master_desc        21 include/keys/encrypted-type.h 	char *master_desc;	/* datablob: master key name */
master_desc       172 security/keys/encrypted-keys/encrypted.c 			  char **master_desc, char **decrypted_datalen,
master_desc       201 security/keys/encrypted-keys/encrypted.c 		*master_desc = strsep(&datablob, " \t");
master_desc       204 security/keys/encrypted-keys/encrypted.c 		*master_desc = p;
master_desc       208 security/keys/encrypted-keys/encrypted.c 	if (!*master_desc) {
master_desc       213 security/keys/encrypted-keys/encrypted.c 	if (valid_master_desc(*master_desc, NULL) < 0) {
master_desc       215 security/keys/encrypted-keys/encrypted.c 			"is invalid\n", *master_desc);
master_desc       286 security/keys/encrypted-keys/encrypted.c 		      epayload->master_desc, epayload->datalen);
master_desc       301 security/keys/encrypted-keys/encrypted.c static struct key *request_user_key(const char *master_desc, const u8 **master_key,
master_desc       307 security/keys/encrypted-keys/encrypted.c 	ukey = request_key(&key_type_user, master_desc, NULL);
master_desc       427 security/keys/encrypted-keys/encrypted.c 	if (!strncmp(epayload->master_desc, KEY_TRUSTED_PREFIX,
master_desc       429 security/keys/encrypted-keys/encrypted.c 		mkey = request_trusted_key(epayload->master_desc +
master_desc       432 security/keys/encrypted-keys/encrypted.c 	} else if (!strncmp(epayload->master_desc, KEY_USER_PREFIX,
master_desc       434 security/keys/encrypted-keys/encrypted.c 		mkey = request_user_key(epayload->master_desc +
master_desc       445 security/keys/encrypted-keys/encrypted.c 				epayload->master_desc);
master_desc       448 security/keys/encrypted-keys/encrypted.c 				epayload->master_desc);
master_desc       538 security/keys/encrypted-keys/encrypted.c 		p = epayload->master_desc;
master_desc       609 security/keys/encrypted-keys/encrypted.c 							 const char *master_desc,
master_desc       648 security/keys/encrypted-keys/encrypted.c 	datablob_len = format_len + 1 + strlen(master_desc) + 1
master_desc       725 security/keys/encrypted-keys/encrypted.c 			const char *format, const char *master_desc,
master_desc       732 security/keys/encrypted-keys/encrypted.c 	epayload->master_desc = epayload->format + format_len + 1;
master_desc       733 security/keys/encrypted-keys/encrypted.c 	epayload->datalen = epayload->master_desc + strlen(master_desc) + 1;
master_desc       748 security/keys/encrypted-keys/encrypted.c 	memcpy(epayload->master_desc, master_desc, strlen(master_desc));
master_desc       760 security/keys/encrypted-keys/encrypted.c 			  const char *master_desc, const char *datalen,
master_desc       774 security/keys/encrypted-keys/encrypted.c 	__ekey_init(epayload, format, master_desc, datalen);
master_desc       799 security/keys/encrypted-keys/encrypted.c 	char *master_desc = NULL;
master_desc       813 security/keys/encrypted-keys/encrypted.c 	ret = datablob_parse(datablob, &format, &master_desc,
master_desc       818 security/keys/encrypted-keys/encrypted.c 	epayload = encrypted_key_alloc(key, format, master_desc,
master_desc       824 security/keys/encrypted-keys/encrypted.c 	ret = encrypted_init(epayload, key->description, format, master_desc,
master_desc       879 security/keys/encrypted-keys/encrypted.c 	ret = valid_master_desc(new_master_desc, epayload->master_desc);