Searched refs:subject (Results 1 - 15 of 15) sorted by relevance

/linux-master/security/smack/
H A Dsmack_access.c56 * @subject_label: a pointer to the subject's Smack label
60 * This function looks up the subject/object pair in the
103 * smk_access - determine if a subject has a specific access to an object
104 * @subject: a pointer to the subject's Smack label entry
109 * This function looks up the subject/object pair in the
115 int smk_access(struct smack_known *subject, struct smack_known *object, argument
125 * A star subject can't access any object.
127 if (subject == &smack_known_star) {
132 * An internet object can be accessed by any subject
[all...]
H A Dsmack.h62 * Keep the access rules for this subject label here so that
257 char *subject; member in struct:smack_audit_data
H A Dsmackfs.c52 SMK_REVOKE_SUBJ = 18, /* set rules with subject label to '-' */
204 * Looks through the current subject/object/access list for
205 * the subject/object pair and replaces the access that was
224 * than the subject label check it first
305 * @subject: subject label string
315 static int smk_fill_rule(const char *subject, const char *object, argument
324 rule->smk_subject = smk_import_entry(subject, len);
332 cp = smk_parse_smack(subject, len);
437 * "subject<whitespac
[all...]
H A Dsmack_lsm.c1826 * For each Smack rule associated with the subject
1849 * If may is zero the SMACK64MMAP subject can't
1857 * If there isn't one a SMACK64MMAP subject
1877 * not available to a SMACK64MMAP subject
1911 * Returns 0 if a subject with the object's smack could
2655 * @subject: subject Smack label
2662 static int smk_ipv6_check(struct smack_known *subject, argument
2681 rc = smk_access(subject, object, MAY_WRITE, &ad);
2682 rc = smk_bu_note("IPv6 check", subject, objec
[all...]
/linux-master/crypto/asymmetric_keys/
H A Dx509_parser.h18 char *subject; /* Name of certificate subject */ member in struct:x509_certificate
31 const void *raw_subject; /* Raw subject name in ASN.1 */
H A Dx509_public_key.c176 pr_devel("Cert Subject: %s\n", cert->subject);
196 sulen = strlen(cert->subject);
209 p = memcpy(desc, cert->subject, sulen);
H A Dpkcs7_verify.c156 * subject's name) and the certificate serial number [RFC 2315 6.7].
208 x509->subject,
285 pr_debug("- subject %s\n", p->subject);
H A Dx509_cert_parser.c50 kfree(cert->subject);
382 * Fabricate and save the issuer and subject names
486 return x509_fabricate_name(ctx, hdrlen, tag, &ctx->cert->subject, vlen);
500 * first and ignore third, using second one which is after subject and
H A Dpkcs7_parser.c437 pr_debug("Got cert %u for %s\n", x509->index, x509->subject);
/linux-master/scripts/
H A Dget_maintainer.pl576 # of a git format-patch generated file (subject tags, etc...)
2130 my $subject = "";
2134 $subject = $1 if ($line =~ m/$VCS_cmds{"subject_pattern"}/);
2149 @{$ref}[1] eq $subject &&
2157 [ ($commit, $subject, $type) ]);
H A Dcheckpatch.pl1288 my $subject = $2;
1290 $git_commits{$sha1} = $subject;
3237 # Check email subject for common tools that don't need to be mentioned
3241 "A patch subject line should describe the change not the tool that found it\n" . $herecurr);
3320 # commit <SHA-1 hash length 12+ chars> ("Complete commit subject")
3321 # with the commit subject '("' prefix and '")' suffix
/linux-master/tools/testing/ktest/
H A Dktest.pl4162 my ($subject, $message, $file) = @_;
4175 print HEAD "Subject: $subject\n\n";
4199 $mail_command =~ s/\$SUBJECT/$subject/g;
4206 do_send_email($subject, $message);
/linux-master/drivers/gpu/drm/amd/amdkfd/
H A Dcwsr_trap_handler_gfx8.asm9 * Software is furnished to do so, subject to the following conditions:
H A Dcwsr_trap_handler_gfx9.asm9 * Software is furnished to do so, subject to the following conditions:
H A Dcwsr_trap_handler_gfx10.asm9 * Software is furnished to do so, subject to the following conditions:

Completed in 367 milliseconds