Home
last modified time | relevance | path

Searched refs:session_key (Results 1 – 21 of 21) sorted by relevance

/linux/fs/ecryptfs/
H A Ddebug.c42 auth_tok->session_key.flags); in ecryptfs_dump_auth_tok()
43 if (auth_tok->session_key.flags in ecryptfs_dump_auth_tok()
47 if (auth_tok->session_key.flags in ecryptfs_dump_auth_tok()
51 if (auth_tok->session_key.flags & ECRYPTFS_CONTAINS_DECRYPTED_KEY) { in ecryptfs_dump_auth_tok()
55 auth_tok->session_key.decrypted_key_size); in ecryptfs_dump_auth_tok()
59 ecryptfs_dump_hex(auth_tok->session_key.decrypted_key, in ecryptfs_dump_auth_tok()
62 if (auth_tok->session_key.flags & ECRYPTFS_CONTAINS_ENCRYPTED_KEY) { in ecryptfs_dump_auth_tok()
66 auth_tok->session_key.encrypted_key_size); in ecryptfs_dump_auth_tok()
70 ecryptfs_dump_hex(auth_tok->session_key.encrypted_key, in ecryptfs_dump_auth_tok()
71 auth_tok->session_key. in ecryptfs_dump_auth_tok()
H A Dkeystore.c143 write_tag_64_packet(char *signature, struct ecryptfs_session_key *session_key, in write_tag_64_packet() argument
161 + session_key->encrypted_key_size); in write_tag_64_packet()
181 session_key->encrypted_key_size, in write_tag_64_packet()
189 memcpy(&message[i], session_key->encrypted_key, in write_tag_64_packet()
190 session_key->encrypted_key_size); in write_tag_64_packet()
191 i += session_key->encrypted_key_size; in write_tag_64_packet()
198 parse_tag_65_packet(struct ecryptfs_session_key *session_key, u8 *cipher_code, in parse_tag_65_packet() argument
256 session_key->decrypted_key_size = m_size - 3; in parse_tag_65_packet()
257 if (session_key->decrypted_key_size > ECRYPTFS_MAX_KEY_BYTES) { in parse_tag_65_packet()
260 session_key->decrypted_key_size, in parse_tag_65_packet()
[all …]
/linux/net/ceph/
H A Dauth_x.c185 ceph_crypto_key_destroy(&th->session_key); in remove_ticket_handler()
261 tp = *p + ceph_x_encrypt_offset(&th->session_key); in process_one_ticket()
262 ret = ceph_x_decrypt(&th->session_key, in process_one_ticket()
288 ceph_crypto_key_destroy(&th->session_key); in process_one_ticket()
291 th->session_key = new_session_key; in process_one_ticket()
355 msg_b = p + ceph_x_encrypt_offset(&au->session_key); in encrypt_authorizer()
367 ret = ceph_x_encrypt(&au->session_key, in encrypt_authorizer()
386 ceph_crypto_key_destroy(&au->session_key); in ceph_x_authorizer_cleanup()
407 ceph_crypto_key_destroy(&au->session_key); in ceph_x_build_authorizer()
408 ret = ceph_crypto_key_clone(&au->session_key, &th->session_key); in ceph_x_build_authorizer()
[all …]
H A Dauth_x.h19 struct ceph_crypto_key session_key; member
32 struct ceph_crypto_key session_key; member
H A Dauth.c366 u8 *session_key, int *session_key_len, in ceph_auth_verify_authorizer_reply() argument
374 reply, reply_len, session_key, session_key_len, in ceph_auth_verify_authorizer_reply()
493 u8 *session_key, int *session_key_len, in ceph_auth_handle_reply_done() argument
500 session_key, session_key_len, in ceph_auth_handle_reply_done()
604 u8 *session_key, int *session_key_len, in ceph_auth_handle_svc_reply_done() argument
608 reply, reply_len, session_key, session_key_len, in ceph_auth_handle_svc_reply_done()
H A Dauth_none.c73 void *buf, void *end, u8 *session_key, in handle_reply() argument
H A Dmon_client.c1401 u8 *session_key, int *session_key_len, in mon_handle_auth_done() argument
1413 session_key, session_key_len, in mon_handle_auth_done()
H A Dmessenger_v2.c704 const u8 *session_key, int session_key_len, in setup_crypto() argument
726 hmac_sha256_preparekey(&con->v2.hmac_key, session_key, session_key_len); in setup_crypto()
2365 u8 *session_key = PTR_ALIGN(&session_key_buf[0], 16); in process_auth_done() local
2390 session_key, &session_key_len, in process_auth_done()
2404 ret = setup_crypto(con, session_key, session_key_len, con_secret, in process_auth_done()
H A Dosd_client.c5642 u8 *session_key, int *session_key_len, in osd_handle_auth_done() argument
5650 session_key, session_key_len, in osd_handle_auth_done()
/linux/net/rxrpc/
H A Dkey.c95 memcpy(&token->kad->session_key, &xdr[2], 8); in rxrpc_preparse_xdr_rxkad()
104 token->kad->session_key[0], token->kad->session_key[1], in rxrpc_preparse_xdr_rxkad()
105 token->kad->session_key[2], token->kad->session_key[3], in rxrpc_preparse_xdr_rxkad()
106 token->kad->session_key[4], token->kad->session_key[5], in rxrpc_preparse_xdr_rxkad()
107 token->kad->session_key[6], token->kad->session_key[7]); in rxrpc_preparse_xdr_rxkad()
484 v1->session_key[0], v1->session_key[1], in rxrpc_preparse()
485 v1->session_key[2], v1->session_key[3], in rxrpc_preparse()
486 v1->session_key[4], v1->session_key[5], in rxrpc_preparse()
487 v1->session_key[6], v1->session_key[7]); in rxrpc_preparse()
