master_desc 21 include/keys/encrypted-type.h char *master_desc; /* datablob: master key name */ master_desc 172 security/keys/encrypted-keys/encrypted.c char **master_desc, char **decrypted_datalen, master_desc 201 security/keys/encrypted-keys/encrypted.c *master_desc = strsep(&datablob, " \t"); master_desc 204 security/keys/encrypted-keys/encrypted.c *master_desc = p; master_desc 208 security/keys/encrypted-keys/encrypted.c if (!*master_desc) { master_desc 213 security/keys/encrypted-keys/encrypted.c if (valid_master_desc(*master_desc, NULL) < 0) { master_desc 215 security/keys/encrypted-keys/encrypted.c "is invalid\n", *master_desc); master_desc 286 security/keys/encrypted-keys/encrypted.c epayload->master_desc, epayload->datalen); master_desc 301 security/keys/encrypted-keys/encrypted.c static struct key *request_user_key(const char *master_desc, const u8 **master_key, master_desc 307 security/keys/encrypted-keys/encrypted.c ukey = request_key(&key_type_user, master_desc, NULL); master_desc 427 security/keys/encrypted-keys/encrypted.c if (!strncmp(epayload->master_desc, KEY_TRUSTED_PREFIX, master_desc 429 security/keys/encrypted-keys/encrypted.c mkey = request_trusted_key(epayload->master_desc + master_desc 432 security/keys/encrypted-keys/encrypted.c } else if (!strncmp(epayload->master_desc, KEY_USER_PREFIX, master_desc 434 security/keys/encrypted-keys/encrypted.c mkey = request_user_key(epayload->master_desc + master_desc 445 security/keys/encrypted-keys/encrypted.c epayload->master_desc); master_desc 448 security/keys/encrypted-keys/encrypted.c epayload->master_desc); master_desc 538 security/keys/encrypted-keys/encrypted.c p = epayload->master_desc; master_desc 609 security/keys/encrypted-keys/encrypted.c const char *master_desc, master_desc 648 security/keys/encrypted-keys/encrypted.c datablob_len = format_len + 1 + strlen(master_desc) + 1 master_desc 725 security/keys/encrypted-keys/encrypted.c const char *format, const char *master_desc, master_desc 732 security/keys/encrypted-keys/encrypted.c epayload->master_desc = epayload->format + format_len + 1; master_desc 733 security/keys/encrypted-keys/encrypted.c epayload->datalen = epayload->master_desc + strlen(master_desc) + 1; master_desc 748 security/keys/encrypted-keys/encrypted.c memcpy(epayload->master_desc, master_desc, strlen(master_desc)); master_desc 760 security/keys/encrypted-keys/encrypted.c const char *master_desc, const char *datalen, master_desc 774 security/keys/encrypted-keys/encrypted.c __ekey_init(epayload, format, master_desc, datalen); master_desc 799 security/keys/encrypted-keys/encrypted.c char *master_desc = NULL; master_desc 813 security/keys/encrypted-keys/encrypted.c ret = datablob_parse(datablob, &format, &master_desc, master_desc 818 security/keys/encrypted-keys/encrypted.c epayload = encrypted_key_alloc(key, format, master_desc, master_desc 824 security/keys/encrypted-keys/encrypted.c ret = encrypted_init(epayload, key->description, format, master_desc, master_desc 879 security/keys/encrypted-keys/encrypted.c ret = valid_master_desc(new_master_desc, epayload->master_desc);