linux/
<<
>>
Prefs
X
Identifier: key_ref
Local variable in function key_ref_to_ptr at include/linux/key.h, line 138 References: include/linux/key.h, line 138 include/linux/key.h, line 140 include/linux/key.h, line 143 include/linux/key.h, line 145 include/linux/key.h, line 290 include/linux/key.h, line 292 include/linux/lsm_hooks.h, line 1797 include/linux/security.h, line 1743 include/linux/security.h, line 1760 security/keys/dh.c, line 20 security/keys/dh.c, line 24 security/keys/dh.c, line 25 security/keys/dh.c, line 30 security/keys/internal.h, line 180 security/keys/internal.h, line 187 security/keys/internal.h, line 189 security/keys/key.c, line 748 security/keys/key.c, line 751 security/keys/key.c, line 755 security/keys/key.c, line 775 security/keys/key.c, line 779 security/keys/key.c, line 823 security/keys/key.c, line 831 security/keys/key.c, line 835 security/keys/key.c, line 847 security/keys/key.c, line 859 security/keys/key.c, line 864 security/keys/key.c, line 873 security/keys/key.c, line 879 security/keys/key.c, line 887 security/keys/key.c, line 896 security/keys/key.c, line 905 security/keys/key.c, line 906 security/keys/key.c, line 927 security/keys/key.c, line 935 security/keys/key.c, line 939 security/keys/key.c, line 949 security/keys/key.c, line 957 security/keys/key.c, line 961 security/keys/key.c, line 962 security/keys/key.c, line 967 security/keys/key.c, line 967 security/keys/key.c, line 985 security/keys/key.c, line 988 security/keys/key.c, line 994 security/keys/keyctl.c, line 78 security/keys/keyctl.c, line 132 security/keys/keyctl.c, line 135 security/keys/keyctl.c, line 136 security/keys/keyctl.c, line 137 security/keys/keyctl.c, line 140 security/keys/keyctl.c, line 261 security/keys/keyctl.c, line 266 security/keys/keyctl.c, line 267 security/keys/keyctl.c, line 268 security/keys/keyctl.c, line 272 security/keys/keyctl.c, line 273 security/keys/keyctl.c, line 330 security/keys/keyctl.c, line 352 security/keys/keyctl.c, line 353 security/keys/keyctl.c, line 354 security/keys/keyctl.c, line 359 security/keys/keyctl.c, line 361 security/keys/keyctl.c, line 382 security/keys/keyctl.c, line 386 security/keys/keyctl.c, line 387 security/keys/keyctl.c, line 388 security/keys/keyctl.c, line 391 security/keys/keyctl.c, line 392 security/keys/keyctl.c, line 393 security/keys/keyctl.c, line 398 security/keys/keyctl.c, line 405 security/keys/keyctl.c, line 423 security/keys/keyctl.c, line 429 security/keys/keyctl.c, line 430 security/keys/keyctl.c, line 431 security/keys/keyctl.c, line 435 security/keys/keyctl.c, line 436 security/keys/keyctl.c, line 439 security/keys/keyctl.c, line 448 security/keys/keyctl.c, line 455 security/keys/keyctl.c, line 517 security/keys/keyctl.c, line 526 security/keys/keyctl.c, line 527 security/keys/keyctl.c, line 528 security/keys/keyctl.c, line 532 security/keys/keyctl.c, line 534 security/keys/keyctl.c, line 554 security/keys/keyctl.c, line 564 security/keys/keyctl.c, line 565 security/keys/keyctl.c, line 566 security/keys/keyctl.c, line 571 security/keys/keyctl.c, line 578 security/keys/keyctl.c, line 598 security/keys/keyctl.c, line 604 security/keys/keyctl.c, line 605 security/keys/keyctl.c, line 606 security/keys/keyctl.c, line 620 security/keys/keyctl.c, line 627 security/keys/keyctl.c, line 649 security/keys/keyctl.c, line 654 security/keys/keyctl.c, line 655 security/keys/keyctl.c, line 658 security/keys/keyctl.c, line 662 security/keys/keyctl.c, line 665 security/keys/keyctl.c, line 670 security/keys/keyctl.c, line 675 security/keys/keyctl.c, line 701 security/keys/keyctl.c, line 722 security/keys/keyctl.c, line 763 security/keys/keyctl.c, line 764 security/keys/keyctl.c, line 765 security/keys/keyctl.c, line 775 security/keys/keyctl.c, line 779 security/keys/keyctl.c, line 784 security/keys/keyctl.c, line 787 security/keys/keyctl.c, line 813 security/keys/keyctl.c, line 817 security/keys/keyctl.c, line 818 security/keys/keyctl.c, line 823 security/keys/keyctl.c, line 830 security/keys/keyctl.c, line 840 security/keys/keyctl.c, line 884 security/keys/keyctl.c, line 901 security/keys/keyctl.c, line 903 security/keys/keyctl.c, line 904 security/keys/keyctl.c, line 908 security/keys/keyctl.c, line 1000 security/keys/keyctl.c, line 1007 security/keys/keyctl.c, line 1009 security/keys/keyctl.c, line 1010 security/keys/keyctl.c, line 1014 security/keys/keyctl.c, line 1387 security/keys/keyctl.c, line 1390 security/keys/keyctl.c, line 1392 security/keys/keyctl.c, line 1395 security/keys/keyctl.c, line 1399 security/keys/keyctl.c, line 1402 security/keys/keyctl.c, line 1407 security/keys/keyctl.c, line 1412 security/keys/keyctl.c, line 1491 security/keys/keyctl.c, line 