Home
last modified time | relevance | path

Searched refs:session_key (Results 1 – 23 of 23) sorted by relevance

/linux-6.3-rc2/fs/ecryptfs/
A Ddebug.c43 auth_tok->session_key.flags); in ecryptfs_dump_auth_tok()
44 if (auth_tok->session_key.flags in ecryptfs_dump_auth_tok()
48 if (auth_tok->session_key.flags in ecryptfs_dump_auth_tok()
52 if (auth_tok->session_key.flags & ECRYPTFS_CONTAINS_DECRYPTED_KEY) { in ecryptfs_dump_auth_tok()
56 auth_tok->session_key.decrypted_key_size); in ecryptfs_dump_auth_tok()
60 ecryptfs_dump_hex(auth_tok->session_key.decrypted_key, in ecryptfs_dump_auth_tok()
63 if (auth_tok->session_key.flags & ECRYPTFS_CONTAINS_ENCRYPTED_KEY) { in ecryptfs_dump_auth_tok()
67 auth_tok->session_key.encrypted_key_size); in ecryptfs_dump_auth_tok()
71 ecryptfs_dump_hex(auth_tok->session_key.encrypted_key, in ecryptfs_dump_auth_tok()
72 auth_tok->session_key. in ecryptfs_dump_auth_tok()
A Dkeystore.c162 + session_key->encrypted_key_size); in write_tag_64_packet()
182 session_key->encrypted_key_size, in write_tag_64_packet()
191 session_key->encrypted_key_size); in write_tag_64_packet()
192 i += session_key->encrypted_key_size; in write_tag_64_packet()
261 session_key->decrypted_key_size, in parse_tag_65_packet()
268 i += session_key->decrypted_key_size; in parse_tag_65_packet()
1313 (*new_auth_tok)->session_key.flags &= in parse_tag_1_packet()
1315 (*new_auth_tok)->session_key.flags |= in parse_tag_1_packet()
1319 (*new_auth_tok)->session_key.flags &= in parse_tag_1_packet()
1321 (*new_auth_tok)->session_key.flags &= in parse_tag_1_packet()
[all …]
/linux-6.3-rc2/net/rxrpc/
A Dkey.c104 token->kad->session_key[0], token->kad->session_key[1], in rxrpc_preparse_xdr_rxkad()
105 token->kad->session_key[2], token->kad->session_key[3], in rxrpc_preparse_xdr_rxkad()
106 token->kad->session_key[4], token->kad->session_key[5], in rxrpc_preparse_xdr_rxkad()
107 token->kad->session_key[6], token->kad->session_key[7]); in rxrpc_preparse_xdr_rxkad()
327 v1->session_key[0], v1->session_key[1], in rxrpc_preparse()
328 v1->session_key[2], v1->session_key[3], in rxrpc_preparse()
329 v1->session_key[4], v1->session_key[5], in rxrpc_preparse()
330 v1->session_key[6], v1->session_key[7]); in rxrpc_preparse()
357 memcpy(&token->kad->session_key, &v1->session_key, 8); in rxrpc_preparse()
479 const void *session_key, in rxrpc_get_server_data_key() argument
[all …]
A Drxkad.c118 sizeof(token->kad->session_key)) < 0) in rxkad_init_connection_security()
209 memcpy(&iv, token->kad->session_key, sizeof(iv)); in rxkad_prime_packet_security()
321 memcpy(&iv, token->kad->session_key, sizeof(iv)); in rxkad_secure_packet_encrypt()
511 memcpy(&iv, token->kad->session_key, sizeof(iv)); in rxkad_verify_packet_2()
770 memcpy(&iv, s2->session_key, sizeof(iv)); in rxkad_encrypt_response()
987 const struct rxrpc_crypt *session_key) in rxkad_decrypt_response() argument
994 ntohl(session_key->n[0]), ntohl(session_key->n[1])); in rxkad_decrypt_response()
998 sizeof(*session_key)) < 0) in rxkad_decrypt_response()
1001 memcpy(&iv, session_key, sizeof(iv)); in rxkad_decrypt_response()
1024 struct rxrpc_crypt session_key; in rxkad_verify_response() local
[all …]
/linux-6.3-rc2/net/ceph/
A Dauth_x.c154 ceph_crypto_key_destroy(&th->session_key); in remove_ticket_handler()
248 ceph_crypto_key_destroy(&th->session_key); in process_one_ticket()
251 th->session_key = new_session_key; in process_one_ticket()
366 ret = ceph_crypto_key_clone(&au->session_key, &th->session_key); in ceph_x_build_authorizer()
619 WARN_ON(session_key || con_secret); in handle_auth_session_key()
627 if (session_key) { in handle_auth_session_key()
628 memcpy(session_key, th->session_key.key, th->session_key.len); in handle_auth_session_key()
629 *session_key_len = th->session_key.len; in handle_auth_session_key()
700 session_key, session_key_len, in ceph_x_handle_reply()
885 if (session_key) { in ceph_x_verify_authorizer_reply()
[all …]
A Dauth_x.h19 struct ceph_crypto_key session_key; member
32 struct ceph_crypto_key session_key; member
