key_desc         1910 drivers/md/dm-crypt.c 	char *new_key_string, *key_desc;
key_desc         1925 drivers/md/dm-crypt.c 	key_desc = strpbrk(key_string, ":");
key_desc         1926 drivers/md/dm-crypt.c 	if (!key_desc || key_desc == key_string || !strlen(key_desc + 1))
key_desc         1929 drivers/md/dm-crypt.c 	if (strncmp(key_string, "logon:", key_desc - key_string + 1) &&
key_desc         1930 drivers/md/dm-crypt.c 	    strncmp(key_string, "user:", key_desc - key_string + 1))
key_desc         1938 drivers/md/dm-crypt.c 			  key_desc + 1, NULL);
key_desc           31 drivers/md/dm-verity-verify-sig.c static int verity_verify_get_sig_from_key(const char *key_desc,
key_desc           39 drivers/md/dm-verity-verify-sig.c 			key_desc, NULL);
key_desc          834 drivers/net/wireless/rsi/rsi_91x_mgmt.c 	set_key->key_desc = cpu_to_le16(key_descriptor);
key_desc          472 drivers/net/wireless/rsi/rsi_mgmt.h 	__le16 key_desc;
key_desc           88 include/linux/lsm_audit.h 			char *key_desc;
key_desc           49 security/keys/encrypted-keys/ecryptfs_format.c 			   const char *key_desc)
key_desc           57 security/keys/encrypted-keys/ecryptfs_format.c 	strncpy((char *)auth_tok->token.password.signature, key_desc,
key_desc           25 security/keys/encrypted-keys/ecryptfs_format.h 			   const char *key_desc);
key_desc          759 security/keys/encrypted-keys/encrypted.c 			  const char *key_desc, const char *format,
key_desc          766 security/keys/encrypted-keys/encrypted.c 		ret = valid_ecryptfs_desc(key_desc);
key_desc          771 security/keys/encrypted-keys/encrypted.c 				       key_desc);
key_desc          402 security/lsm_audit.c 		if (a->u.key_struct.key_desc) {
key_desc          404 security/lsm_audit.c 			audit_log_untrustedstring(ab, a->u.key_struct.key_desc);
key_desc         4271 security/smack/smack_lsm.c 	ad.a.u.key_struct.key_desc = keyp->description;