| /linux/fs/ecryptfs/ |
| A D | debug.c | 43 auth_tok->session_key.flags); in ecryptfs_dump_auth_tok() 44 if (auth_tok->session_key.flags in ecryptfs_dump_auth_tok() 48 if (auth_tok->session_key.flags in ecryptfs_dump_auth_tok() 52 if (auth_tok->session_key.flags & ECRYPTFS_CONTAINS_DECRYPTED_KEY) { in ecryptfs_dump_auth_tok() 56 auth_tok->session_key.decrypted_key_size); in ecryptfs_dump_auth_tok() 60 ecryptfs_dump_hex(auth_tok->session_key.decrypted_key, in ecryptfs_dump_auth_tok() 63 if (auth_tok->session_key.flags & ECRYPTFS_CONTAINS_ENCRYPTED_KEY) { in ecryptfs_dump_auth_tok() 67 auth_tok->session_key.encrypted_key_size); in ecryptfs_dump_auth_tok() 71 ecryptfs_dump_hex(auth_tok->session_key.encrypted_key, in ecryptfs_dump_auth_tok() 72 auth_tok->session_key. in ecryptfs_dump_auth_tok()
|
| A D | keystore.c | 162 + session_key->encrypted_key_size); in write_tag_64_packet() 182 session_key->encrypted_key_size, in write_tag_64_packet() 191 session_key->encrypted_key_size); in write_tag_64_packet() 192 i += session_key->encrypted_key_size; in write_tag_64_packet() 261 session_key->decrypted_key_size, in parse_tag_65_packet() 268 i += session_key->decrypted_key_size; in parse_tag_65_packet() 1315 (*new_auth_tok)->session_key.flags &= in parse_tag_1_packet() 1317 (*new_auth_tok)->session_key.flags |= in parse_tag_1_packet() 1321 (*new_auth_tok)->session_key.flags &= in parse_tag_1_packet() 1323 (*new_auth_tok)->session_key.flags &= in parse_tag_1_packet() [all …]
|
| /linux/net/rxrpc/ |
| A D | key.c | 104 token->kad->session_key[0], token->kad->session_key[1], in rxrpc_preparse_xdr_rxkad() 105 token->kad->session_key[2], token->kad->session_key[3], in rxrpc_preparse_xdr_rxkad() 106 token->kad->session_key[4], token->kad->session_key[5], in rxrpc_preparse_xdr_rxkad() 107 token->kad->session_key[6], token->kad->session_key[7]); in rxrpc_preparse_xdr_rxkad() 327 v1->session_key[0], v1->session_key[1], in rxrpc_preparse() 328 v1->session_key[2], v1->session_key[3], in rxrpc_preparse() 329 v1->session_key[4], v1->session_key[5], in rxrpc_preparse() 330 v1->session_key[6], v1->session_key[7]); in rxrpc_preparse() 357 memcpy(&token->kad->session_key, &v1->session_key, 8); in rxrpc_preparse() 479 const void *session_key, in rxrpc_get_server_data_key() argument [all …]
|
| A D | rxkad.c | 118 sizeof(token->kad->session_key)) < 0) in rxkad_init_connection_security() 209 memcpy(&iv, token->kad->session_key, sizeof(iv)); in rxkad_prime_packet_security() 323 memcpy(&iv, token->kad->session_key, sizeof(iv)); in rxkad_secure_packet_encrypt() 513 memcpy(&iv, token->kad->session_key, sizeof(iv)); in rxkad_verify_packet_2() 773 memcpy(&iv, s2->session_key, sizeof(iv)); in rxkad_encrypt_response() 990 const struct rxrpc_crypt *session_key) in rxkad_decrypt_response() argument 997 ntohl(session_key->n[0]), ntohl(session_key->n[1])); in rxkad_decrypt_response() 1001 sizeof(*session_key)) < 0) in rxkad_decrypt_response() 1004 memcpy(&iv, session_key, sizeof(iv)); in rxkad_decrypt_response() 1027 struct rxrpc_crypt session_key; in rxkad_verify_response() local [all …]
|
| /linux/net/ceph/ |
