Home
last modified time | relevance | path

Searched refs:session_key (Results 1 – 15 of 15) sorted by relevance

/Linux-v4.19/fs/ecryptfs/
Ddebug.c57 auth_tok->session_key.flags); in ecryptfs_dump_auth_tok()
58 if (auth_tok->session_key.flags in ecryptfs_dump_auth_tok()
62 if (auth_tok->session_key.flags in ecryptfs_dump_auth_tok()
66 if (auth_tok->session_key.flags & ECRYPTFS_CONTAINS_DECRYPTED_KEY) { in ecryptfs_dump_auth_tok()
70 auth_tok->session_key.decrypted_key_size); in ecryptfs_dump_auth_tok()
74 ecryptfs_dump_hex(auth_tok->session_key.decrypted_key, in ecryptfs_dump_auth_tok()
77 if (auth_tok->session_key.flags & ECRYPTFS_CONTAINS_ENCRYPTED_KEY) { in ecryptfs_dump_auth_tok()
81 auth_tok->session_key.encrypted_key_size); in ecryptfs_dump_auth_tok()
85 ecryptfs_dump_hex(auth_tok->session_key.encrypted_key, in ecryptfs_dump_auth_tok()
86 auth_tok->session_key. in ecryptfs_dump_auth_tok()
Dkeystore.c158 write_tag_64_packet(char *signature, struct ecryptfs_session_key *session_key, in write_tag_64_packet() argument
176 + session_key->encrypted_key_size); in write_tag_64_packet()
196 session_key->encrypted_key_size, in write_tag_64_packet()
204 memcpy(&message[i], session_key->encrypted_key, in write_tag_64_packet()
205 session_key->encrypted_key_size); in write_tag_64_packet()
206 i += session_key->encrypted_key_size; in write_tag_64_packet()
213 parse_tag_65_packet(struct ecryptfs_session_key *session_key, u8 *cipher_code, in parse_tag_65_packet() argument
271 session_key->decrypted_key_size = m_size - 3; in parse_tag_65_packet()
272 if (session_key->decrypted_key_size > ECRYPTFS_MAX_KEY_BYTES) { in parse_tag_65_packet()
275 session_key->decrypted_key_size, in parse_tag_65_packet()
[all …]
/Linux-v4.19/net/rxrpc/
Dkey.c133 memcpy(&token->kad->session_key, &xdr[2], 8); in rxrpc_preparse_xdr_rxkad()
142 token->kad->session_key[0], token->kad->session_key[1], in rxrpc_preparse_xdr_rxkad()
143 token->kad->session_key[2], token->kad->session_key[3], in rxrpc_preparse_xdr_rxkad()
144 token->kad->session_key[4], token->kad->session_key[5], in rxrpc_preparse_xdr_rxkad()
145 token->kad->session_key[6], token->kad->session_key[7]); in rxrpc_preparse_xdr_rxkad()
744 v1->session_key[0], v1->session_key[1], in rxrpc_preparse()
745 v1->session_key[2], v1->session_key[3], in rxrpc_preparse()
746 v1->session_key[4], v1->session_key[5], in rxrpc_preparse()
747 v1->session_key[6], v1->session_key[7]); in rxrpc_preparse()
774 memcpy(&token->kad->session_key, &v1->session_key, 8); in rxrpc_preparse()
[all …]
Drxkad.c73 if (crypto_skcipher_setkey(ci, token->kad->session_key, in rxkad_init_connection_security()
74 sizeof(token->kad->session_key)) < 0) in rxkad_init_connection_security()
123 memcpy(&iv, token->kad->session_key, sizeof(iv)); in rxkad_prime_packet_security()
212 memcpy(&iv, token->kad->session_key, sizeof(iv)); in rxkad_secure_packet_encrypt()
451 memcpy(&iv, token->kad->session_key, sizeof(iv)); in rxkad_verify_packet_2()
763 memcpy(&iv, s2->session_key, sizeof(iv)); in rxkad_encrypt_response()
1022 const struct rxrpc_crypt *session_key) in rxkad_decrypt_response() argument
1029 ntohl(session_key->n[0]), ntohl(session_key->n[1])); in rxkad_decrypt_response()