1495 security/keys/keyctl.c, line 1496 security/keys/keyctl.c, line 1497 security/keys/keyctl.c, line 1498 security/keys/keyctl.c, line 1507 security/keys/keyctl.c, line 1508 security/keys/keyctl.c, line 1509 security/keys/keyctl.c, line 1512 security/keys/keyctl.c, line 1534 security/keys/keyctl.c, line 1656 security/keys/keyctl.c, line 1661 security/keys/keyctl.c, line 1662 security/keys/keyctl.c, line 1663 security/keys/keyctl.c, line 1684 security/keys/keyctl.c, line 1687 security/keys/keyctl_pkey.c, line 82 security/keys/keyctl_pkey.c, line 98 security/keys/keyctl_pkey.c, line 99 security/keys/keyctl_pkey.c, line 100 security/keys/keyctl_pkey.c, line 101 security/keys/permission.c, line 26 security/keys/permission.c, line 33 security/keys/permission.c, line 64 security/keys/permission.c, line 73 security/keys/proc.c, line 156 security/keys/proc.c, line 173 security/keys/proc.c, line 184 security/keys/proc.c, line 189 security/keys/process_keys.c, line 425 security/keys/process_keys.c, line 435 security/keys/process_keys.c, line 441 security/keys/process_keys.c, line 443 security/keys/process_keys.c, line 446 security/keys/process_keys.c, line 449 security/keys/process_keys.c, line 452 security/keys/process_keys.c, line 459 security/keys/process_keys.c, line 461 security/keys/process_keys.c, line 464 security/keys/process_keys.c, line 470 security/keys/process_keys.c, line 473 security/keys/process_keys.c, line 480 security/keys/process_keys.c, line 483 security/keys/process_keys.c, line 486 security/keys/process_keys.c, line 492 security/keys/process_keys.c, line 495 security/keys/process_keys.c, line 501 security/keys/process_keys.c, line 505 security/keys/process_keys.c, line 508 security/keys/process_keys.c, line 514 security/keys/process_keys.c, line 517 security/keys/process_keys.c, line 523 security/keys/process_keys.c, line 526 security/keys/process_keys.c, line 542 security/keys/process_keys.c, line 544 security/keys/process_keys.c, line 545 security/keys/process_keys.c, line 547 security/keys/process_keys.c, line 564 security/keys/process_keys.c, line 567 security/keys/process_keys.c, line 569 security/keys/process_keys.c, line 575 security/keys/process_keys.c, line 577 security/keys/process_keys.c, line 579 security/keys/process_keys.c, line 582 security/keys/process_keys.c, line 622 security/keys/process_keys.c, line 627 security/keys/process_keys.c, line 637 security/keys/process_keys.c, line 645 security/keys/process_keys.c, line 655 security/keys/process_keys.c, line 663 security/keys/process_keys.c, line 693 security/keys/process_keys.c, line 700 security/keys/process_keys.c, line 707 security/keys/process_keys.c, line 712 security/keys/process_keys.c, line 721 security/keys/process_keys.c, line 731 security/keys/process_keys.c, line 741 security/keys/process_keys.c, line 745 security/keys/process_keys.c, line 751 security/keys/process_keys.c, line 755 security/keys/process_keys.c, line 768 security/keys/process_keys.c, line 804 security/keys/process_keys.c, line 812 security/keys/process_keys.c, line 815 security/keys/process_keys.c, line 816 security/keys/request_key.c, line 375 security/keys/request_key.c, line 415 security/keys/request_key.c, line 417 security/keys/request_key.c, line 436 security/keys/request_key.c, line 581 security/keys/request_key.c, line 602 security/keys/request_key.c, line 605 security/keys/request_key.c, line 607 security/keys/request_key.c, line 610 security/keys/request_key.c, line 616 security/keys/request_key.c, line 628 security/keys/request_key.c, line 629 security/keys/request_key.c, line 783 security/keys/request_key.c, line 792 security/keys/request_key.c, line 793 security/keys/request_key.c, line 794 security/keys/request_key.c, line 795 security/keys/request_key.c, line 798 security/security.c, line 2334 security/security.c, line 2337 security/selinux/hooks.c, line 6545 security/selinux/hooks.c, line 6561 security/smack/smack_lsm.c, line 4247 security/smack/smack_lsm.c, line 4262
Documentation
LICENSES
arch
block
certs
crypto
drivers
fs
include
init
ipc
kernel
lib
mm
net
samples
scripts
security
sound
tools
usr
virt
.clang-format 15318 2019-09-15 14:19:40 -0700
.cocciconfig 59 2016-10-02 16:24:40 -0700
.get_maintainer.ignore 71 2019-07-07 15:42:04 -0700
.gitattributes 30 2016-12-11 11:18:02 -0800
.gitignore 1740 2019-11-24 16:32:07 -0800
.mailmap 13825 2019-11-24 16:32:07 -0800
COPYING 423 2018-06-03 14:15:30 -0700
CREDITS 99537 2019-11-24 16:32:07 -0800
Kbuild 1321 2019-11-24 16:32:07 -0800
Kconfig 595 2019-09-15 14:19:40 -0700
MAINTAINERS 529297 2019-11-24 16:32:07 -0800
Makefile 60909 2019-11-24 16:32:07 -0800
README 727 2018-12-23 15:56:06 -0800