| /Linux-v5.4/fs/ecryptfs/ | 
| D | debug.c | 43 			auth_tok->session_key.flags);  in ecryptfs_dump_auth_tok()44 	if (auth_tok->session_key.flags  in ecryptfs_dump_auth_tok()
 48 	if (auth_tok->session_key.flags  in ecryptfs_dump_auth_tok()
 52 	if (auth_tok->session_key.flags & ECRYPTFS_CONTAINS_DECRYPTED_KEY) {  in ecryptfs_dump_auth_tok()
 56 				auth_tok->session_key.decrypted_key_size);  in ecryptfs_dump_auth_tok()
 60 			ecryptfs_dump_hex(auth_tok->session_key.decrypted_key,  in ecryptfs_dump_auth_tok()
 63 	if (auth_tok->session_key.flags & ECRYPTFS_CONTAINS_ENCRYPTED_KEY) {  in ecryptfs_dump_auth_tok()
 67 				auth_tok->session_key.encrypted_key_size);  in ecryptfs_dump_auth_tok()
 71 			ecryptfs_dump_hex(auth_tok->session_key.encrypted_key,  in ecryptfs_dump_auth_tok()
 72 					  auth_tok->session_key.  in ecryptfs_dump_auth_tok()
 
 | 
| D | keystore.c | 144 write_tag_64_packet(char *signature, struct ecryptfs_session_key *session_key,  in write_tag_64_packet()  argument162 		    + session_key->encrypted_key_size);  in write_tag_64_packet()
 182 					  session_key->encrypted_key_size,  in write_tag_64_packet()
 190 	memcpy(&message[i], session_key->encrypted_key,  in write_tag_64_packet()
 191 	       session_key->encrypted_key_size);  in write_tag_64_packet()
 192 	i += session_key->encrypted_key_size;  in write_tag_64_packet()
 199 parse_tag_65_packet(struct ecryptfs_session_key *session_key, u8 *cipher_code,  in parse_tag_65_packet()  argument
 257 	session_key->decrypted_key_size = m_size - 3;  in parse_tag_65_packet()
 258 	if (session_key->decrypted_key_size > ECRYPTFS_MAX_KEY_BYTES) {  in parse_tag_65_packet()
 261 				session_key->decrypted_key_size,  in parse_tag_65_packet()
 [all …]
 
 | 
| /Linux-v5.4/drivers/net/ppp/ | 
| D | ppp_mppe.c | 96 	unsigned char session_key[MPPE_MAX_KEY_LEN];  member138 	crypto_shash_update(state->sha1, state->session_key,  in get_new_key_from_sha()
 154 		arc4_crypt(&state->arc4, state->session_key, state->sha1_digest,  in mppe_rekey()
 157 		memcpy(state->session_key, state->sha1_digest, state->keylen);  in mppe_rekey()
 161 		state->session_key[0] = 0xd1;  in mppe_rekey()
 162 		state->session_key[1] = 0x26;  in mppe_rekey()
 163 		state->session_key[2] = 0x9e;  in mppe_rekey()
 165 	arc4_setkey(&state->arc4, state->session_key, state->keylen);  in mppe_rekey()
 211 	memcpy(state->session_key, state->master_key,  in mppe_alloc()
 284 		       (int)sizeof(state->session_key), state->session_key);  in mppe_init()
 
 | 
| /Linux-v5.4/net/rxrpc/ | 
| D | key.c | 131 	memcpy(&token->kad->session_key, &xdr[2], 8);  in rxrpc_preparse_xdr_rxkad()140 	       token->kad->session_key[0], token->kad->session_key[1],  in rxrpc_preparse_xdr_rxkad()
 141 	       token->kad->session_key[2], token->kad->session_key[3],  in rxrpc_preparse_xdr_rxkad()
 142 	       token->kad->session_key[4], token->kad->session_key[5],  in rxrpc_preparse_xdr_rxkad()
 143 	       token->kad->session_key[6], token->kad->session_key[7]);  in rxrpc_preparse_xdr_rxkad()
 742 	       v1->session_key[0], v1->session_key[1],  in rxrpc_preparse()
 743 	       v1->session_key[2], v1->session_key[3],  in rxrpc_preparse()
 744 	       v1->session_key[4], v1->session_key[5],  in rxrpc_preparse()
 745 	       v1->session_key[6], v1->session_key[7]);  in rxrpc_preparse()
 772 	memcpy(&token->kad->session_key, &v1->session_key, 8);  in rxrpc_preparse()
 [all …]
 
