ukp 1913 drivers/md/dm-crypt.c const struct user_key_payload *ukp; ukp 1946 drivers/md/dm-crypt.c ukp = user_key_payload_locked(key); ukp 1947 drivers/md/dm-crypt.c if (!ukp) { ukp 1954 drivers/md/dm-crypt.c if (cc->key_size != ukp->datalen) { ukp 1961 drivers/md/dm-crypt.c memcpy(cc->key, ukp->data, cc->key_size); ukp 35 drivers/md/dm-verity-verify-sig.c const struct user_key_payload *ukp; ukp 45 drivers/md/dm-verity-verify-sig.c ukp = user_key_payload_locked(key); ukp 46 drivers/md/dm-verity-verify-sig.c if (!ukp) { ukp 51 drivers/md/dm-verity-verify-sig.c sig_opts->sig = kmalloc(ukp->datalen, GFP_KERNEL); ukp 56 drivers/md/dm-verity-verify-sig.c sig_opts->sig_size = ukp->datalen; ukp 58 drivers/md/dm-verity-verify-sig.c memcpy(sig_opts->sig, ukp->data, sig_opts->sig_size); ukp 99 fs/crypto/keysetup_v1.c const struct user_key_payload *ukp; ukp 113 fs/crypto/keysetup_v1.c ukp = user_key_payload_locked(key); ukp 115 fs/crypto/keysetup_v1.c if (!ukp) /* was the key revoked before we acquired its semaphore? */ ukp 118 fs/crypto/keysetup_v1.c payload = (const struct fscrypt_key *)ukp->data; ukp 120 fs/crypto/keysetup_v1.c if (ukp->datalen != sizeof(struct fscrypt_key) || ukp 115 fs/ecryptfs/ecryptfs_kernel.h struct user_key_payload *ukp; ukp 121 fs/ecryptfs/ecryptfs_kernel.h ukp = user_key_payload_locked(key); ukp 122 fs/ecryptfs/ecryptfs_kernel.h if (!ukp) ukp 125 fs/ecryptfs/ecryptfs_kernel.h return (struct ecryptfs_auth_tok *)ukp->data; ukp 274 fs/ubifs/auth.c const struct user_key_payload *ukp; ukp 310 fs/ubifs/auth.c ukp = user_key_payload_locked(keyring_key); ukp 311 fs/ubifs/auth.c if (!ukp) { ukp 348 fs/ubifs/auth.c err = crypto_shash_setkey(c->hmac_tfm, ukp->data, ukp->datalen); ukp 81 lib/digsig.c const struct user_key_payload *ukp; ukp 85 lib/digsig.c ukp = user_key_payload_locked(key); ukp 87 lib/digsig.c if (!ukp) { ukp 93 lib/digsig.c if (ukp->datalen < sizeof(*pkh)) ukp 96 lib/digsig.c pkh = (struct pubkey_hdr *)ukp->data; ukp 108 lib/digsig.c endp = ukp->data + ukp->datalen;