Searched refs:session_key (Results 1 - 22 of 22) sorted by relevance

/linux-master/fs/ecryptfs/
H A Ddebug.c42 ecryptfs_printk(KERN_DEBUG, " * session_key.flags = [0x%x]\n",
43 auth_tok->session_key.flags);
44 if (auth_tok->session_key.flags
48 if (auth_tok->session_key.flags
52 if (auth_tok->session_key.flags & ECRYPTFS_CONTAINS_DECRYPTED_KEY) {
55 " * session_key.decrypted_key_size = [0x%x]\n",
56 auth_tok->session_key.decrypted_key_size);
60 ecryptfs_dump_hex(auth_tok->session_key.decrypted_key,
63 if (auth_tok->session_key.flags & ECRYPTFS_CONTAINS_ENCRYPTED_KEY) {
66 " * session_key
[all...]
H A Dkeystore.c144 write_tag_64_packet(char *signature, struct ecryptfs_session_key *session_key, argument
162 + session_key->encrypted_key_size);
182 session_key->encrypted_key_size,
190 memcpy(&message[i], session_key->encrypted_key,
191 session_key->encrypted_key_size);
192 i += session_key->encrypted_key_size;
199 parse_tag_65_packet(struct ecryptfs_session_key *session_key, u8 *cipher_code, argument
257 session_key->decrypted_key_size = m_size - 3;
258 if (session_key->decrypted_key_size > ECRYPTFS_MAX_KEY_BYTES) {
261 session_key
[all...]
/linux-master/net/ceph/
H A Dauth_x.h19 struct ceph_crypto_key session_key; member in struct:ceph_x_ticket_handler
32 struct ceph_crypto_key session_key; member in struct:ceph_x_authorizer
H A Dauth_x.c154 ceph_crypto_key_destroy(&th->session_key);
224 ret = ceph_x_decrypt(&th->session_key, p, end);
248 ceph_crypto_key_destroy(&th->session_key);
251 th->session_key = new_session_key;
327 ret = ceph_x_encrypt(&au->session_key, p, end - p, sizeof(*msg_b));
344 ceph_crypto_key_destroy(&au->session_key);
365 ceph_crypto_key_destroy(&au->session_key);
366 ret = ceph_crypto_key_clone(&au->session_key, &th->session_key);
602 u8 *session_key, in
600 handle_auth_session_key(struct ceph_auth_client *ac, u64 global_id, void **p, void *end, u8 *session_key, int *session_key_len, u8 *con_secret, int *con_secret_len) argument
665 ceph_x_handle_reply(struct ceph_auth_client *ac, u64 global_id, void *buf, void *end, u8 *session_key, int *session_key_len, u8 *con_secret, int *con_secret_len) argument
875 ceph_x_verify_authorizer_reply(struct ceph_auth_client *ac, struct ceph_authorizer *a, void *reply, int reply_len, u8 *session_key, int *session_key_len, u8 *con_secret, int *con_secret_len) argument
[all...]
H A Dauth.c366 u8 *session_key, int *session_key_len,
374 reply, reply_len, session_key, session_key_len,
493 u8 *session_key, int *session_key_len,
500 session_key, session_key_len,
604 u8 *session_key, int *session_key_len,
608 reply, reply_len, session_key, session_key_len,
363 ceph_auth_verify_authorizer_reply(struct ceph_auth_client *ac, struct ceph_authorizer *a, void *reply, int reply_len, u8 *session_key, int *session_key_len, u8 *con_secret, int *con_secret_len) argument
491 ceph_auth_handle_reply_done(struct ceph_auth_client *ac, u64 global_id, void *reply, int reply_len, u8 *session_key, int *session_key_len, u8 *con_secret, int *con_secret_len) argument
601 ceph_auth_handle_svc_reply_done(struct ceph_auth_client *ac, struct ceph_auth_handshake *auth, void *reply, int reply_len, u8 *session_key, int *session_key_len, u8 *con_secret, int *con_secret_len) argument
H A Dauth_none.c73 void *buf, void *end, u8 *session_key,
72 handle_reply(struct ceph_auth_client *ac, u64 global_id, void *buf, void *end, u8 *session_key, int *session_key_len, u8 *con_secret, int *con_secret_len) argument
H A Dmon_client.c1392 u8 *session_key, int *session_key_len,
1404 session_key, session_key_len,
1390 mon_handle_auth_done(struct ceph_connection *con, u64 global_id, void *reply, int reply_len, u8 *session_key, int *session_key_len, u8 *con_secret, int *con_secret_len) argument
H A Dmessenger_v2.c704 const u8 *session_key, int session_key_len,
736 ret = crypto_shash_setkey(con->v2.hmac_tfm, session_key,
2382 * Align session_key and con_secret to avoid GFP_ATOMIC allocation
2391 u8 *session_key = PTR_ALIGN(&session_key_buf[0], 16); local
2414 session_key, &session_key_len,
2428 ret = setup_crypto(con, session_key, session_key_len, con_secret,
703 setup_crypto(struct ceph_connection *con, const u8 *session_key, int session_key_len, const u8 *con_secret, int con_secret_len) argument
H A Dosd_client.c5690 u8 *session_key, int *session_key_len,
5698 session_key, session_key_len,
5688 osd_handle_auth_done(struct ceph_connection *con, u64 global_id, void *reply, int reply_len, u8 *session_key, int *session_key_len, u8 *con_secret, int *con_secret_len) argument
/linux-master/include/keys/
H A Drxrpc-type.h30 u8 session_key[8]; /* DES session key */ member in struct:rxkad_key
54 u8 session_key[8]; member in struct:rxrpc_key_data_v1
/linux-master/net/rxrpc/
H A Dkey.c95 memcpy(&token->kad->session_key, &xdr[2], 8);
104 token->kad->session_key[0], token->kad->session_key[1],
105 token->kad->session_key[2], token->kad->session_key[3],
106 token->kad->session_key[4], token->kad->session_key[5],
107 token->kad->session_key[6], token->kad->session_key[7]);
327 v1->session_key[
478 rxrpc_get_server_data_key(struct rxrpc_connection *conn, const void *session_key, time64_t expiry, u32 kvno) argument
[all...]
