/linux-master/security/smack/ |
H A D | smack_access.c | 56 * @subject_label: a pointer to the subject's Smack label 60 * This function looks up the subject/object pair in the 103 * smk_access - determine if a subject has a specific access to an object 104 * @subject: a pointer to the subject's Smack label entry 109 * This function looks up the subject/object pair in the 115 int smk_access(struct smack_known *subject, struct smack_known *object, argument 125 * A star subject can't access any object. 127 if (subject == &smack_known_star) { 132 * An internet object can be accessed by any subject [all...] |
H A D | smack.h | 62 * Keep the access rules for this subject label here so that 257 char *subject; member in struct:smack_audit_data
|
H A D | smackfs.c | 52 SMK_REVOKE_SUBJ = 18, /* set rules with subject label to '-' */ 204 * Looks through the current subject/object/access list for 205 * the subject/object pair and replaces the access that was 224 * than the subject label check it first 305 * @subject: subject label string 315 static int smk_fill_rule(const char *subject, const char *object, argument 324 rule->smk_subject = smk_import_entry(subject, len); 332 cp = smk_parse_smack(subject, len); 437 * "subject<whitespac [all...] |
H A D | smack_lsm.c | 1826 * For each Smack rule associated with the subject 1849 * If may is zero the SMACK64MMAP subject can't 1857 * If there isn't one a SMACK64MMAP subject 1877 * not available to a SMACK64MMAP subject 1911 * Returns 0 if a subject with the object's smack could 2655 * @subject: subject Smack label 2662 static int smk_ipv6_check(struct smack_known *subject, argument 2681 rc = smk_access(subject, object, MAY_WRITE, &ad); 2682 rc = smk_bu_note("IPv6 check", subject, objec [all...] |
/linux-master/crypto/asymmetric_keys/ |
H A D | x509_parser.h | 18 char *subject; /* Name of certificate subject */ member in struct:x509_certificate 31 const void *raw_subject; /* Raw subject name in ASN.1 */
|
H A D | x509_public_key.c | 176 pr_devel("Cert Subject: %s\n", cert->subject); 196 sulen = strlen(cert->subject); 209 p = memcpy(desc, cert->subject, sulen);
|
H A D | pkcs7_verify.c | 156 * subject's name) and the certificate serial number [RFC 2315 6.7]. 208 x509->subject, 285 pr_debug("- subject %s\n", p->subject);
|
H A D | x509_cert_parser.c | 50 kfree(cert->subject); 382 * Fabricate and save the issuer and subject names 486 return x509_fabricate_name(ctx, hdrlen, tag, &ctx->cert->subject, vlen); 500 * first and ignore third, using second one which is after subject and
|
H A D | pkcs7_parser.c | 437 pr_debug("Got cert %u for %s\n", x509->index, x509->subject);
|
/linux-master/scripts/ |
H A D | get_maintainer.pl | 576 # of a git format-patch generated file (subject tags, etc...) 2130 my $subject = ""; 2134 $subject = $1 if ($line =~ m/$VCS_cmds{"subject_pattern"}/); 2149 @{$ref}[1] eq $subject && 2157 [ ($commit, $subject, $type) ]);
|
H A D | checkpatch.pl | 1288 my $subject = $2; 1290 $git_commits{$sha1} = $subject; 3237 # Check email subject for common tools that don't need to be mentioned 3241 "A patch subject line should describe the change not the tool that found it\n" . $herecurr); 3320 # commit <SHA-1 hash length 12+ chars> ("Complete commit subject") 3321 # with the commit subject '("' prefix and '")' suffix
|
/linux-master/tools/testing/ktest/ |
H A D | ktest.pl | 4162 my ($subject, $message, $file) = @_; 4175 print HEAD "Subject: $subject\n\n"; 4199 $mail_command =~ s/\$SUBJECT/$subject/g; 4206 do_send_email($subject, $message);
|
/linux-master/drivers/gpu/drm/amd/amdkfd/ |
H A D | cwsr_trap_handler_gfx8.asm | 9 * Software is furnished to do so, subject to the following conditions:
|
H A D | cwsr_trap_handler_gfx9.asm | 9 * Software is furnished to do so, subject to the following conditions:
|
H A D | cwsr_trap_handler_gfx10.asm | 9 * Software is furnished to do so, subject to the following conditions:
|