 | 
| D | rxkad.c | 70 	if (crypto_sync_skcipher_setkey(ci, token->kad->session_key,  in rxkad_init_connection_security()71 				   sizeof(token->kad->session_key)) < 0)  in rxkad_init_connection_security()
 126 	memcpy(&iv, token->kad->session_key, sizeof(iv));  in rxkad_prime_packet_security()
 242 	memcpy(&iv, token->kad->session_key, sizeof(iv));  in rxkad_secure_packet_encrypt()
 473 	memcpy(&iv, token->kad->session_key, sizeof(iv));  in rxkad_verify_packet_2()
 793 	memcpy(&iv, s2->session_key, sizeof(iv));  in rxkad_encrypt_response()
 1054 				   const struct rxrpc_crypt *session_key)  in rxkad_decrypt_response()  argument
 1061 	       ntohl(session_key->n[0]), ntohl(session_key->n[1]));  in rxkad_decrypt_response()
 1064 	if (crypto_sync_skcipher_setkey(rxkad_ci, session_key->x,  in rxkad_decrypt_response()
 1065 					sizeof(*session_key)) < 0)  in rxkad_decrypt_response()
 [all …]
 
 | 
| /Linux-v5.4/net/ceph/ | 
| D | auth_x.h | 19 	struct ceph_crypto_key session_key;  member32 	struct ceph_crypto_key session_key;  member
 
 | 
| D | auth_x.c | 151 	ceph_crypto_key_destroy(&th->session_key);  in remove_ticket_handler()220 		ret = ceph_x_decrypt(&th->session_key, p, end);  in process_one_ticket()
 244 	ceph_crypto_key_destroy(&th->session_key);  in process_one_ticket()
 247 	th->session_key = new_session_key;  in process_one_ticket()
 324 	ret = ceph_x_encrypt(&au->session_key, p, end - p, sizeof(*msg_b));  in encrypt_authorizer()
 341 	ceph_crypto_key_destroy(&au->session_key);  in ceph_x_authorizer_cleanup()
 362 	ceph_crypto_key_destroy(&au->session_key);  in ceph_x_build_authorizer()
 363 	ret = ceph_crypto_key_clone(&au->session_key, &th->session_key);  in ceph_x_build_authorizer()
 604 		ret = ceph_x_proc_ticket_reply(ac, &th->session_key,  in ceph_x_handle_reply()
 691 	ret = __ceph_x_decrypt(&au->session_key, challenge_buf,  in decrypt_authorize_challenge()
 [all …]
 
 | 
| /Linux-v5.4/security/keys/encrypted-keys/ | 
| D | ecryptfs_format.c | 70 	auth_tok->session_key.encrypted_key[0] = 0;  in ecryptfs_fill_auth_tok()71 	auth_tok->session_key.encrypted_key_size = 0;  in ecryptfs_fill_auth_tok()
 
 | 
| /Linux-v5.4/include/keys/ | 
| D | rxrpc-type.h | 30 	u8	session_key[8];		/* DES session key */  member102 	u8		session_key[8];  member
 
 | 
| /Linux-v5.4/include/linux/ | 
| D | ecryptfs.h | 98 	struct ecryptfs_session_key session_key;  member
 | 
| /Linux-v5.4/fs/cifs/ | 
| D | cifsglob.h | 129 struct session_key {  struct716 	struct session_key session_key;  member
 980 	struct session_key auth_key;
 
 | 
| D | cifsencrypt.c | 132 		server->session_key.response, server->session_key.len);  in cifs_calc_signature()
 | 
| D | sess.c | 637 			ses->server->session_key.response =  in sess_establish_session()640 			if (!ses->server->session_key.response) {  in sess_establish_session()
 644 			ses->server->session_key.len =  in sess_establish_session()
 
 | 
| D | connect.c | 556 	kfree(server->session_key.response);  in cifs_reconnect()557 	server->session_key.response = NULL;  in cifs_reconnect()
 558 	server->session_key.len = 0;  in cifs_reconnect()
 2707 	kfree(server->session_key.response);  in cifs_put_tcp_session()
 2708 	server->session_key.response = NULL;  in cifs_put_tcp_session()
 2709 	server->session_key.len = 0;  in cifs_put_tcp_session()
 
 | 
| /Linux-v5.4/Documentation/networking/ | 
| D | rxrpc.txt | 520 		uint8_t		session_key[8];	/* DES session key */
 |