| A D | auth_x.c | 154 ceph_crypto_key_destroy(&th->session_key); in remove_ticket_handler() 248 ceph_crypto_key_destroy(&th->session_key); in process_one_ticket() 251 th->session_key = new_session_key; in process_one_ticket() 366 ret = ceph_crypto_key_clone(&au->session_key, &th->session_key); in ceph_x_build_authorizer() 619 WARN_ON(session_key || con_secret); in handle_auth_session_key() 627 if (session_key) { in handle_auth_session_key() 628 memcpy(session_key, th->session_key.key, th->session_key.len); in handle_auth_session_key() 629 *session_key_len = th->session_key.len; in handle_auth_session_key() 700 session_key, session_key_len, in ceph_x_handle_reply() 885 if (session_key) { in ceph_x_verify_authorizer_reply() [all …]
|
| A D | auth_x.h | 19 struct ceph_crypto_key session_key; member 32 struct ceph_crypto_key session_key; member
|
| A D | auth.c | 366 u8 *session_key, int *session_key_len, in ceph_auth_verify_authorizer_reply() argument 374 reply, reply_len, session_key, session_key_len, in ceph_auth_verify_authorizer_reply() 493 u8 *session_key, int *session_key_len, in ceph_auth_handle_reply_done() argument 500 session_key, session_key_len, in ceph_auth_handle_reply_done() 604 u8 *session_key, int *session_key_len, in ceph_auth_handle_svc_reply_done() argument 608 reply, reply_len, session_key, session_key_len, in ceph_auth_handle_svc_reply_done()
|
| A D | auth_none.c | 73 void *buf, void *end, u8 *session_key, in handle_reply() argument
|
| A D | mon_client.c | 1402 u8 *session_key, int *session_key_len, in mon_handle_auth_done() argument 1414 session_key, session_key_len, in mon_handle_auth_done()
|
| A D | messenger_v2.c | 704 const u8 *session_key, int session_key_len, in setup_crypto() argument 736 ret = crypto_shash_setkey(con->v2.hmac_tfm, session_key, in setup_crypto() 2391 u8 *session_key = PTR_ALIGN(&session_key_buf[0], 16); in process_auth_done() local 2414 session_key, &session_key_len, in process_auth_done() 2428 ret = setup_crypto(con, session_key, session_key_len, con_secret, in process_auth_done()
|
| A D | osd_client.c | 5690 u8 *session_key, int *session_key_len, in osd_handle_auth_done() argument 5698 session_key, session_key_len, in osd_handle_auth_done()
|
| /linux/drivers/net/ppp/ |
| A D | ppp_mppe.c | 96 unsigned char session_key[MPPE_MAX_KEY_LEN]; member 138 crypto_shash_update(state->sha1, state->session_key, in get_new_key_from_sha() 154 arc4_crypt(&state->arc4, state->session_key, state->sha1_digest, in mppe_rekey() 157 memcpy(state->session_key, state->sha1_digest, state->keylen); in mppe_rekey() 161 state->session_key[0] = 0xd1; in mppe_rekey() 162 state->session_key[1] = 0x26; in mppe_rekey() 163 state->session_key[2] = 0x9e; in mppe_rekey() 165 arc4_setkey(&state->arc4, state->session_key, state->keylen); in mppe_rekey() 211 memcpy(state->session_key, state->master_key, in mppe_alloc() 284 (int)sizeof(state->session_key), state->session_key); in mppe_init()
|
| /linux/include/linux/ceph/ |
| A D | auth.h | 54 void *buf, void *end, u8 *session_key, 74 u8 *session_key, int *session_key_len, 139 u8 *session_key, int *session_key_len, 166 u8 *session_key, int *session_key_len, 183 u8 *session_key, int *session_key_len,
|
| A D | messenger.h | 68 u8 *session_key, int *session_key_len,
|
| /linux/include/keys/ |
