• Home
  • History
  • Annotate
  • Raw
  • Download
  • only in /netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/fs/ecryptfs/

Lines Matching refs:crypt_stat

279 		    struct ecryptfs_crypt_stat *crypt_stat, char **packet,
298 data_len = (5 + ECRYPTFS_SIG_SIZE_HEX + crypt_stat->key_size);
318 rc = write_packet_length(&message[i], crypt_stat->key_size + 3,
327 memcpy(&message[i], crypt_stat->key, crypt_stat->key_size);
328 i += crypt_stat->key_size;
329 for (j = 0; j < crypt_stat->key_size; j++)
330 checksum += crypt_stat->key[j];
408 struct ecryptfs_crypt_stat *crypt_stat)
445 memcpy(crypt_stat->key, auth_tok->session_key.decrypted_key,
447 crypt_stat->key_size = auth_tok->session_key.decrypted_key_size;
448 rc = ecryptfs_cipher_code_to_string(crypt_stat->cipher, cipher_code);
454 crypt_stat->flags |= ECRYPTFS_KEY_VALID;
457 ecryptfs_dump_hex(crypt_stat->key,
458 crypt_stat->key_size);
490 * @crypt_stat: The cryptographic context to modify based on packet
506 parse_tag_1_packet(struct ecryptfs_crypt_stat *crypt_stat,
632 * @crypt_stat: The cryptographic context to modify based on packet
649 parse_tag_3_packet(struct ecryptfs_crypt_stat *crypt_stat,
735 ecryptfs_cipher_code_to_string(crypt_stat->cipher,
741 crypt_stat->key_size = 24;
744 crypt_stat->key_size =
747 ecryptfs_init_crypt_ctx(crypt_stat);
926 struct ecryptfs_crypt_stat *crypt_stat)
949 if (!strcmp(crypt_stat->cipher,
950 crypt_stat->mount_crypt_stat->global_default_cipher_name)
951 && crypt_stat->mount_crypt_stat->global_key_tfm) {
952 desc.tfm = crypt_stat->mount_crypt_stat->global_key_tfm;
953 tfm_mutex = &crypt_stat->mount_crypt_stat->global_key_tfm_mutex;
958 crypt_stat->cipher,
977 crypt_stat->key_size);
1019 memcpy(crypt_stat->key, auth_tok->session_key.decrypted_key,
1021 crypt_stat->flags |= ECRYPTFS_KEY_VALID;
1024 ecryptfs_dump_hex(crypt_stat->key,
1025 crypt_stat->key_size);
1045 * Get crypt_stat to have the file's session key if the requisite key
1052 int ecryptfs_parse_packet_set(struct ecryptfs_crypt_stat *crypt_stat,
1083 rc = parse_tag_3_packet(crypt_stat,
1124 crypt_stat->flags |= ECRYPTFS_ENCRYPTED;
1127 rc = parse_tag_1_packet(crypt_stat,
1138 crypt_stat->flags |= ECRYPTFS_ENCRYPTED;
1186 * crypt_stat salt */
1210 crypt_stat);
1215 rc = decrypt_session_key(candidate_auth_tok, crypt_stat);
1222 rc = ecryptfs_compute_root_iv(crypt_stat);
1228 rc = ecryptfs_init_crypt_ctx(crypt_stat);
1232 crypt_stat->cipher, rc);
1241 struct ecryptfs_crypt_stat *crypt_stat,
1251 ecryptfs_code_for_cipher_string(crypt_stat),
1252 crypt_stat, &netlink_payload,
1291 struct ecryptfs_crypt_stat *crypt_stat,
1305 for (i = 0; i < crypt_stat->key_size; i++)
1317 rc = pki_encrypt_session_key(auth_tok, crypt_stat, key_rec);
1439 * @crypt_stat: The cryptographic context
1448 struct ecryptfs_crypt_stat *crypt_stat,
1470 for (i = 0; i < crypt_stat->key_size; i++)
1481 crypt_stat->key_size;
1482 if (crypt_stat->key_size == 24
1483 && strcmp("aes", crypt_stat->cipher) == 0) {
1484 memset((crypt_stat->key + 24), 0, 8);
1497 crypt_stat->key_size);
1507 rc = virt_to_scatterlist(crypt_stat->key,
1511 "for crypt_stat session key\n");
1519 "for crypt_stat encrypted session key\n");
1523 if (!strcmp(crypt_stat->cipher,
1524 crypt_stat->mount_crypt_stat->global_default_cipher_name)
1525 && crypt_stat->mount_crypt_stat->global_key_tfm) {
1526 desc.tfm = crypt_stat->mount_crypt_stat->global_key_tfm;
1527 tfm_mutex = &crypt_stat->mount_crypt_stat->global_key_tfm_mutex;
1532 crypt_stat->cipher,
1543 crypt_stat->cipher, rc);
1551 crypt_stat->key_size);
1561 crypt_stat->key_size);
1612 cipher_code = ecryptfs_code_for_cipher_string(crypt_stat);
1615 "cipher [%s]\n", crypt_stat->cipher);
1642 * @crypt_stat: The cryptographic context from which the
1656 struct ecryptfs_crypt_stat *crypt_stat,
1679 crypt_stat, key_rec,
1701 crypt_stat,mount_crypt_stat,