linux/
<<
>>
Prefs
X
Identifier: key_ref
Local variable in function key_permission at security/keys/internal.h, line 146 References: security/keys/internal.h, line 142 security/keys/internal.h, line 146 security/keys/internal.h, line 148 security/keys/key.c, line 703 security/keys/key.c, line 706 security/keys/key.c, line 710 security/keys/key.c, line 730 security/keys/key.c, line 734 security/keys/key.c, line 755 security/keys/key.c, line 762 security/keys/key.c, line 766 security/keys/key.c, line 774 security/keys/key.c, line 784 security/keys/key.c, line 793 security/keys/key.c, line 795 security/keys/key.c, line 815 security/keys/key.c, line 823 security/keys/key.c, line 827 security/keys/key.c, line 834 security/keys/key.c, line 843 security/keys/key.c, line 843 security/keys/key.c, line 854 security/keys/key.c, line 856 security/keys/key.c, line 862 security/keys/keyctl.c, line 63 security/keys/keyctl.c, line 114 security/keys/keyctl.c, line 117 security/keys/keyctl.c, line 118 security/keys/keyctl.c, line 119 security/keys/keyctl.c, line 122 security/keys/keyctl.c, line 236 security/keys/keyctl.c, line 241 security/keys/keyctl.c, line 242 security/keys/keyctl.c, line 243 security/keys/keyctl.c, line 247 security/keys/keyctl.c, line 248 security/keys/keyctl.c, line 293 security/keys/keyctl.c, line 315 security/keys/keyctl.c, line 316 security/keys/keyctl.c, line 317 security/keys/keyctl.c, line 322 security/keys/keyctl.c, line 324 security/keys/keyctl.c, line 340 security/keys/keyctl.c, line 343 security/keys/keyctl.c, line 344 security/keys/keyctl.c, line 345 security/keys/keyctl.c, line 348 security/keys/keyctl.c, line 349 security/keys/keyctl.c, line 350 security/keys/keyctl.c, line 355 security/keys/keyctl.c, line 358 security/keys/keyctl.c, line 398 security/keys/keyctl.c, line 407 security/keys/keyctl.c, line 408 security/keys/keyctl.c, line 409 security/keys/keyctl.c, line 413 security/keys/keyctl.c, line 415 security/keys/keyctl.c, line 432 security/keys/keyctl.c, line 441 security/keys/keyctl.c, line 442 security/keys/keyctl.c, line 443 security/keys/keyctl.c, line 447 security/keys/keyctl.c, line 449 security/keys/keyctl.c, line 473 security/keys/keyctl.c, line 477 security/keys/keyctl.c, line 478 security/keys/keyctl.c, line 481 security/keys/keyctl.c, line 485 security/keys/keyctl.c, line 488 security/keys/keyctl.c, line 493 security/keys/keyctl.c, line 504 security/keys/keyctl.c, line 508 security/keys/keyctl.c, line 509 security/keys/keyctl.c, line 510 security/keys/keyctl.c, line 511 security/keys/keyctl.c, line 512 security/keys/keyctl.c, line 513 security/keys/keyctl.c, line 533 security/keys/keyctl.c, line 555 security/keys/keyctl.c, line 596 security/keys/keyctl.c, line 597 security/keys/keyctl.c, line 598 security/keys/keyctl.c, line 608 security/keys/keyctl.c, line 612 security/keys/keyctl.c, line 617 security/keys/keyctl.c, line 620 security/keys/keyctl.c, line 647 security/keys/keyctl.c, line 651 security/keys/keyctl.c, line 652 security/keys/keyctl.c, line 657 security/keys/keyctl.c, line 660 security/keys/keyctl.c, line 670 security/keys/keyctl.c, line 707 security/keys/keyctl.c, line 714 security/keys/keyctl.c, line 716 security/keys/keyctl.c, line 717 security/keys/keyctl.c, line 721 security/keys/keyctl.c, line 813 security/keys/keyctl.c, line 820 security/keys/keyctl.c, line 822 security/keys/keyctl.c, line 823 security/keys/keyctl.c, line 827 security/keys/keyctl.c, line 1095 security/keys/keyctl.c, line 1099 security/keys/keyctl.c, line 1101 security/keys/keyctl.c, line 1102 