Home
last modified time | relevance | path

Searched refs:subject (Results 1 - 25 of 33) sorted by relevance

12

/kernel/linux/common_modules/code_sign/
H A Dcode_sign_ioctl.c22 struct cert_source *matched_cert_search(struct rb_root *root, const char *subject, const char *issuer) in matched_cert_search() argument
28 int result = strcmp(subject, cur_cert->subject); in matched_cert_search()
50 struct cert_source *cert_chain_search(struct rb_root *root, const char *subject, const char *issuer, bool has_locked) in cert_chain_search() argument
53 return matched_cert_search(root, subject, issuer); in cert_chain_search()
56 struct cert_source *matched_cert = matched_cert_search(root, subject, issuer); in cert_chain_search()
62 struct cert_source *find_match(const char *subject, const char *issuer, bool is_dev) in find_match() argument
65 return cert_chain_search(&dev_cert_chain_tree, subject, issuer, false); in find_match()
67 return cert_chain_search(&cert_chain_tree, subject, issuer, false); in find_match()
110 int result = strcmp(cert->subject, thi in cert_chain_insert()
[all...]
H A Dverify_cert_chain.c26 * subject's name) and the certificate serial number [RFC 2315 6.7].
113 struct cert_source *source = find_match(signer->subject, signer->issuer, is_debug); in find_matched_source()
192 if (cert->subject && (strcmp(cert->subject, issuer) == 0)) { in code_sign_verify_certchain()
194 if (strcmp(cert->subject, cert->issuer) == 0) { in code_sign_verify_certchain()
207 code_sign_log_info("cert subject and issuer trusted"); in code_sign_verify_certchain()
218 code_sign_log_error("cert subject and issuer verify failed"); in code_sign_verify_certchain()
H A Dcode_sign_ioctl.h24 char *subject; member
42 struct cert_source *find_match(const char *subject, const char *issuer, bool is_dev);
/kernel/linux/linux-5.10/security/smack/
H A Dsmack_access.c56 * @subject_label: a pointer to the subject's Smack label
60 * This function looks up the subject/object pair in the
103 * smk_access - determine if a subject has a specific access to an object
104 * @subject: a pointer to the subject's Smack label entry
109 * This function looks up the subject/object pair in the
115 int smk_access(struct smack_known *subject, struct smack_known *object, in smk_access() argument
125 * A star subject can't access any object. in smk_access()
127 if (subject == &smack_known_star) { in smk_access()
132 * An internet object can be accessed by any subject in smk_access()
[all...]
H A Dsmack.h62 * Keep the access rules for this subject label here so that
266 char *subject; member
H A Dsmackfs.c51 SMK_REVOKE_SUBJ = 18, /* set rules with subject label to '-' */
203 * Looks through the current subject/object/access list for
204 * the subject/object pair and replaces the access that was
223 * than the subject label check it first in smk_set_access()
304 * @subject: subject label string
314 static int smk_fill_rule(const char *subject, const char *object, in smk_fill_rule() argument
323 rule->smk_subject = smk_import_entry(subject, len); in smk_fill_rule()
331 cp = smk_parse_smack(subject, len); in smk_fill_rule()
436 * "subject<whitespac
[all...]
H A Dsmack_lsm.c1712 * For each Smack rule associated with the subject in smack_mmap_file()
1735 * If may is zero the SMACK64MMAP subject can't in smack_mmap_file()
1743 * If there isn't one a SMACK64MMAP subject in smack_mmap_file()
1763 * not available to a SMACK64MMAP subject in smack_mmap_file()
1797 * Returns 0 if a subject with the object's smack could
2518 * @subject: subject Smack label
2525 static int smk_ipv6_check(struct smack_known *subject, in smk_ipv6_check() argument
2544 rc = smk_access(subject, object, MAY_WRITE, &ad); in smk_ipv6_check()
2545 rc = smk_bu_note("IPv6 check", subject, objec in smk_ipv6_check()
[all...]
/kernel/linux/linux-6.6/security/smack/
H A Dsmack_access.c56 * @subject_label: a pointer to the subject's Smack label
60 * This function looks up the subject/object pair in the
103 * smk_access - determine if a subject has a specific access to an object
104 * @subject: a pointer to the subject's Smack label entry
109 * This function looks up the subject/object pair in the
115 int smk_access(struct smack_known *subject, struct smack_known *object, in smk_access() argument
125 * A star subject can't access any object. in smk_access()
127 if (subject == &smack_known_star) { in smk_access()
132 * An internet object can be accessed by any subject in smk_access()
