subject           405 crypto/asymmetric_keys/pkcs7_parser.c 	pr_debug("Got cert %u for %s\n", x509->index, x509->subject);
subject           215 crypto/asymmetric_keys/pkcs7_verify.c 			 x509->subject,
subject           295 crypto/asymmetric_keys/pkcs7_verify.c 		pr_debug("- subject %s\n", p->subject);
subject            52 crypto/asymmetric_keys/x509_cert_parser.c 		kfree(cert->subject);
subject           420 crypto/asymmetric_keys/x509_cert_parser.c 	return x509_fabricate_name(ctx, hdrlen, tag, &ctx->cert->subject, vlen);
subject            18 crypto/asymmetric_keys/x509_parser.h 	char		*subject;		/* Name of certificate subject */
subject           170 crypto/asymmetric_keys/x509_public_key.c 	pr_devel("Cert Subject: %s\n", cert->subject);
subject           196 crypto/asymmetric_keys/x509_public_key.c 	sulen = strlen(cert->subject);
subject           209 crypto/asymmetric_keys/x509_public_key.c 	p = memcpy(desc, cert->subject, sulen);
subject           275 security/smack/smack.h 	char *subject;
subject           116 security/smack/smack_access.c int smk_access(struct smack_known *subject, struct smack_known *object,
subject           128 security/smack/smack_access.c 	if (subject == &smack_known_star) {
subject           137 security/smack/smack_access.c 	if (object == &smack_known_web || subject == &smack_known_web)
subject           148 security/smack/smack_access.c 	if (subject->smk_known == object->smk_known)
subject           158 security/smack/smack_access.c 		if (subject == &smack_known_hat)
subject           169 security/smack/smack_access.c 	may = smk_access_entry(subject->smk_known, object->smk_known,
subject           170 security/smack/smack_access.c 			       &subject->smk_rules);
subject           193 security/smack/smack_access.c 		if (subject == smack_unconfined)
subject           200 security/smack/smack_access.c 		smack_log(subject->smk_known, object->smk_known,
subject           320 security/smack/smack_access.c 	audit_log_untrustedstring(ab, sad->subject);
subject           364 security/smack/smack_access.c 	sad->subject = subject_label;
subject          2491 security/smack/smack_lsm.c static int smk_ipv6_check(struct smack_known *subject,
subject          2510 security/smack/smack_lsm.c 	rc = smk_access(subject, object, MAY_WRITE, &ad);
subject          2511 security/smack/smack_lsm.c 	rc = smk_bu_note("IPv6 check", subject, object, MAY_WRITE, rc);
subject           314 security/smack/smackfs.c static int smk_fill_rule(const char *subject, const char *object,
subject           323 security/smack/smackfs.c 		rule->smk_subject = smk_import_entry(subject, len);
subject           331 security/smack/smackfs.c 		cp = smk_parse_smack(subject, len);