/linux-4.1.27/fs/ecryptfs/ |
D | debug.c | 57 auth_tok->session_key.flags); in ecryptfs_dump_auth_tok() 58 if (auth_tok->session_key.flags in ecryptfs_dump_auth_tok() 62 if (auth_tok->session_key.flags in ecryptfs_dump_auth_tok() 66 if (auth_tok->session_key.flags & ECRYPTFS_CONTAINS_DECRYPTED_KEY) { in ecryptfs_dump_auth_tok() 70 auth_tok->session_key.decrypted_key_size); in ecryptfs_dump_auth_tok() 74 ecryptfs_dump_hex(auth_tok->session_key.decrypted_key, in ecryptfs_dump_auth_tok() 77 if (auth_tok->session_key.flags & ECRYPTFS_CONTAINS_ENCRYPTED_KEY) { in ecryptfs_dump_auth_tok() 81 auth_tok->session_key.encrypted_key_size); in ecryptfs_dump_auth_tok() 85 ecryptfs_dump_hex(auth_tok->session_key.encrypted_key, in ecryptfs_dump_auth_tok() 86 auth_tok->session_key. in ecryptfs_dump_auth_tok()
|
D | keystore.c | 157 write_tag_64_packet(char *signature, struct ecryptfs_session_key *session_key, in write_tag_64_packet() argument 175 + session_key->encrypted_key_size); in write_tag_64_packet() 195 session_key->encrypted_key_size, in write_tag_64_packet() 203 memcpy(&message[i], session_key->encrypted_key, in write_tag_64_packet() 204 session_key->encrypted_key_size); in write_tag_64_packet() 205 i += session_key->encrypted_key_size; in write_tag_64_packet() 212 parse_tag_65_packet(struct ecryptfs_session_key *session_key, u8 *cipher_code, in parse_tag_65_packet() argument 270 session_key->decrypted_key_size = m_size - 3; in parse_tag_65_packet() 271 if (session_key->decrypted_key_size > ECRYPTFS_MAX_KEY_BYTES) { in parse_tag_65_packet() 274 session_key->decrypted_key_size, in parse_tag_65_packet() [all …]
|
/linux-4.1.27/drivers/net/ppp/ |
D | ppp_mppe.c | 101 unsigned char session_key[MPPE_MAX_KEY_LEN]; member 147 nbytes += setup_sg(&sg[2], state->session_key, state->keylen); in get_new_key_from_sha() 173 setup_sg(sg_out, state->session_key, state->keylen); in mppe_rekey() 179 memcpy(state->session_key, state->sha1_digest, state->keylen); in mppe_rekey() 183 state->session_key[0] = 0xd1; in mppe_rekey() 184 state->session_key[1] = 0x26; in mppe_rekey() 185 state->session_key[2] = 0x9e; in mppe_rekey() 187 crypto_blkcipher_setkey(state->arc4, state->session_key, state->keylen); in mppe_rekey() 230 memcpy(state->session_key, state->master_key, in mppe_alloc() 302 char skey[sizeof(state->session_key) * 2 + 1]; in mppe_init() [all …]
|
/linux-4.1.27/net/rxrpc/ |
D | ar-key.c | 130 memcpy(&token->kad->session_key, &xdr[2], 8); in rxrpc_preparse_xdr_rxkad() 139 token->kad->session_key[0], token->kad->session_key[1], in rxrpc_preparse_xdr_rxkad() 140 token->kad->session_key[2], token->kad->session_key[3], in rxrpc_preparse_xdr_rxkad() 141 token->kad->session_key[4], token->kad->session_key[5], in rxrpc_preparse_xdr_rxkad() 142 token->kad->session_key[6], token->kad->session_key[7]); in rxrpc_preparse_xdr_rxkad() 733 v1->session_key[0], v1->session_key[1], in rxrpc_preparse() 734 v1->session_key[2], v1->session_key[3], in rxrpc_preparse() 735 v1->session_key[4], v1->session_key[5], in rxrpc_preparse() 736 v1->session_key[6], v1->session_key[7]); in rxrpc_preparse() 763 memcpy(&token->kad->session_key, &v1->session_key, 8); in rxrpc_preparse() [all …]
|
