/systemd/src/network/ |
H A D | networkd-address.h | 45 char *label; member in struct:Address
|
H A D | networkd-address.c | 486 if (original->label) { 487 na->label = strdup(original->label); 488 if (!na->label) 569 if (address->label) { 570 r = sd_netlink_message_append_string(req, IFA_LABEL, address->label); 742 char *label; local 755 label = strdup(rvalue); 756 if (!label) 759 if (!ascii_is_valid(label) || strle [all...] |
/systemd/src/basic/ |
H A D | smack-util.c | 59 int mac_smack_read(const char *path, SmackAttr attr, char **label) { argument 62 assert(label); 67 return getxattr_malloc(path, smack_attr_to_string(attr), label, true); 70 int mac_smack_read_fd(int fd, SmackAttr attr, char **label) { argument 73 assert(label); 78 return fgetxattr_malloc(fd, smack_attr_to_string(attr), label); 81 int mac_smack_apply(const char *path, SmackAttr attr, const char *label) { argument 90 if (label) 91 r = lsetxattr(path, smack_attr_to_string(attr), label, strlen(label), 100 mac_smack_apply_fd(int fd, SmackAttr attr, const char *label) argument 119 mac_smack_apply_pid(pid_t pid, const char *label) argument 153 const char *label; local 193 _cleanup_free_ char *label = NULL; local 214 mac_smack_read(const char *path, SmackAttr attr, char **label) argument 218 mac_smack_read_fd(int fd, SmackAttr attr, char **label) argument 222 mac_smack_apply(const char *path, SmackAttr attr, const char *label) argument 226 mac_smack_apply_fd(int fd, SmackAttr attr, const char *label) argument 230 mac_smack_apply_pid(pid_t pid, const char *label) argument [all...] |
H A D | socket-label.c | 50 const char *label) { 64 if (label) { 65 r = mac_selinux_create_socket_prepare(label); 73 if (label) 39 socket_address_listen( const SocketAddress *a, int flags, int backlog, SocketAddressBindIPv6Only only, const char *bind_to_device, bool reuse_port, bool free_bind, bool transparent, mode_t directory_mode, mode_t socket_mode, const char *label) argument
|
H A D | selinux-util.c | 31 #include <selinux/label.h> 158 /* If there's no label to set, then exit without warning */ 188 int mac_selinux_apply(const char *path, const char *label) { argument 195 assert(label); 197 if (setfilecon(path, (security_context_t) label) < 0) { 198 log_enforcing("Failed to set SELinux security context %s on path %s: %m", label, path); 206 int mac_selinux_get_create_label_from_exe(const char *exe, char **label) { argument 214 assert(label); 228 r = security_compute_create(mycon, fcon, sclass, (security_context_t *) label); 236 int mac_selinux_get_our_label(char **label) { argument 253 mac_selinux_get_child_mls_label(int socket_fd, const char *exe, const char *exec_label, char **label) argument 315 mac_selinux_free(char *label) argument 386 mac_selinux_create_socket_prepare(const char *label) argument [all...] |
/systemd/src/journal/ |
H A D | test-compress-benchmark.c | 87 static void test_compress_decompress(const char* label, const char* type, argument 126 log_error("%s \"compressed\" %zu -> %zu", label, size, j); 147 label, type, total, dt,
|
H A D | journald-native.c | 87 const char *label, size_t label_len) { 122 server_dispatch_message(s, iovec, n, m, ucred, tv, label, label_len, NULL, priority, object_pid); 293 server_dispatch_message(s, iovec, n, m, ucred, tv, label, label_len, NULL, priority, object_pid); 315 const char *label, size_t label_len) { 397 server_process_native_message(s, p, st.st_size, ucred, tv, label, label_len); 446 server_process_native_message(s, p, n, ucred, tv, label, label_len); 82 server_process_native_message( Server *s, const void *buffer, size_t buffer_size, const struct ucred *ucred, const struct timeval *tv, const char *label, size_t label_len) argument 310 server_process_native_file( Server *s, int fd, const struct ucred *ucred, const struct timeval *tv, const char *label, size_t label_len) argument
