/linux-6.12.1/security/smack/ |
D | smack_access.c | 115 int smk_access(struct smack_known *subject, struct smack_known *object, in smk_access() argument 127 if (subject == &smack_known_star) { in smk_access() 136 if (object == &smack_known_web || subject == &smack_known_web) in smk_access() 147 if (subject->smk_known == object->smk_known) in smk_access() 157 if (subject == &smack_known_hat) in smk_access() 168 may = smk_access_entry(subject->smk_known, object->smk_known, in smk_access() 169 &subject->smk_rules); in smk_access() 192 if (subject == smack_unconfined) in smk_access() 199 smack_log(subject->smk_known, object->smk_known, in smk_access() 319 audit_log_untrustedstring(ab, sad->subject); in smack_log_callback() [all …]
|
/linux-6.12.1/crypto/asymmetric_keys/ |
D | x509_public_key.c | 162 pr_devel("Cert Subject: %s\n", cert->subject); in x509_key_preparse() 181 sulen = strlen(cert->subject); in x509_key_preparse() 193 p = memcpy(desc, cert->subject, sulen); in x509_key_preparse()
|
D | x509_parser.h | 19 char *subject; /* Name of certificate subject */ member
|
D | x509.asn1 | 20 subject Name ({ x509_note_subject }),
|
D | pkcs7_verify.c | 208 x509->subject, in pkcs7_verify_sig_chain() 285 pr_debug("- subject %s\n", p->subject); in pkcs7_verify_sig_chain()
|
/linux-6.12.1/Documentation/admin-guide/LSM/ |
D | Smack.rst | 134 This interface reports whether a subject with the specified 142 This interface reports whether a subject with the specified 159 where the first string is the subject label, the second the 162 "rwxat-". If a rule for a given subject and object exists it will be 223 where the first string is the subject label, the second the 238 where the first string is the subject label, the second the 293 For the ``PTRACE_READ`` a subject needs to have a read access on 298 only allowed when subject's and object's labels are equal. 305 revoke-subject 307 rules with that subject label. [all …]
|
/linux-6.12.1/ |
D | COPYING | 20 All contributions to the Linux Kernel are subject to this COPYING file.
|
/linux-6.12.1/Documentation/networking/ |
D | ax25.rst | 15 of the message, the subject field is ignored. You don't need to be
|
/linux-6.12.1/Documentation/devicetree/bindings/ |
D | submitting-patches.rst | 14 be a separate patch. The preferred subject prefix for binding patches is:: 23 The 80 characters of the subject are precious. It is recommended to not
|
/linux-6.12.1/Documentation/security/ |
D | credentials.rst | 52 A subject is an object that is acting upon another object. 65 A subject has an additional interpretation of its credentials. A subset 68 subject acts. 77 Linux has a number of actions available that a subject may perform upon an 78 object. The set of actions available depends on the nature of the subject 86 When a subject acts upon an object, a security calculation is made. This 88 action, and searching one or more sets of rules to see whether the subject 101 is an abbreviated ACL with three fixed classes of subject ('user', 118 subject label, the object label and the action and look for a rule
|
/linux-6.12.1/LICENSES/deprecated/ |
D | Zlib | 19 commercial applications, and to alter it and redistribute it freely, subject
|
/linux-6.12.1/arch/arm/boot/dts/arm/ |
D | arm-realview-eb-a9mp-bbrevd.dts | 9 * furnished to do so, subject to the following conditions:
|
D | arm-realview-eb-bbrevd.dts | 9 * furnished to do so, subject to the following conditions:
|
D | arm-realview-eb-11mp-bbrevd.dts | 9 * furnished to do so, subject to the following conditions:
|
D | arm-realview-eb-11mp-bbrevd-ctrevb.dts | 9 * furnished to do so, subject to the following conditions:
|
/linux-6.12.1/drivers/gpu/drm/nouveau/nvkm/engine/gr/fuc/ |
D | hubgf117.fuc3 | 9 * Software is furnished to do so, subject to the following conditions:
|
D | hubgk110.fuc3 | 9 * Software is furnished to do so, subject to the following conditions:
|
D | hubgk104.fuc3 | 9 * Software is furnished to do so, subject to the following conditions:
|
D | gpcgk110.fuc3 | 9 * Software is furnished to do so, subject to the following conditions:
|
D | hubgf100.fuc3 | 9 * Software is furnished to do so, subject to the following conditions:
|
D | hubgk208.fuc5 | 9 * Software is furnished to do so, subject to the following conditions:
|
D | gpcgm107.fuc5 | 9 * Software is furnished to do so, subject to the following conditions:
|
D | gpcgk208.fuc5 | 9 * Software is furnished to do so, subject to the following conditions:
|
D | gpcgk104.fuc3 | 9 * Software is furnished to do so, subject to the following conditions:
|
/linux-6.12.1/LICENSES/preferred/ |
D | MIT | 19 Software is furnished to do so, subject to the following conditions:
|