/linux-master/fs/ecryptfs/ |
H A D | debug.c | 42 ecryptfs_printk(KERN_DEBUG, " * session_key.flags = [0x%x]\n", 43 auth_tok->session_key.flags); 44 if (auth_tok->session_key.flags 48 if (auth_tok->session_key.flags 52 if (auth_tok->session_key.flags & ECRYPTFS_CONTAINS_DECRYPTED_KEY) { 55 " * session_key.decrypted_key_size = [0x%x]\n", 56 auth_tok->session_key.decrypted_key_size); 60 ecryptfs_dump_hex(auth_tok->session_key.decrypted_key, 63 if (auth_tok->session_key.flags & ECRYPTFS_CONTAINS_ENCRYPTED_KEY) { 66 " * session_key [all...] |
H A D | keystore.c | 144 write_tag_64_packet(char *signature, struct ecryptfs_session_key *session_key, argument 162 + session_key->encrypted_key_size); 182 session_key->encrypted_key_size, 190 memcpy(&message[i], session_key->encrypted_key, 191 session_key->encrypted_key_size); 192 i += session_key->encrypted_key_size; 199 parse_tag_65_packet(struct ecryptfs_session_key *session_key, u8 *cipher_code, argument 257 session_key->decrypted_key_size = m_size - 3; 258 if (session_key->decrypted_key_size > ECRYPTFS_MAX_KEY_BYTES) { 261 session_key [all...] |
/linux-master/net/ceph/ |
H A D | auth_x.h | 19 struct ceph_crypto_key session_key; member in struct:ceph_x_ticket_handler 32 struct ceph_crypto_key session_key; member in struct:ceph_x_authorizer
|
H A D | auth_x.c | 154 ceph_crypto_key_destroy(&th->session_key); 224 ret = ceph_x_decrypt(&th->session_key, p, end); 248 ceph_crypto_key_destroy(&th->session_key); 251 th->session_key = new_session_key; 327 ret = ceph_x_encrypt(&au->session_key, p, end - p, sizeof(*msg_b)); 344 ceph_crypto_key_destroy(&au->session_key); 365 ceph_crypto_key_destroy(&au->session_key); 366 ret = ceph_crypto_key_clone(&au->session_key, &th->session_key); 602 u8 *session_key, in 600 handle_auth_session_key(struct ceph_auth_client *ac, u64 global_id, void **p, void *end, u8 *session_key, int *session_key_len, u8 *con_secret, int *con_secret_len) argument 665 ceph_x_handle_reply(struct ceph_auth_client *ac, u64 global_id, void *buf, void *end, u8 *session_key, int *session_key_len, u8 *con_secret, int *con_secret_len) argument 875 ceph_x_verify_authorizer_reply(struct ceph_auth_client *ac, struct ceph_authorizer *a, void *reply, int reply_len, u8 *session_key, int *session_key_len, u8 *con_secret, int *con_secret_len) argument [all...] |
H A D | auth.c | 366 u8 *session_key, int *session_key_len, 374 reply, reply_len, session_key, session_key_len, 493 u8 *session_key, int *session_key_len, 500 session_key, session_key_len, 604 u8 *session_key, int *session_key_len, 608 reply, reply_len, session_key, session_key_len, 363 ceph_auth_verify_authorizer_reply(struct ceph_auth_client *ac, struct ceph_authorizer *a, void *reply, int reply_len, u8 *session_key, int *session_key_len, u8 *con_secret, int *con_secret_len) argument 491 ceph_auth_handle_reply_done(struct ceph_auth_client *ac, u64 global_id, void *reply, int reply_len, u8 *session_key, int *session_key_len, u8 *con_secret, int *con_secret_len) argument 601 ceph_auth_handle_svc_reply_done(struct ceph_auth_client *ac, struct ceph_auth_handshake *auth, void *reply, int reply_len, u8 *session_key, int *session_key_len, u8 *con_secret, int *con_secret_len) argument
|
H A D | auth_none.c | 73 void *buf, void *end, u8 *session_key, 72 handle_reply(struct ceph_auth_client *ac, u64 global_id, void *buf, void *end, u8 *session_key, int *session_key_len, u8 *con_secret, int *con_secret_len) argument
|
H A D | mon_client.c | 1392 u8 *session_key, int *session_key_len, 1404 session_key, session_key_len, 1390 mon_handle_auth_done(struct ceph_connection *con, u64 global_id, void *reply, int reply_len, u8 *session_key, int *session_key_len, u8 *con_secret, int *con_secret_len) argument
|
H A D | messenger_v2.c | 704 const u8 *session_key, int session_key_len, 736 ret = crypto_shash_setkey(con->v2.hmac_tfm, session_key, 2382 * Align session_key and con_secret to avoid GFP_ATOMIC allocation 2391 u8 *session_key = PTR_ALIGN(&session_key_buf[0], 16); local 2414 session_key, &session_key_len, 2428 ret = setup_crypto(con, session_key, session_key_len, con_secret, 703 setup_crypto(struct ceph_connection *con, const u8 *session_key, int session_key_len, const u8 *con_secret, int con_secret_len) argument