|
H A D | journald-syslog.c | 323 const char *label, 382 server_dispatch_message(s, iovec, n, ELEMENTSOF(iovec), ucred, tv, label, label_len, NULL, priority, 0); 318 server_process_syslog_message( Server *s, const char *buf, const struct ucred *ucred, const struct timeval *tv, const char *label, size_t label_len) argument
|
H A D | journald-stream.c | 70 char *label; member in struct:StdoutStream 112 free(s->label); 280 label_len = s->label ? strlen(s->label) : 0; 281 server_dispatch_message(s->server, iovec, n, ELEMENTSOF(iovec), &s->ucred, NULL, s->label, label_len, s->unit_id, priority, 0); 495 r = getpeersec(fd, &stream->label);
|
H A D | journald-server.c | 577 const char *label, size_t label_len, 719 if (label) { 722 *((char*) mempcpy(stpcpy(x, "_SELINUX_CONTEXT="), label, label_len)) = 0; 915 const char *label, size_t label_len, 974 dispatch_message_real(s, iovec, n, m, ucred, tv, label, label_len, unit_id, priority, object_pid); 1157 char *label = NULL; local 1167 /* We use NAME_MAX space for the SELinux label 1177 CMSG_SPACE(NAME_MAX)]; /* selinux label */ 1231 label = (char*) CMSG_DATA(cmsg); 1249 server_process_syslog_message(s, strstrip(s->buffer), ucred, tv, label, label_le 572 dispatch_message_real( Server *s, struct iovec *iovec, unsigned n, unsigned m, const struct ucred *ucred, const struct timeval *tv, const char *label, size_t label_len, const char *unit_id, int priority, pid_t object_pid) argument 910 server_dispatch_message( Server *s, struct iovec *iovec, unsigned n, unsigned m, const struct ucred *ucred, const struct timeval *tv, const char *label, size_t label_len, const char *unit_id, int priority, pid_t object_pid) argument [all...] |
/systemd/src/libsystemd/sd-bus/ |
H A D | test-bus-chat.c | 133 const char *label = NULL; local 155 sd_bus_creds_get_selinux_context(sd_bus_message_get_creds(m), &label); local 156 log_info("Got message! member=%s pid="PID_FMT" label=%s", 159 strna(label));
|
H A D | bus-creds.h | 71 char *label; member in struct:sd_bus_creds
|
H A D | bus-internal.h | 263 char *label; member in struct:sd_bus
|
H A D | sd-bus.c | 35 #include "bus-label.h" 136 free(b->label); 3478 char *label; local 3486 label = bus_label_escape(arg); 3487 if (!label) { 3492 r = strv_consume(&labels, label); 3498 /* add label length, but account for the format character */ 3499 path_length += strlen(label) - 1; 3538 * substring of a label in the given path. At most one such 3539 * directive is allowed per label 3560 char *label; local [all...] |
/systemd/src/libsystemd/sd-netlink/ |
H A D | test-netlink.c | 128 const char *label; local 137 assert_se(sd_netlink_message_read_string(r, IFA_LABEL, &label) == 0);
|
/systemd/src/libsystemd-network/ |
H A D | dhcp6-option.c | 363 const char *label; local 365 /* Literal label */ 366 label = (const char *)&optval[pos]; 381 r = dns_label_escape(label, c, ret + n, DNS_LABEL_ESCAPED_MAX);
|
/systemd/src/udev/ |
H A D | udev-node.c | 294 /* apply SECLABEL{$module}=$label */ 296 const char *name, *label; local 300 label = udev_list_entry_get_value(entry); 305 r = mac_selinux_apply(devnode, label); 307 log_error_errno(r, "SECLABEL: failed to set SELinux label '%s': %m", label); 309 log_debug("SECLABEL: set SELinux label '%s'", label); 314 r = mac_smack_apply(devnode, SMACK_ATTR_ACCESS, label); 316 log_error_errno(r, "SECLABEL: failed to set SMACK label ' [all...] |
/systemd/src/core/ |