1034 if (crypto_skcipher_setkey(rxkad_ci, session_key->x, in rxkad_decrypt_response()
1035 sizeof(*session_key)) < 0) in rxkad_decrypt_response()
[all …]
/Linux-v4.19/drivers/net/ppp/
Dppp_mppe.c102 unsigned char session_key[MPPE_MAX_KEY_LEN]; member
144 crypto_shash_update(state->sha1, state->session_key, in get_new_key_from_sha()
170 setup_sg(sg_out, state->session_key, state->keylen); in mppe_rekey()
176 memcpy(state->session_key, state->sha1_digest, state->keylen); in mppe_rekey()
180 state->session_key[0] = 0xd1; in mppe_rekey()
181 state->session_key[1] = 0x26; in mppe_rekey()
182 state->session_key[2] = 0x9e; in mppe_rekey()
184 crypto_skcipher_setkey(state->arc4, state->session_key, state->keylen); in mppe_rekey()
237 memcpy(state->session_key, state->master_key, in mppe_alloc()
312 (int)sizeof(state->session_key), state->session_key); in mppe_init()
/Linux-v4.19/net/ceph/
Dauth_x.h19 struct ceph_crypto_key session_key; member
32 struct ceph_crypto_key session_key; member
Dauth_x.c151 ceph_crypto_key_destroy(&th->session_key); in remove_ticket_handler()
220 ret = ceph_x_decrypt(&th->session_key, p, end); in process_one_ticket()
244 ceph_crypto_key_destroy(&th->session_key); in process_one_ticket()
247 th->session_key = new_session_key; in process_one_ticket()
324 ret = ceph_x_encrypt(&au->session_key, p, end - p, sizeof(*msg_b)); in encrypt_authorizer()
341 ceph_crypto_key_destroy(&au->session_key); in ceph_x_authorizer_cleanup()
362 ceph_crypto_key_destroy(&au->session_key); in ceph_x_build_authorizer()
363 ret = ceph_crypto_key_clone(&au->session_key, &th->session_key); in ceph_x_build_authorizer()
604 ret = ceph_x_proc_ticket_reply(ac, &th->session_key, in ceph_x_handle_reply()
691 ret = __ceph_x_decrypt(&au->session_key, challenge_buf, in decrypt_authorize_challenge()
[all …]
/Linux-v4.19/security/keys/encrypted-keys/
Decryptfs_format.c72 auth_tok->session_key.encrypted_key[0] = 0; in ecryptfs_fill_auth_tok()
73 auth_tok->session_key.encrypted_key_size = 0; in ecryptfs_fill_auth_tok()
/Linux-v4.19/include/keys/
Drxrpc-type.h34 u8 session_key[8]; /* DES session key */ member
106 u8 session_key[8]; member
/Linux-v4.19/include/linux/
Decryptfs.h98 struct ecryptfs_session_key session_key; member
/Linux-v4.19/fs/cifs/
Dcifsglob.h122 struct session_key { struct
657 struct session_key session_key; member
877 struct session_key auth_key;
Dcifsencrypt.c131 server->session_key.response, server->session_key.len); in cifs_calc_signature()
Dsess.c629 ses->server->session_key.response = in sess_establish_session()
632 if (!ses->server->session_key.response) { in sess_establish_session()
636 ses->server->session_key.len = in sess_establish_session()
Dconnect.c384 kfree(server->session_key.response); in cifs_reconnect()
385 server->session_key.response = NULL; in cifs_reconnect()
386 server->session_key.len = 0; in cifs_reconnect()
2346 kfree(server->session_key.response); in cifs_put_tcp_session()
2347 server->session_key.response = NULL; in cifs_put_tcp_session()
2348 server->session_key.len = 0; in cifs_put_tcp_session()
/Linux-v4.19/Documentation/networking/
Drxrpc.txt520 uint8_t session_key[8]; /* DES session key */