Home
last modified time | relevance | path

Searched refs:key_desc (Results 1 – 10 of 10) sorted by relevance

/Linux-v5.10/security/keys/encrypted-keys/
Decryptfs_format.c49 const char *key_desc) in ecryptfs_fill_auth_tok() argument
57 strncpy((char *)auth_tok->token.password.signature, key_desc, in ecryptfs_fill_auth_tok()
Decryptfs_format.h25 const char *key_desc);
Dencrypted.c747 const char *key_desc, const char *format, in encrypted_init() argument
754 ret = valid_ecryptfs_desc(key_desc); in encrypted_init()
759 key_desc); in encrypted_init()
/Linux-v5.10/drivers/md/
Ddm-verity-verify-sig.c31 static int verity_verify_get_sig_from_key(const char *key_desc, in verity_verify_get_sig_from_key() argument
39 key_desc, NULL); in verity_verify_get_sig_from_key()
Ddm-crypt.c2325 char *new_key_string, *key_desc; in crypt_set_keyring_key() local
2341 key_desc = strpbrk(key_string, ":"); in crypt_set_keyring_key()
2342 if (!key_desc || key_desc == key_string || !strlen(key_desc + 1)) in crypt_set_keyring_key()
2345 if (!strncmp(key_string, "logon:", key_desc - key_string + 1)) { in crypt_set_keyring_key()
2348 } else if (!strncmp(key_string, "user:", key_desc - key_string + 1)) { in crypt_set_keyring_key()
2352 } else if (!strncmp(key_string, "encrypted:", key_desc - key_string + 1)) { in crypt_set_keyring_key()
2364 key = request_key(type, key_desc + 1, NULL); in crypt_set_keyring_key()
/Linux-v5.10/include/linux/
Dlsm_audit.h90 char *key_desc; member
/Linux-v5.10/security/
Dlsm_audit.c408 if (a->u.key_struct.key_desc) { in dump_common_audit_data()
410 audit_log_untrustedstring(ab, a->u.key_struct.key_desc); in dump_common_audit_data()
/Linux-v5.10/drivers/net/wireless/rsi/
Drsi_mgmt.h472 __le16 key_desc; member
Drsi_91x_mgmt.c841 set_key->key_desc = cpu_to_le16(key_descriptor); in rsi_hal_load_key()
/Linux-v5.10/security/smack/
Dsmack_lsm.c4321 ad.a.u.key_struct.key_desc = keyp->description; in smack_key_permission()
4392 ad.a.u.key_struct.key_desc = key->description; in smack_watch_key()