (cat = 1, cp = catset, byte = 0; byte < SMK_LABELLEN; cp++, byte++) 1647 if (value == NULL || size > SMK_LABELLEN || size == 0) 2390 if (value == NULL || size == 0 || size >= SMK_LABELLEN) 2489 char smack[SMK_LABELLEN]; 2504 memset(smack, '\0', SMK_LABELLEN); 2564 char smack[SMK_LABELLEN]; 2649 char smack[SMK_LABELLEN]; [all...] |
Completed in 91 milliseconds