514 memcpy(&token->kad->session_key, &v1->session_key, 8); in rxrpc_preparse()
[all …]
H A Drxkad.c117 if (crypto_sync_skcipher_setkey(ci, token->kad->session_key, in rxkad_init_connection_security()
118 sizeof(token->kad->session_key)) < 0) in rxkad_init_connection_security()
217 memcpy(&iv, token->kad->session_key, sizeof(iv)); in rxkad_prime_packet_security()
326 memcpy(&iv, token->kad->session_key, sizeof(iv)); in rxkad_secure_packet_encrypt()
529 memcpy(&iv, token->kad->session_key, sizeof(iv)); in rxkad_verify_packet_2()
744 memcpy(&iv, s2->session_key, sizeof(iv)); in rxkad_encrypt_response()
1078 const struct rxrpc_crypt *session_key) in rxkad_decrypt_response() argument
1085 ntohl(session_key->n[0]), ntohl(session_key->n[1])); in rxkad_decrypt_response()
1088 if (crypto_sync_skcipher_setkey(rxkad_ci, session_key->x, in rxkad_decrypt_response()
1089 sizeof(*session_key)) < 0) in rxkad_decrypt_response()
[all …]
/linux/drivers/net/ppp/
H A Dppp_mppe.c79 unsigned char session_key[MPPE_MAX_KEY_LEN]; member
121 sha1_update(&ctx, state->session_key, state->keylen); in get_new_key_from_sha()
135 arc4_crypt(&state->arc4, state->session_key, state->sha1_digest, in mppe_rekey()
138 memcpy(state->session_key, state->sha1_digest, state->keylen); in mppe_rekey()
142 state->session_key[0] = 0xd1; in mppe_rekey()
143 state->session_key[1] = 0x26; in mppe_rekey()
144 state->session_key[2] = 0x9e; in mppe_rekey()
146 arc4_setkey(&state->arc4, state->session_key, state->keylen); in mppe_rekey()
168 memcpy(state->session_key, state->master_key, in mppe_alloc()
227 (int)sizeof(state->session_key), state->session_key); in mppe_init()
/linux/include/linux/ceph/
H A Dauth.h54 void *buf, void *end, u8 *session_key,
74 u8 *session_key, int *session_key_len,
139 u8 *session_key, int *session_key_len,
166 u8 *session_key, int *session_key_len,
183 u8 *session_key, int *session_key_len,
H A Dmessenger.h69 u8 *session_key, int *session_key_len,
/linux/net/l2tp/
H A Dl2tp_core.c299 u32 session_key = l2tp_v2_session_key(tunnel_id, session_id); in l2tp_v2_session_get() local
304 session = idr_find(&pn->l2tp_v2_session_idr, session_key); in l2tp_v2_session_get()
518 unsigned long session_key = session->session_id; in l2tp_session_collision_del() local
536 void *old = idr_replace(&pn->l2tp_v3_session_idr, session2, session_key); in l2tp_session_collision_del()
540 void *removed = idr_remove(&pn->l2tp_v3_session_idr, session_key); in l2tp_session_collision_del()
558 u32 session_key; in l2tp_session_register() local
570 session_key = session->session_id; in l2tp_session_register()
572 &session_key, session_key, GFP_ATOMIC); in l2tp_session_register()
580 session_key); in l2tp_session_register()
585 session_key = l2tp_v2_session_key(tunnel->tunnel_id, in l2tp_session_register()
[all …]
/linux/security/keys/encrypted-keys/
H A Decryptfs_format.c69 auth_tok->session_key.encrypted_key[0] = 0; in ecryptfs_fill_auth_tok()
70 auth_tok->session_key.encrypted_key_size = 0; in ecryptfs_fill_auth_tok()
/linux/drivers/char/tpm/
H A Dtpm2-sessions.c126 u8 session_key[SHA256_DIGEST_SIZE]; member
674 tpm2_KDFa(auth->session_key, SHA256_DIGEST_SIZE in tpm_buf_fill_hmac_session()
715 hmac_sha256_init_usingrawkey(&hctx, auth->session_key, in tpm_buf_fill_hmac_session()
716 sizeof(auth->session_key) + in tpm_buf_fill_hmac_session()
837 hmac_sha256_init_usingrawkey(&hctx, auth->session_key, in tpm_buf_check_hmac_response()
838 sizeof(auth->session_key) + in tpm_buf_check_hmac_response()
855 tpm2_KDFa(auth->session_key, SHA256_DIGEST_SIZE in tpm_buf_check_hmac_response()
929 auth->our_nonce, sizeof(auth->session_key), in tpm2_parse_start_auth_session()
930 auth->session_key); in tpm2_parse_start_auth_session()
/linux/include/linux/
H A Decryptfs.h98 struct ecryptfs_session_key session_key; member
/linux/fs/smb/client/
H A Dsmb1session.c376 server->session_key.response = in sess_establish_session()
379 if (!server->session_key.response) { in sess_establish_session()
383 server->session_key.len = in sess_establish_session()
H A Dconnect.c321 kfree_sensitive(server->session_key.response); in cifs_abort_connection()
322 server->session_key.response = NULL; in cifs_abort_connection()
323 server->session_key.len = 0; in cifs_abort_connection()
1735 kfree_sensitive(server->session_key.response); in cifs_put_tcp_session()
1736 server->session_key.response = NULL; in cifs_put_tcp_session()
1737 server->session_key.len = 0; in cifs_put_tcp_session()
/linux/fs/ceph/
H A Dmds_client.c6441 u8 *session_key, int *session_key_len, in mds_handle_auth_done() argument
6449 session_key, session_key_len, in mds_handle_auth_done()