Searched refs:key_desc (Results 1 - 10 of 10) sorted by relevance

/linux-master/security/keys/encrypted-keys/
H A Decryptfs_format.h25 const char *key_desc);
H A Decryptfs_format.c49 const char *key_desc)
57 strncpy((char *)auth_tok->token.password.signature, key_desc,
48 ecryptfs_fill_auth_tok(struct ecryptfs_auth_tok *auth_tok, const char *key_desc) argument
H A Dencrypted.c774 const char *key_desc, const char *format,
781 ret = valid_ecryptfs_desc(key_desc);
786 key_desc);
773 encrypted_init(struct encrypted_key_payload *epayload, const char *key_desc, const char *format, const char *master_desc, const char *datalen, const char *hex_encoded_iv, const char *decrypted_data) argument
/linux-master/drivers/md/
H A Ddm-verity-verify-sig.c31 static int verity_verify_get_sig_from_key(const char *key_desc, argument
39 key_desc, NULL);
H A Ddm-crypt.c2543 char *new_key_string, *key_desc; local
2559 key_desc = strchr(key_string, ':');
2560 if (!key_desc || key_desc == key_string || !strlen(key_desc + 1))
2563 if (!strncmp(key_string, "logon:", key_desc - key_string + 1)) {
2566 } else if (!strncmp(key_string, "user:", key_desc - key_string + 1)) {
2570 !strncmp(key_string, "encrypted:", key_desc - key_string + 1)) {
2574 !strncmp(key_string, "trusted:", key_desc - key_string + 1)) {
2585 key = request_key(type, key_desc
[all...]
/linux-master/include/linux/
H A Dlsm_audit.h91 char *key_desc; member in struct:common_audit_data::__anon2823::__anon2824
/linux-master/security/
H A Dlsm_audit.c395 if (a->u.key_struct.key_desc) {
396 audit_log_format(ab, " key_desc=");
397 audit_log_untrustedstring(ab, a->u.key_struct.key_desc);
/linux-master/drivers/net/wireless/rsi/
H A Drsi_mgmt.h472 __le16 key_desc; member in struct:rsi_set_key
H A Drsi_91x_mgmt.c841 set_key->key_desc = cpu_to_le16(key_descriptor);
/linux-master/security/smack/
H A Dsmack_lsm.c4563 ad.a.u.key_struct.key_desc = keyp->description;
4634 ad.a.u.key_struct.key_desc = key->description;

Completed in 411 milliseconds