key_desc 1910 drivers/md/dm-crypt.c char *new_key_string, *key_desc; key_desc 1925 drivers/md/dm-crypt.c key_desc = strpbrk(key_string, ":"); key_desc 1926 drivers/md/dm-crypt.c if (!key_desc || key_desc == key_string || !strlen(key_desc + 1)) key_desc 1929 drivers/md/dm-crypt.c if (strncmp(key_string, "logon:", key_desc - key_string + 1) && key_desc 1930 drivers/md/dm-crypt.c strncmp(key_string, "user:", key_desc - key_string + 1)) key_desc 1938 drivers/md/dm-crypt.c key_desc + 1, NULL); key_desc 31 drivers/md/dm-verity-verify-sig.c static int verity_verify_get_sig_from_key(const char *key_desc, key_desc 39 drivers/md/dm-verity-verify-sig.c key_desc, NULL); key_desc 834 drivers/net/wireless/rsi/rsi_91x_mgmt.c set_key->key_desc = cpu_to_le16(key_descriptor); key_desc 472 drivers/net/wireless/rsi/rsi_mgmt.h __le16 key_desc; key_desc 88 include/linux/lsm_audit.h char *key_desc; key_desc 49 security/keys/encrypted-keys/ecryptfs_format.c const char *key_desc) key_desc 57 security/keys/encrypted-keys/ecryptfs_format.c strncpy((char *)auth_tok->token.password.signature, key_desc, key_desc 25 security/keys/encrypted-keys/ecryptfs_format.h const char *key_desc); key_desc 759 security/keys/encrypted-keys/encrypted.c const char *key_desc, const char *format, key_desc 766 security/keys/encrypted-keys/encrypted.c ret = valid_ecryptfs_desc(key_desc); key_desc 771 security/keys/encrypted-keys/encrypted.c key_desc); key_desc 402 security/lsm_audit.c if (a->u.key_struct.key_desc) { key_desc 404 security/lsm_audit.c audit_log_untrustedstring(ab, a->u.key_struct.key_desc); key_desc 4271 security/smack/smack_lsm.c ad.a.u.key_struct.key_desc = keyp->description;