Lines Matching refs:session_key

144 write_tag_64_packet(char *signature, struct ecryptfs_session_key *session_key,
162 + session_key->encrypted_key_size);
182 session_key->encrypted_key_size,
190 memcpy(&message[i], session_key->encrypted_key,
191 session_key->encrypted_key_size);
192 i += session_key->encrypted_key_size;
199 parse_tag_65_packet(struct ecryptfs_session_key *session_key, u8 *cipher_code,
257 session_key->decrypted_key_size = m_size - 3;
258 if (session_key->decrypted_key_size > ECRYPTFS_MAX_KEY_BYTES) {
261 session_key->decrypted_key_size,
266 memcpy(session_key->decrypted_key, &data[i],
267 session_key->decrypted_key_size);
268 i += session_key->decrypted_key_size;
271 for (i = 0; i < session_key->decrypted_key_size; i++)
272 checksum += session_key->decrypted_key[i];
1145 rc = write_tag_64_packet(auth_tok_sig, &(auth_tok->session_key),
1164 rc = parse_tag_65_packet(&(auth_tok->session_key),
1171 auth_tok->session_key.flags |= ECRYPTFS_CONTAINS_DECRYPTED_KEY;
1172 memcpy(crypt_stat->key, auth_tok->session_key.decrypted_key,
1173 auth_tok->session_key.decrypted_key_size);
1174 crypt_stat->key_size = auth_tok->session_key.decrypted_key_size;
1303 (*new_auth_tok)->session_key.encrypted_key_size =
1305 if ((*new_auth_tok)->session_key.encrypted_key_size
1312 memcpy((*new_auth_tok)->session_key.encrypted_key,
1314 (*packet_size) += (*new_auth_tok)->session_key.encrypted_key_size;
1315 (*new_auth_tok)->session_key.flags &=
1317 (*new_auth_tok)->session_key.flags |=
1321 (*new_auth_tok)->session_key.flags &=
1323 (*new_auth_tok)->session_key.flags &=
1425 (*new_auth_tok)->session_key.encrypted_key_size =
1427 if ((*new_auth_tok)->session_key.encrypted_key_size
1452 (*new_auth_tok)->session_key.encrypted_key_size;
1475 * (*new_auth_tok)->session_key.encrypted_key_size =
1477 memcpy((*new_auth_tok)->session_key.encrypted_key,
1479 (*new_auth_tok)->session_key.encrypted_key_size);
1481 (*new_auth_tok)->session_key.encrypted_key_size;
1482 (*new_auth_tok)->session_key.flags &=
1484 (*new_auth_tok)->session_key.flags |=
1497 (*new_auth_tok)->session_key.flags &=
1499 (*new_auth_tok)->session_key.flags &=
1674 rc = virt_to_scatterlist(auth_tok->session_key.encrypted_key,
1675 auth_tok->session_key.encrypted_key_size,
1679 "auth_tok->session_key.encrypted_key to scatterlist; "
1681 "auth_tok->session_key.encrypted_key_size = [%d]\n", rc,
1682 auth_tok->session_key.encrypted_key_size);
1685 auth_tok->session_key.decrypted_key_size =
1686 auth_tok->session_key.encrypted_key_size;
1687 rc = virt_to_scatterlist(auth_tok->session_key.decrypted_key,
1688 auth_tok->session_key.decrypted_key_size,
1692 "auth_tok->session_key.decrypted_key to scatterlist; "
1719 auth_tok->session_key.encrypted_key_size,
1727 auth_tok->session_key.flags |= ECRYPTFS_CONTAINS_DECRYPTED_KEY;
1728 memcpy(crypt_stat->key, auth_tok->session_key.decrypted_key,
1729 auth_tok->session_key.decrypted_key_size);
2038 auth_tok->session_key.encrypted_key[i];
2041 auth_tok->session_key.encrypted_key,
2042 auth_tok->session_key.encrypted_key_size);
2047 if (auth_tok->session_key.encrypted_key_size == 0)
2048 auth_tok->session_key.encrypted_key_size =
2217 if (auth_tok->session_key.encrypted_key_size == 0)
2218 auth_tok->session_key.encrypted_key_size =
2223 auth_tok->session_key.encrypted_key_size = 32;
2225 auth_tok->session_key.encrypted_key_size = crypt_stat->key_size;
2227 auth_tok->session_key.encrypted_key_size;
2229 for (i = 0; i < auth_tok->session_key.encrypted_key_size; i++)
2231 auth_tok->session_key.encrypted_key[i];
2234 "using auth_tok->session_key.encrypted_key, "
2238 auth_tok->session_key.encrypted_key,