/kernel/linux/common_modules/code_sign/ |
H A D | code_sign_ioctl.c | 22 struct cert_source *matched_cert_search(struct rb_root *root, const char *subject, const char *issuer) in matched_cert_search() argument 28 int result = strcmp(subject, cur_cert->subject); in matched_cert_search() 50 struct cert_source *cert_chain_search(struct rb_root *root, const char *subject, const char *issuer, bool has_locked) in cert_chain_search() argument 53 return matched_cert_search(root, subject, issuer); in cert_chain_search() 56 struct cert_source *matched_cert = matched_cert_search(root, subject, issuer); in cert_chain_search() 62 struct cert_source *find_match(const char *subject, const char *issuer, bool is_dev) in find_match() argument 65 return cert_chain_search(&dev_cert_chain_tree, subject, issuer, false); in find_match() 67 return cert_chain_search(&cert_chain_tree, subject, issuer, false); in find_match() 110 int result = strcmp(cert->subject, thi in cert_chain_insert() [all...] |
H A D | verify_cert_chain.c | 26 * subject's name) and the certificate serial number [RFC 2315 6.7]. 113 struct cert_source *source = find_match(signer->subject, signer->issuer, is_debug); in find_matched_source() 192 if (cert->subject && (strcmp(cert->subject, issuer) == 0)) { in code_sign_verify_certchain() 194 if (strcmp(cert->subject, cert->issuer) == 0) { in code_sign_verify_certchain() 207 code_sign_log_info("cert subject and issuer trusted"); in code_sign_verify_certchain() 218 code_sign_log_error("cert subject and issuer verify failed"); in code_sign_verify_certchain()
|
H A D | code_sign_ioctl.h | 24 char *subject; member 42 struct cert_source *find_match(const char *subject, const char *issuer, bool is_dev);
|
/kernel/linux/linux-5.10/security/smack/ |
H A D | smack_access.c | 56 * @subject_label: a pointer to the subject's Smack label 60 * This function looks up the subject/object pair in the 103 * smk_access - determine if a subject has a specific access to an object 104 * @subject: a pointer to the subject's Smack label entry 109 * This function looks up the subject/object pair in the 115 int smk_access(struct smack_known *subject, struct smack_known *object, in smk_access() argument 125 * A star subject can't access any object. in smk_access() 127 if (subject == &smack_known_star) { in smk_access() 132 * An internet object can be accessed by any subject in smk_access() [all...] |
H A D | smack.h | 62 * Keep the access rules for this subject label here so that 266 char *subject; member
|
H A D | smackfs.c | 51 SMK_REVOKE_SUBJ = 18, /* set rules with subject label to '-' */ 203 * Looks through the current subject/object/access list for 204 * the subject/object pair and replaces the access that was 223 * than the subject label check it first in smk_set_access() 304 * @subject: subject label string 314 static int smk_fill_rule(const char *subject, const char *object, in smk_fill_rule() argument 323 rule->smk_subject = smk_import_entry(subject, len); in smk_fill_rule() 331 cp = smk_parse_smack(subject, len); in smk_fill_rule() 436 * "subject<whitespac [all...] |
H A D | smack_lsm.c | 1712 * For each Smack rule associated with the subject in smack_mmap_file() 1735 * If may is zero the SMACK64MMAP subject can't in smack_mmap_file() 1743 * If there isn't one a SMACK64MMAP subject in smack_mmap_file() 1763 * not available to a SMACK64MMAP subject in smack_mmap_file() 1797 * Returns 0 if a subject with the object's smack could 2518 * @subject: subject Smack label 2525 static int smk_ipv6_check(struct smack_known *subject, in smk_ipv6_check() argument 2544 rc = smk_access(subject, object, MAY_WRITE, &ad); in smk_ipv6_check() 2545 rc = smk_bu_note("IPv6 check", subject, objec in smk_ipv6_check() [all...] |
/kernel/linux/linux-6.6/security/smack/ |
H A D | smack_access.c | 56 * @subject_label: a pointer to the subject's Smack label 60 * This function looks up the subject/object pair in the 103 * smk_access - determine if a subject has a specific access to an object 104 * @subject: a pointer to the subject's Smack label entry 109 * This function looks up the subject/object pair in the 115 int smk_access(struct smack_known *subject, struct smack_known *object, in smk_access() argument 125 * A star subject can't access any object. in smk_access() 127 if (subject == &smack_known_star) { in smk_access() 132 * An internet object can be accessed by any subject in smk_access() [all...] |
H A D | smack.h | 62 * Keep the access rules for this subject label here so that 257 char *subject; member
