subject 405 crypto/asymmetric_keys/pkcs7_parser.c pr_debug("Got cert %u for %s\n", x509->index, x509->subject); subject 215 crypto/asymmetric_keys/pkcs7_verify.c x509->subject, subject 295 crypto/asymmetric_keys/pkcs7_verify.c pr_debug("- subject %s\n", p->subject); subject 52 crypto/asymmetric_keys/x509_cert_parser.c kfree(cert->subject); subject 420 crypto/asymmetric_keys/x509_cert_parser.c return x509_fabricate_name(ctx, hdrlen, tag, &ctx->cert->subject, vlen); subject 18 crypto/asymmetric_keys/x509_parser.h char *subject; /* Name of certificate subject */ subject 170 crypto/asymmetric_keys/x509_public_key.c pr_devel("Cert Subject: %s\n", cert->subject); subject 196 crypto/asymmetric_keys/x509_public_key.c sulen = strlen(cert->subject); subject 209 crypto/asymmetric_keys/x509_public_key.c p = memcpy(desc, cert->subject, sulen); subject 275 security/smack/smack.h char *subject; subject 116 security/smack/smack_access.c int smk_access(struct smack_known *subject, struct smack_known *object, subject 128 security/smack/smack_access.c if (subject == &smack_known_star) { subject 137 security/smack/smack_access.c if (object == &smack_known_web || subject == &smack_known_web) subject 148 security/smack/smack_access.c if (subject->smk_known == object->smk_known) subject 158 security/smack/smack_access.c if (subject == &smack_known_hat) subject 169 security/smack/smack_access.c may = smk_access_entry(subject->smk_known, object->smk_known, subject 170 security/smack/smack_access.c &subject->smk_rules); subject 193 security/smack/smack_access.c if (subject == smack_unconfined) subject 200 security/smack/smack_access.c smack_log(subject->smk_known, object->smk_known, subject 320 security/smack/smack_access.c audit_log_untrustedstring(ab, sad->subject); subject 364 security/smack/smack_access.c sad->subject = subject_label; subject 2491 security/smack/smack_lsm.c static int smk_ipv6_check(struct smack_known *subject, subject 2510 security/smack/smack_lsm.c rc = smk_access(subject, object, MAY_WRITE, &ad); subject 2511 security/smack/smack_lsm.c rc = smk_bu_note("IPv6 check", subject, object, MAY_WRITE, rc); subject 314 security/smack/smackfs.c static int smk_fill_rule(const char *subject, const char *object, subject 323 security/smack/smackfs.c rule->smk_subject = smk_import_entry(subject, len); subject 331 security/smack/smackfs.c cp = smk_parse_smack(subject, len);