A Dauth.c366 u8 *session_key, int *session_key_len, in ceph_auth_verify_authorizer_reply() argument
374 reply, reply_len, session_key, session_key_len, in ceph_auth_verify_authorizer_reply()
493 u8 *session_key, int *session_key_len, in ceph_auth_handle_reply_done() argument
500 session_key, session_key_len, in ceph_auth_handle_reply_done()
604 u8 *session_key, int *session_key_len, in ceph_auth_handle_svc_reply_done() argument
608 reply, reply_len, session_key, session_key_len, in ceph_auth_handle_svc_reply_done()
A Dauth_none.c73 void *buf, void *end, u8 *session_key, in handle_reply() argument
A Dmessenger_v2.c692 const u8 *session_key, int session_key_len, in setup_crypto() argument
724 WARN_ON((unsigned long)session_key & in setup_crypto()
726 ret = crypto_shash_setkey(con->v2.hmac_tfm, session_key, in setup_crypto()
2160 u8 *session_key = PTR_ALIGN(&session_key_buf[0], 16); in process_auth_done() local
2183 session_key, &session_key_len, in process_auth_done()
2197 ret = setup_crypto(con, session_key, session_key_len, con_secret, in process_auth_done()
A Dmon_client.c1392 u8 *session_key, int *session_key_len, in mon_handle_auth_done() argument
1404 session_key, session_key_len, in mon_handle_auth_done()
A Dosd_client.c5576 u8 *session_key, int *session_key_len, in osd_handle_auth_done() argument
5584 session_key, session_key_len, in osd_handle_auth_done()
/linux-6.3-rc2/drivers/net/ppp/
A Dppp_mppe.c96 unsigned char session_key[MPPE_MAX_KEY_LEN]; member
138 crypto_shash_update(state->sha1, state->session_key, in get_new_key_from_sha()
154 arc4_crypt(&state->arc4, state->session_key, state->sha1_digest, in mppe_rekey()
157 memcpy(state->session_key, state->sha1_digest, state->keylen); in mppe_rekey()
161 state->session_key[0] = 0xd1; in mppe_rekey()
162 state->session_key[1] = 0x26; in mppe_rekey()
163 state->session_key[2] = 0x9e; in mppe_rekey()
165 arc4_setkey(&state->arc4, state->session_key, state->keylen); in mppe_rekey()
211 memcpy(state->session_key, state->master_key, in mppe_alloc()
284 (int)sizeof(state->session_key), state->session_key); in mppe_init()
/linux-6.3-rc2/include/linux/ceph/
A Dauth.h54 void *buf, void *end, u8 *session_key,
74 u8 *session_key, int *session_key_len,
139 u8 *session_key, int *session_key_len,
166 u8 *session_key, int *session_key_len,
183 u8 *session_key, int *session_key_len,
A Dmessenger.h67 u8 *session_key, int *session_key_len,
/linux-6.3-rc2/include/keys/
A Drxrpc-type.h30 u8 session_key[8]; /* DES session key */ member
54 u8 session_key[8]; member
/linux-6.3-rc2/security/keys/encrypted-keys/
A Decryptfs_format.c70 auth_tok->session_key.encrypted_key[0] = 0; in ecryptfs_fill_auth_tok()
71 auth_tok->session_key.encrypted_key_size = 0; in ecryptfs_fill_auth_tok()
/linux-6.3-rc2/include/linux/
A Decryptfs.h98 struct ecryptfs_session_key session_key; member
/linux-6.3-rc2/fs/cifs/
A Dcifsglob.h151 struct session_key { struct
672 struct session_key session_key; member
1038 struct session_key auth_key;
A Dcifsencrypt.c245 server->session_key.response, server->session_key.len); in cifs_calc_signature()
A Dsess.c1236 server->session_key.response = in sess_establish_session()
1239 if (!server->session_key.response) { in sess_establish_session()
1243 server->session_key.len = in sess_establish_session()
A Dconnect.c267 kfree_sensitive(server->session_key.response); in cifs_abort_connection()
268 server->session_key.response = NULL; in cifs_abort_connection()
269 server->session_key.len = 0; in cifs_abort_connection()
1529 kfree_sensitive(server->session_key.response); in cifs_put_tcp_session()
1530 server->session_key.response = NULL; in cifs_put_tcp_session()
1531 server->session_key.len = 0; in cifs_put_tcp_session()
/linux-6.3-rc2/fs/ceph/
A Dmds_client.c5487 u8 *session_key, int *session_key_len, in mds_handle_auth_done() argument
5495 session_key, session_key_len, in mds_handle_auth_done()
/linux-6.3-rc2/Documentation/networking/
A Drxrpc.rst520 uint8_t session_key[8]; /* DES session key */

Completed in 79 milliseconds