D | rxkad.c | 80 if (crypto_blkcipher_setkey(ci, token->kad->session_key, in rxkad_init_connection_security() 81 sizeof(token->kad->session_key)) < 0) in rxkad_init_connection_security() 129 memcpy(&iv, token->kad->session_key, sizeof(iv)); in rxkad_prime_packet_security() 225 memcpy(&iv, token->kad->session_key, sizeof(iv)); in rxkad_secure_packet_encrypt() 437 memcpy(&iv, token->kad->session_key, sizeof(iv)); in rxkad_verify_packet_encrypt() 726 memcpy(&iv, s2->session_key, sizeof(iv)); in rxkad_encrypt_response() 967 const struct rxrpc_crypt *session_key) in rxkad_decrypt_response() argument 974 ntohl(session_key->n[0]), ntohl(session_key->n[1])); in rxkad_decrypt_response() 979 if (crypto_blkcipher_setkey(rxkad_ci, session_key->x, in rxkad_decrypt_response() 980 sizeof(*session_key)) < 0) in rxkad_decrypt_response() [all …]
|
/linux-4.1.27/net/ceph/ |
D | auth_x.h | 18 struct ceph_crypto_key session_key; member 29 struct ceph_crypto_key session_key; member
|
D | auth_x.c | 131 ceph_crypto_key_destroy(&th->session_key); in remove_ticket_handler() 190 memcpy(&old_key, &th->session_key, sizeof(old_key)); in process_one_ticket() 230 ceph_crypto_key_destroy(&th->session_key); in process_one_ticket() 233 th->session_key = new_session_key; in process_one_ticket() 297 ceph_crypto_key_destroy(&au->session_key); in ceph_x_build_authorizer() 298 ret = ceph_crypto_key_clone(&au->session_key, &th->session_key); in ceph_x_build_authorizer() 312 ceph_crypto_key_destroy(&au->session_key); in ceph_x_build_authorizer() 340 ret = ceph_x_encrypt(&au->session_key, &msg_b, sizeof(msg_b), in ceph_x_build_authorizer() 530 ret = ceph_x_proc_ticket_reply(ac, &th->session_key, in ceph_x_handle_reply() 607 ret = ceph_x_decrypt(&au->session_key, &p, end, &preply, sizeof(reply)); in ceph_x_verify_authorizer_reply() [all …]
|
/linux-4.1.27/security/keys/encrypted-keys/ |
D | ecryptfs_format.c | 72 auth_tok->session_key.encrypted_key[0] = 0; in ecryptfs_fill_auth_tok() 73 auth_tok->session_key.encrypted_key_size = 0; in ecryptfs_fill_auth_tok()
|
/linux-4.1.27/include/keys/ |
D | rxrpc-type.h | 34 u8 session_key[8]; /* DES session key */ member 106 u8 session_key[8]; member
|
/linux-4.1.27/include/linux/ |
D | ecryptfs.h | 97 struct ecryptfs_session_key session_key; member
|
/linux-4.1.27/fs/cifs/ |
D | cifsglob.h | 104 struct session_key { struct 589 struct session_key session_key; member 793 struct session_key auth_key;
|
D | cifsencrypt.c | 101 server->session_key.response, server->session_key.len); in cifs_calc_signature()
|
D | sess.c | 605 ses->server->session_key.response = in sess_establish_session() 608 if (!ses->server->session_key.response) { in sess_establish_session() 612 ses->server->session_key.len = in sess_establish_session()
|
D | connect.c | 356 kfree(server->session_key.response); in cifs_reconnect() 357 server->session_key.response = NULL; in cifs_reconnect() 358 server->session_key.len = 0; in cifs_reconnect() 2095 kfree(server->session_key.response); in cifs_put_tcp_session() 2096 server->session_key.response = NULL; in cifs_put_tcp_session() 2097 server->session_key.len = 0; in cifs_put_tcp_session()
|
/linux-4.1.27/Documentation/networking/ |
D | rxrpc.txt | 459 uint8_t session_key[8]; /* DES session key */
|