H A D | device.c | 230 const char *label; local 232 /* Try to concatenate the device model string with a label, if there is one */ 233 label = udev_device_get_property_value(dev, "ID_FS_LABEL"); 234 if (!label) 235 label = udev_device_get_property_value(dev, "ID_PART_ENTRY_NAME"); 236 if (!label) 237 label = udev_device_get_property_value(dev, "ID_PART_ENTRY_NUMBER"); 239 if (label) { 242 j = strjoin(model, " ", label, NULL); 415 * same /dev/disk/by-label/xx [all...] |
H A D | dbus-unit.c | 1152 _cleanup_free_ char *label = NULL; local 1158 label = strjoin(name, "-", other, NULL); 1159 if (!label) 1162 unit_write_drop_in_format(u, mode, label, "[Unit]\n%s=%s\n", name, other);
|
/systemd/src/cryptsetup/ |
H A D | cryptsetup.c | 297 static char *disk_mount_point(const char *label) { argument 304 if (asprintf(&device, "/dev/mapper/%s", label) < 0)
|
/systemd/src/resolve/ |
H A D | resolved-manager.c | 28 #include "fileio-label.h" 326 char label[DNS_LABEL_MAX]; local 333 /* Extract and normalize the first label of the locally 341 r = dns_label_unescape(&p, label, sizeof(label)); 345 log_error("Couldn't find a single label in hosntame."); 349 k = dns_label_undo_idna(label, r, label, sizeof(label)); 355 if (!utf8_is_valid(label)) { [all...] |
H A D | resolved-dns-dnssec.c | 115 /* Not even a single label: this is the root domain name */ 700 /* If we stripped a single label, then let's see if that maybe was "*". If so, we are not really 772 /* Hash the source of synthesis. If this is a wildcard, then prefix it with the *. label */ 1264 /* Ignore NSEC3 RRs that are located anywhere else than one label below the zone */ 1384 /* Strip one label from the front */ 1435 /* Strip one label from the front */ 1607 char label[DNS_LABEL_MAX]; local 1620 r = dns_label_unescape(&n, label, sizeof(label)); 1623 if (r != 1 || label[ [all...] |
H A D | resolved-dns-packet.c | 444 /* Append a label to a packet. Optionally, does this in DNSSEC 445 * canonical form, if this label is marked as a candidate for 498 char label[DNS_LABEL_MAX]; local 515 r = dns_label_unescape(&name, label, sizeof(label)); 519 r = dns_packet_append_label(p, label, r, canonical_candidate, &n); 1341 const char *label; local 1343 /* Literal label */ 1344 r = dns_packet_read(p, c, (const void**) &label, NULL); 1358 r = dns_label_escape(label, [all...] |
/systemd/src/shared/ |
H A D | dns-domain.c | 130 /* Empty label that is not at the end? */ 141 /* @label_terminal: terminal character of a label, updated to point to the terminal character of 142 * the previous label (always skipping one dot) or to NULL if there are no more 169 /* Point name to the last label, and terminal to the preceding terminal symbol (or make it a NULL pointer) */ 172 /* Reached the first label, so indicate that there are no more */ 177 /* Find the start of the last label */ 211 * zero-length label does not exist. See RFC 2182, Section 309 /* Converts an U-label into an A-label */ 334 /* Verify that the the result is not longer than one DNS label 419 char label[DNS_LABEL_MAX]; local 495 char label[DNS_LABEL_MAX+1]; local 761 char label[DNS_LABEL_MAX+1]; local 797 char label[DNS_LABEL_MAX+1]; local 904 srv_type_label_is_valid(const char *label, size_t n) argument 940 char label[DNS_LABEL_MAX]; local 1014 dns_service_name_label_is_valid(const char *label, size_t n) argument 1282 char label[DNS_LABEL_MAX]; local [all...] |
/systemd/src/test/ |
H A D | test-dns-domain.c | 115 const char *label; local 118 label = what + strlen(what); 120 r = dns_label_unescape_suffix(what, &label, buffer, buffer_sz); 125 r = dns_label_unescape_suffix(what, &label, buffer, buffer_sz); 385 /* label of 64 chars length */ 388 /* label of 63 chars length */
|