|
H A D | osd_client.c | 5690 u8 *session_key, int *session_key_len, 5698 session_key, session_key_len, 5688 osd_handle_auth_done(struct ceph_connection *con, u64 global_id, void *reply, int reply_len, u8 *session_key, int *session_key_len, u8 *con_secret, int *con_secret_len) argument
|
/linux-master/include/keys/ |
H A D | rxrpc-type.h | 30 u8 session_key[8]; /* DES session key */ member in struct:rxkad_key 54 u8 session_key[8]; member in struct:rxrpc_key_data_v1
|
/linux-master/net/rxrpc/ |
H A D | key.c | 95 memcpy(&token->kad->session_key, &xdr[2], 8); 104 token->kad->session_key[0], token->kad->session_key[1], 105 token->kad->session_key[2], token->kad->session_key[3], 106 token->kad->session_key[4], token->kad->session_key[5], 107 token->kad->session_key[6], token->kad->session_key[7]); 327 v1->session_key[ 478 rxrpc_get_server_data_key(struct rxrpc_connection *conn, const void *session_key, time64_t expiry, u32 kvno) argument [all...] |
H A D | rxkad.c | 117 if (crypto_sync_skcipher_setkey(ci, token->kad->session_key, 118 sizeof(token->kad->session_key)) < 0) 209 memcpy(&iv, token->kad->session_key, sizeof(iv)); 323 memcpy(&iv, token->kad->session_key, sizeof(iv)); 513 memcpy(&iv, token->kad->session_key, sizeof(iv)); 773 memcpy(&iv, s2->session_key, sizeof(iv)); 990 const struct rxrpc_crypt *session_key) 997 ntohl(session_key->n[0]), ntohl(session_key->n[1])); 1000 if (crypto_sync_skcipher_setkey(rxkad_ci, session_key 988 rxkad_decrypt_response(struct rxrpc_connection *conn, struct rxkad_response *resp, const struct rxrpc_crypt *session_key) argument 1027 struct rxrpc_crypt session_key; local [all...] |
/linux-master/security/keys/encrypted-keys/ |
H A D | ecryptfs_format.c | 70 auth_tok->session_key.encrypted_key[0] = 0; 71 auth_tok->session_key.encrypted_key_size = 0;
|
/linux-master/include/linux/ceph/ |
H A D | auth.h | 54 void *buf, void *end, u8 *session_key, 74 u8 *session_key, int *session_key_len, 139 u8 *session_key, int *session_key_len, 166 u8 *session_key, int *session_key_len, 183 u8 *session_key, int *session_key_len,
|
H A D | messenger.h | 68 u8 *session_key, int *session_key_len,
|
/linux-master/drivers/net/ppp/ |
H A D | ppp_mppe.c | 96 unsigned char session_key[MPPE_MAX_KEY_LEN]; member in struct:ppp_mppe_state 138 crypto_shash_update(state->sha1, state->session_key, 154 arc4_crypt(&state->arc4, state->session_key, state->sha1_digest, 157 memcpy(state->session_key, state->sha1_digest, state->keylen); 161 state->session_key[0] = 0xd1; 162 state->session_key[1] = 0x26; 163 state->session_key[2] = 0x9e; 165 arc4_setkey(&state->arc4, state->session_key, state->keylen); 211 memcpy(state->session_key, state->master_key, 284 (int)sizeof(state->session_key), stat [all...] |
/linux-master/include/linux/ |
H A D | ecryptfs.h | 98 struct ecryptfs_session_key session_key; member in struct:ecryptfs_auth_tok
|
/linux-master/fs/smb/client/ |
H A D | cifsglob.h | 174 struct session_key { struct 740 struct session_key session_key; member in struct:TCP_Server_Info 1082 struct session_key auth_key;
|
H A D | cifsencrypt.c | 245 server->session_key.response, server->session_key.len);
|
H A D | sess.c | 1411 server->session_key.response = 1414 if (!server->session_key.response) { 1418 server->session_key.len =
|
H A D | connect.c | 322 kfree_sensitive(server->session_key.response); 323 server->session_key.response = NULL; 324 server->session_key.len = 0; 1668 kfree_sensitive(server->session_key.response); 1669 server->session_key.response = NULL; 1670 server->session_key.len = 0;
|
/linux-master/fs/ceph/ |
H A D | mds_client.c | 6089 u8 *session_key, int *session_key_len, 6097 session_key, session_key_len, 6087 mds_handle_auth_done(struct ceph_connection *con, u64 global_id, void *reply, int reply_len, u8 *session_key, int *session_key_len, u8 *con_secret, int *con_secret_len) argument
|