Home
last modified time | relevance | path

Searched refs:subject (Results 1 – 25 of 521) sorted by relevance

12345678910>>...21

/linux/security/smack/
H A Dsmack_access.c115 int smk_access(struct smack_known *subject, struct smack_known *object, in smk_access() argument
127 if (subject == &smack_known_star) { in smk_access()
136 if (object == &smack_known_web || subject == &smack_known_web) in smk_access()
147 if (subject->smk_known == object->smk_known) in smk_access()
157 if (subject == &smack_known_hat) in smk_access()
168 may = smk_access_entry(subject->smk_known, object->smk_known, in smk_access()
169 &subject->smk_rules); in smk_access()
192 if (subject == smack_unconfined) in smk_access()
199 smack_log(subject->smk_known, object->smk_known, in smk_access()
319 audit_log_untrustedstring(ab, sad->subject); in smack_log_callback()
[all …]
/linux/crypto/asymmetric_keys/
H A Dx509_public_key.c175 pr_devel("Cert Subject: %s\n", cert->subject); in x509_key_preparse()
194 sulen = strlen(cert->subject); in x509_key_preparse()
206 p = memcpy(desc, cert->subject, sulen); in x509_key_preparse()
H A Dx509_parser.h19 char *subject; /* Name of certificate subject */ member
H A Dx509.asn120 subject Name ({ x509_note_subject }),
H A Dpkcs7_verify.c208 x509->subject, in pkcs7_verify_sig_chain()
285 pr_debug("- subject %s\n", p->subject); in pkcs7_verify_sig_chain()
/linux/Documentation/admin-guide/LSM/
H A DSmack.rst134 This interface reports whether a subject with the specified
142 This interface reports whether a subject with the specified
305 revoke-subject
307 rules with that subject label.
334 kind of access permitted a subject with subjectlabel on an
399 A subject is an active entity on the computer system.
408 Any attempt by a subject to put information into or get
413 characteristics of a subject or an object.
436 each of the subject and the object.
471 A signal is a write operation from the subject task to
[all …]
/linux/
H A DCOPYING20 All contributions to the Linux Kernel are subject to this COPYING file.
/linux/Documentation/networking/
H A Dax25.rst15 of the message, the subject field is ignored. You don't need to be
/linux/Documentation/devicetree/bindings/
H A Dsubmitting-patches.rst14 be a separate patch. The preferred subject prefix for binding patches is::
23 The 80 characters of the subject are precious. It is recommended to not
/linux/Documentation/security/
H A Dcredentials.rst52 A subject is an object that is acting upon another object.
65 A subject has an additional interpretation of its credentials. A subset
68 subject acts.
77 Linux has a number of actions available that a subject may perform upon an
78 object. The set of actions available depends on the nature of the subject
86 When a subject acts upon an object, a security calculation is made. This
88 action, and searching one or more sets of rules to see whether the subject
101 is an abbreviated ACL with three fixed classes of subject ('user',
118 subject label, the object label and the action and look for a rule
/linux/LICENSES/deprecated/
H A DZlib19 commercial applications, and to alter it and redistribute it freely, subject
/linux/arch/arm/boot/dts/arm/
H A Darm-realview-eb-a9mp-bbrevd.dts9 * furnished to do so, subject to the following conditions:
H A Darm-realview-eb-bbrevd.dts9 * furnished to do so, subject to the following conditions:
H A Darm-realview-eb-11mp-bbrevd.dts9 * furnished to do so, subject to the following conditions:
/linux/drivers/gpu/drm/nouveau/nvkm/engine/gr/fuc/
H A Dgpcgm107.fuc59 * Software is furnished to do so, subject to the following conditions:
H A Dhubgf100.fuc39 * Software is furnished to do so, subject to the following conditions:
H A Dhubgf117.fuc39 * Software is furnished to do so, subject to the following conditions:
H A Dhubgk104.fuc39 * Software is furnished to do so, subject to the following conditions:
H A Dhubgm107.fuc59 * Software is furnished to do so, subject to the following conditions:
H A Dhubgk110.fuc39 * Software is furnished to do so, subject to the following conditions:
H A Dhubgk208.fuc59 * Software is furnished to do so, subject to the following conditions:
H A Dgpcgf100.fuc39 * Software is furnished to do so, subject to the following conditions:
H A Dgpcgf117.fuc39 * Software is furnished to do so, subject to the following conditions:
H A Dgpcgk104.fuc39 * Software is furnished to do so, subject to the following conditions:
H A Dgpcgk110.fuc39 * Software is furnished to do so, subject to the following conditions:

12345678910>>...21