H A Drxkad.c117 if (crypto_sync_skcipher_setkey(ci, token->kad->session_key,
118 sizeof(token->kad->session_key)) < 0)
209 memcpy(&iv, token->kad->session_key, sizeof(iv));
323 memcpy(&iv, token->kad->session_key, sizeof(iv));
513 memcpy(&iv, token->kad->session_key, sizeof(iv));
773 memcpy(&iv, s2->session_key, sizeof(iv));
990 const struct rxrpc_crypt *session_key)
997 ntohl(session_key->n[0]), ntohl(session_key->n[1]));
1000 if (crypto_sync_skcipher_setkey(rxkad_ci, session_key
988 rxkad_decrypt_response(struct rxrpc_connection *conn, struct rxkad_response *resp, const struct rxrpc_crypt *session_key) argument
1027 struct rxrpc_crypt session_key; local
[all...]
/linux-master/security/keys/encrypted-keys/
H A Decryptfs_format.c70 auth_tok->session_key.encrypted_key[0] = 0;
71 auth_tok->session_key.encrypted_key_size = 0;
/linux-master/include/linux/ceph/
H A Dauth.h54 void *buf, void *end, u8 *session_key,
74 u8 *session_key, int *session_key_len,
139 u8 *session_key, int *session_key_len,
166 u8 *session_key, int *session_key_len,
183 u8 *session_key, int *session_key_len,
H A Dmessenger.h68 u8 *session_key, int *session_key_len,
/linux-master/drivers/net/ppp/
H A Dppp_mppe.c96 unsigned char session_key[MPPE_MAX_KEY_LEN]; member in struct:ppp_mppe_state
138 crypto_shash_update(state->sha1, state->session_key,
154 arc4_crypt(&state->arc4, state->session_key, state->sha1_digest,
157 memcpy(state->session_key, state->sha1_digest, state->keylen);
161 state->session_key[0] = 0xd1;
162 state->session_key[1] = 0x26;
163 state->session_key[2] = 0x9e;
165 arc4_setkey(&state->arc4, state->session_key, state->keylen);
211 memcpy(state->session_key, state->master_key,
284 (int)sizeof(state->session_key), stat
[all...]
/linux-master/include/linux/
H A Decryptfs.h98 struct ecryptfs_session_key session_key; member in struct:ecryptfs_auth_tok
/linux-master/fs/smb/client/
H A Dcifsglob.h174 struct session_key { struct
740 struct session_key session_key; member in struct:TCP_Server_Info
1082 struct session_key auth_key;
H A Dcifsencrypt.c245 server->session_key.response, server->session_key.len);
H A Dsess.c1411 server->session_key.response =
1414 if (!server->session_key.response) {
1418 server->session_key.len =
H A Dconnect.c322 kfree_sensitive(server->session_key.response);
323 server->session_key.response = NULL;
324 server->session_key.len = 0;
1668 kfree_sensitive(server->session_key.response);
1669 server->session_key.response = NULL;
1670 server->session_key.len = 0;
/linux-master/fs/ceph/
H A Dmds_client.c6089 u8 *session_key, int *session_key_len,
6097 session_key, session_key_len,
6087 mds_handle_auth_done(struct ceph_connection *con, u64 global_id, void *reply, int reply_len, u8 *session_key, int *session_key_len, u8 *con_secret, int *con_secret_len) argument

Completed in 345 milliseconds