security/keys/keyctl.c, line 1106 security/keys/keyctl.c, line 1184 security/keys/keyctl.c, line 1188 security/keys/keyctl.c, line 1189 security/keys/keyctl.c, line 1190 security/keys/keyctl.c, line 1191 security/keys/keyctl.c, line 1197 security/keys/keyctl.c, line 1200 security/keys/keyctl.c, line 1201 security/keys/keyctl.c, line 1202 security/keys/keyctl.c, line 1205 security/keys/keyctl.c, line 1227 security/keys/keyring.c, line 298 security/keys/keyring.c, line 309 security/keys/keyring.c, line 313 security/keys/keyring.c, line 325 security/keys/keyring.c, line 336 security/keys/keyring.c, line 344 security/keys/keyring.c, line 431 security/keys/keyring.c, line 438 security/keys/keyring.c, line 442 security/keys/permission.c, line 29 security/keys/permission.c, line 36 security/keys/permission.c, line 72 security/keys/permission.c, line 81 security/keys/process_keys.c, line 326 security/keys/process_keys.c, line 337 security/keys/process_keys.c, line 343 security/keys/process_keys.c, line 346 security/keys/process_keys.c, line 349 security/keys/process_keys.c, line 354 security/keys/process_keys.c, line 357 security/keys/process_keys.c, line 364 security/keys/process_keys.c, line 367 security/keys/process_keys.c, line 370 security/keys/process_keys.c, line 375 security/keys/process_keys.c, line 378 security/keys/process_keys.c, line 386 security/keys/process_keys.c, line 393 security/keys/process_keys.c, line 396 security/keys/process_keys.c, line 401 security/keys/process_keys.c, line 404 security/keys/process_keys.c, line 410 security/keys/process_keys.c, line 413 security/keys/process_keys.c, line 416 security/keys/process_keys.c, line 421 security/keys/process_keys.c, line 424 security/keys/process_keys.c, line 443 security/keys/process_keys.c, line 448 security/keys/process_keys.c, line 451 security/keys/process_keys.c, line 456 security/keys/process_keys.c, line 459 security/keys/process_keys.c, line 468 security/keys/process_keys.c, line 471 security/keys/process_keys.c, line 497 security/keys/process_keys.c, line 502 security/keys/process_keys.c, line 520 security/keys/process_keys.c, line 538 security/keys/process_keys.c, line 560 security/keys/process_keys.c, line 572 security/keys/process_keys.c, line 584 security/keys/process_keys.c, line 598 security/keys/process_keys.c, line 607 security/keys/process_keys.c, line 617 security/keys/process_keys.c, line 621 security/keys/process_keys.c, line 627 security/keys/process_keys.c, line 631 security/keys/process_keys.c, line 640 security/keys/process_keys.c, line 676 security/keys/process_keys.c, line 682 security/keys/process_keys.c, line 685 security/keys/process_keys.c, line 686 security/keys/request_key.c, line 301 security/keys/request_key.c, line 322 security/keys/request_key.c, line 323 security/keys/request_key.c, line 343 security/keys/request_key.c, line 419 security/keys/request_key.c, line 426 security/keys/request_key.c, line 429 security/keys/request_key.c, line 430 security/keys/request_key.c, line 431 security/keys/request_key.c, line 432
Documentation
arch
block
crypto
drivers
firmware
fs
include
init
ipc
kernel
lib
mm
net
samples
scripts
security
sound
tools
usr
virt
.gitignore 958 2009-12-02 19:51:29 -0800
.mailmap 4021 2009-12-02 19:51:29 -0800
COPYING 18693 2008-01-24 14:58:53 -0800
CREDITS 94031 2009-12-02 19:51:29 -0800
Kbuild 2430 2009-12-02 19:51:29 -0800
MAINTAINERS 159885 2009-12-02 19:51:29 -0800
Makefile 55203 2009-12-02 19:51:29 -0800
README 17459 2009-12-02 19:51:29 -0800
REPORTING-BUGS 3371 2009-12-02 19:51:29 -0800