[all...]
H A Dsmack.h62 * Keep the access rules for this subject label here so that
257 char *subject; member
H A Dsmackfs.c52 SMK_REVOKE_SUBJ = 18, /* set rules with subject label to '-' */
204 * Looks through the current subject/object/access list for
205 * the subject/object pair and replaces the access that was
224 * than the subject label check it first in smk_set_access()
305 * @subject: subject label string
315 static int smk_fill_rule(const char *subject, const char *object, in smk_fill_rule() argument
324 rule->smk_subject = smk_import_entry(subject, len); in smk_fill_rule()
332 cp = smk_parse_smack(subject, len); in smk_fill_rule()
437 * "subject<whitespac
[all...]
H A Dsmack_lsm.c1817 * For each Smack rule associated with the subject in smack_mmap_file()
1840 * If may is zero the SMACK64MMAP subject can't in smack_mmap_file()
1848 * If there isn't one a SMACK64MMAP subject in smack_mmap_file()
1868 * not available to a SMACK64MMAP subject in smack_mmap_file()
1902 * Returns 0 if a subject with the object's smack could
2651 * @subject: subject Smack label
2658 static int smk_ipv6_check(struct smack_known *subject, in smk_ipv6_check() argument
2677 rc = smk_access(subject, object, MAY_WRITE, &ad); in smk_ipv6_check()
2678 rc = smk_bu_note("IPv6 check", subject, objec in smk_ipv6_check()
[all...]
/kernel/linux/linux-5.10/crypto/asymmetric_keys/
H A Dx509_public_key.c174 pr_devel("Cert Subject: %s\n", cert->subject); in x509_key_preparse()
200 sulen = strlen(cert->subject); in x509_key_preparse()
213 p = memcpy(desc, cert->subject, sulen); in x509_key_preparse()
H A Dx509_parser.h18 char *subject; /* Name of certificate subject */ member
31 const void *raw_subject; /* Raw subject name in ASN.1 */
H A Dpkcs7_verify.c157 * subject's name) and the certificate serial number [RFC 2315 6.7].
209 x509->subject, in pkcs7_verify_sig_chain()
289 pr_debug("- subject %s\n", p->subject); in pkcs7_verify_sig_chain()
H A Dx509_cert_parser.c52 kfree(cert->subject); in x509_free_certificate()
362 * Fabricate and save the issuer and subject names
456 return x509_fabricate_name(ctx, hdrlen, tag, &ctx->cert->subject, vlen); in x509_note_subject()
470 * first and ignore third, using second one which is after subject and in x509_note_params()
H A Dpkcs7_parser.c413 pr_debug("Got cert %u for %s\n", x509->index, x509->subject); in pkcs7_extract_cert()
/kernel/linux/linux-6.6/crypto/asymmetric_keys/
H A Dx509_public_key.c176 pr_devel("Cert Subject: %s\n", cert->subject); in x509_key_preparse()
196 sulen = strlen(cert->subject); in x509_key_preparse()
209 p = memcpy(desc, cert->subject, sulen); in x509_key_preparse()
H A Dx509_parser.h18 char *subject; /* Name of certificate subject */ member
31 const void *raw_subject; /* Raw subject name in ASN.1 */
H A Dpkcs7_verify.c156 * subject's name) and the certificate serial number [RFC 2315 6.7].
208 x509->subject, in pkcs7_verify_sig_chain()
285 pr_debug("- subject %s\n", p->subject); in pkcs7_verify_sig_chain()
H A Dx509_cert_parser.c50 kfree(cert->subject); in x509_free_certificate()
364 * Fabricate and save the issuer and subject names
468 return x509_fabricate_name(ctx, hdrlen, tag, &ctx->cert->subject, vlen); in x509_note_subject()
482 * first and ignore third, using second one which is after subject and in x509_note_params()
H A Dpkcs7_parser.c431 pr_debug("Got cert %u for %s\n", x509->index, x509->subject); in pkcs7_extract_cert()
/kernel/linux/linux-5.10/scripts/
H A Dget_maintainer.pl574 # of a git format-patch generated file (subject tags, etc...)
2123 my $subject = "";
2127 $subject = $1 if ($line =~ m/$VCS_cmds{"subject_pattern"}/);
2142 @{$ref}[1] eq $subject &&
2150 [ ($commit, $subject, $type) ]);
/kernel/linux/linux-6.6/scripts/
H A Dget_maintainer.pl574 # of a git format-patch generated file (subject tags, etc...)
2124 my $subject = "";
2128 $subject = $1 if ($line =~ m/$VCS_cmds{"subject_pattern"}/);
2143 @{$ref}[1] eq $subject &&
2151 [ ($commit, $subject, $type) ]);
/kernel/linux/linux-5.10/tools/testing/ktest/
H A Dktest.pl4239 my ($subject, $message, $file) = @_;
4252 print HEAD "Subject: $subject\n\n";
4276 $mail_command =~ s/\$SUBJECT/$subject/g;
4283 do_send_email($subject, $message);
/kernel/linux/linux-6.6/tools/testing/ktest/
H A Dktest.pl4157 my ($subject, $message, $file) = @_;
4170 print HEAD "Subject: $subject\n\n";
4194 $mail_command =~ s/\$SUBJECT/$subject/g;
4201 do_send_email($subject, $message);

Completed in 32 milliseconds

12