| A D | rxrpc-type.h | 30 u8 session_key[8]; /* DES session key */ member 54 u8 session_key[8]; member
|
| /linux/security/keys/encrypted-keys/ |
| A D | ecryptfs_format.c | 70 auth_tok->session_key.encrypted_key[0] = 0; in ecryptfs_fill_auth_tok() 71 auth_tok->session_key.encrypted_key_size = 0; in ecryptfs_fill_auth_tok()
|
| /linux/drivers/char/tpm/ |
| A D | tpm2-sessions.c | 131 u8 session_key[SHA256_DIGEST_SIZE]; member 674 tpm2_KDFa(auth->session_key, SHA256_DIGEST_SIZE in tpm_buf_fill_hmac_session() 712 tpm2_hmac_init(&sctx, auth->session_key, sizeof(auth->session_key) in tpm_buf_fill_hmac_session() 718 tpm2_hmac_final(&sctx, auth->session_key, sizeof(auth->session_key) in tpm_buf_fill_hmac_session() 828 tpm2_hmac_init(&sctx, auth->session_key, sizeof(auth->session_key) in tpm_buf_check_hmac_response() 835 tpm2_hmac_final(&sctx, auth->session_key, sizeof(auth->session_key) in tpm_buf_check_hmac_response() 847 tpm2_KDFa(auth->session_key, SHA256_DIGEST_SIZE in tpm_buf_check_hmac_response() 921 auth->our_nonce, sizeof(auth->session_key), in tpm2_parse_start_auth_session() 922 auth->session_key); in tpm2_parse_start_auth_session()
|
| /linux/net/l2tp/ |
| A D | l2tp_core.c | 299 u32 session_key = l2tp_v2_session_key(tunnel_id, session_id); in l2tp_v2_session_get() local 304 session = idr_find(&pn->l2tp_v2_session_idr, session_key); in l2tp_v2_session_get() 518 unsigned long session_key = session->session_id; in l2tp_session_collision_del() local 558 u32 session_key; in l2tp_session_register() local 570 session_key = session->session_id; in l2tp_session_register() 572 &session_key, session_key, GFP_ATOMIC); in l2tp_session_register() 580 session_key); in l2tp_session_register() 585 session_key = l2tp_v2_session_key(tunnel->tunnel_id, in l2tp_session_register() 588 &session_key, session_key, GFP_ATOMIC); in l2tp_session_register() 1366 u32 session_key = l2tp_v2_session_key(tunnel->tunnel_id, in l2tp_session_unhash() local [all …]
|
| /linux/include/linux/ |
| A D | ecryptfs.h | 98 struct ecryptfs_session_key session_key; member
|
| /linux/fs/smb/client/ |
| A D | cifsencrypt.c | 131 server->session_key.response, server->session_key.len); in cifs_calc_signature()
|
| A D | cifsglob.h | 174 struct session_key { struct 736 struct session_key session_key; member 1084 struct session_key auth_key;
|
| A D | sess.c | 1379 server->session_key.response = in sess_establish_session() 1382 if (!server->session_key.response) { in sess_establish_session() 1386 server->session_key.len = in sess_establish_session()
|
| A D | connect.c | 322 kfree_sensitive(server->session_key.response); in cifs_abort_connection() 323 server->session_key.response = NULL; in cifs_abort_connection() 324 server->session_key.len = 0; in cifs_abort_connection() 1665 kfree_sensitive(server->session_key.response); in cifs_put_tcp_session() 1666 server->session_key.response = NULL; in cifs_put_tcp_session() 1667 server->session_key.len = 0; in cifs_put_tcp_session()
|
| /linux/fs/ceph/ |
| A D | mds_client.c | 6374 u8 *session_key, int *session_key_len, in mds_handle_auth_done() argument 6382 session_key, session_key_len, in mds_handle_auth_done()
|
| /linux/Documentation/networking/ |
| A D | rxrpc.rst | 520 uint8_t session_key[8]; /* DES session key */
|