|
H A D | smackfs.c | 52 SMK_REVOKE_SUBJ = 18, /* set rules with subject label to '-' */ 204 * Looks through the current subject/object/access list for 205 * the subject/object pair and replaces the access that was 224 * than the subject label check it first in smk_set_access() 305 * @subject: subject label string 315 static int smk_fill_rule(const char *subject, const char *object, in smk_fill_rule() argument 324 rule->smk_subject = smk_import_entry(subject, len); in smk_fill_rule() 332 cp = smk_parse_smack(subject, len); in smk_fill_rule() 437 * "subject<whitespac [all...] |
H A D | smack_lsm.c | 1817 * For each Smack rule associated with the subject in smack_mmap_file() 1840 * If may is zero the SMACK64MMAP subject can't in smack_mmap_file() 1848 * If there isn't one a SMACK64MMAP subject in smack_mmap_file() 1868 * not available to a SMACK64MMAP subject in smack_mmap_file() 1902 * Returns 0 if a subject with the object's smack could 2651 * @subject: subject Smack label 2658 static int smk_ipv6_check(struct smack_known *subject, in smk_ipv6_check() argument 2677 rc = smk_access(subject, object, MAY_WRITE, &ad); in smk_ipv6_check() 2678 rc = smk_bu_note("IPv6 check", subject, objec in smk_ipv6_check() [all...] |
/kernel/linux/linux-5.10/crypto/asymmetric_keys/ |
H A D | x509_public_key.c | 174 pr_devel("Cert Subject: %s\n", cert->subject); in x509_key_preparse() 200 sulen = strlen(cert->subject); in x509_key_preparse() 213 p = memcpy(desc, cert->subject, sulen); in x509_key_preparse()
|
H A D | x509_parser.h | 18 char *subject; /* Name of certificate subject */ member 31 const void *raw_subject; /* Raw subject name in ASN.1 */
|
H A D | pkcs7_verify.c | 157 * subject's name) and the certificate serial number [RFC 2315 6.7]. 209 x509->subject, in pkcs7_verify_sig_chain() 289 pr_debug("- subject %s\n", p->subject); in pkcs7_verify_sig_chain()
|
H A D | x509_cert_parser.c | 52 kfree(cert->subject); in x509_free_certificate() 362 * Fabricate and save the issuer and subject names 456 return x509_fabricate_name(ctx, hdrlen, tag, &ctx->cert->subject, vlen); in x509_note_subject() 470 * first and ignore third, using second one which is after subject and in x509_note_params()
|
H A D | pkcs7_parser.c | 413 pr_debug("Got cert %u for %s\n", x509->index, x509->subject); in pkcs7_extract_cert()
|
/kernel/linux/linux-6.6/crypto/asymmetric_keys/ |
H A D | x509_public_key.c | 176 pr_devel("Cert Subject: %s\n", cert->subject); in x509_key_preparse() 196 sulen = strlen(cert->subject); in x509_key_preparse() 209 p = memcpy(desc, cert->subject, sulen); in x509_key_preparse()
|
H A D | x509_parser.h | 18 char *subject; /* Name of certificate subject */ member 31 const void *raw_subject; /* Raw subject name in ASN.1 */
|
H A D | pkcs7_verify.c | 156 * subject's name) and the certificate serial number [RFC 2315 6.7]. 208 x509->subject, in pkcs7_verify_sig_chain() 285 pr_debug("- subject %s\n", p->subject); in pkcs7_verify_sig_chain()
|
H A D | x509_cert_parser.c | 50 kfree(cert->subject); in x509_free_certificate() 364 * Fabricate and save the issuer and subject names 468 return x509_fabricate_name(ctx, hdrlen, tag, &ctx->cert->subject, vlen); in x509_note_subject() 482 * first and ignore third, using second one which is after subject and in x509_note_params()
|
H A D | pkcs7_parser.c | 431 pr_debug("Got cert %u for %s\n", x509->index, x509->subject); in pkcs7_extract_cert()
|
/kernel/linux/linux-5.10/scripts/ |
H A D | get_maintainer.pl | 574 # of a git format-patch generated file (subject tags, etc...) 2123 my $subject = ""; 2127 $subject = $1 if ($line =~ m/$VCS_cmds{"subject_pattern"}/); 2142 @{$ref}[1] eq $subject && 2150 [ ($commit, $subject, $type) ]);
|
/kernel/linux/linux-6.6/scripts/ |
H A D | get_maintainer.pl | 574 # of a git format-patch generated file (subject tags, etc...) 2124 my $subject = ""; 2128 $subject = $1 if ($line =~ m/$VCS_cmds{"subject_pattern"}/); 2143 @{$ref}[1] eq $subject && 2151 [ ($commit, $subject, $type) ]);
|
/kernel/linux/linux-5.10/tools/testing/ktest/ |
H A D | ktest.pl | 4239 my ($subject, $message, $file) = @_; 4252 print HEAD "Subject: $subject\n\n"; 4276 $mail_command =~ s/\$SUBJECT/$subject/g; 4283 do_send_email($subject, $message);
|
/kernel/linux/linux-6.6/tools/testing/ktest/ |
H A D | ktest.pl | 4157 my ($subject, $message, $file) = @_; 4170 print HEAD "Subject: $subject\n\n"; 4194 $mail_command =~ s/\$SUBJECT/$subject/g; 4201 do_send_email($subject, $message);
|