session_key        96 drivers/net/ppp/ppp_mppe.c 	unsigned char session_key[MPPE_MAX_KEY_LEN];
session_key       138 drivers/net/ppp/ppp_mppe.c 	crypto_shash_update(state->sha1, state->session_key,
session_key       154 drivers/net/ppp/ppp_mppe.c 		arc4_crypt(&state->arc4, state->session_key, state->sha1_digest,
session_key       157 drivers/net/ppp/ppp_mppe.c 		memcpy(state->session_key, state->sha1_digest, state->keylen);
session_key       161 drivers/net/ppp/ppp_mppe.c 		state->session_key[0] = 0xd1;
session_key       162 drivers/net/ppp/ppp_mppe.c 		state->session_key[1] = 0x26;
session_key       163 drivers/net/ppp/ppp_mppe.c 		state->session_key[2] = 0x9e;
session_key       165 drivers/net/ppp/ppp_mppe.c 	arc4_setkey(&state->arc4, state->session_key, state->keylen);
session_key       211 drivers/net/ppp/ppp_mppe.c 	memcpy(state->session_key, state->master_key,
session_key       284 drivers/net/ppp/ppp_mppe.c 		       (int)sizeof(state->session_key), state->session_key);
session_key       132 fs/cifs/cifsencrypt.c 		server->session_key.response, server->session_key.len);
session_key       716 fs/cifs/cifsglob.h 	struct session_key session_key;
session_key       980 fs/cifs/cifsglob.h 	struct session_key auth_key;
session_key       579 fs/cifs/connect.c 	kfree(server->session_key.response);
session_key       580 fs/cifs/connect.c 	server->session_key.response = NULL;
session_key       581 fs/cifs/connect.c 	server->session_key.len = 0;
session_key      2742 fs/cifs/connect.c 	kfree(server->session_key.response);
session_key      2743 fs/cifs/connect.c 	server->session_key.response = NULL;
session_key      2744 fs/cifs/connect.c 	server->session_key.len = 0;
session_key       637 fs/cifs/sess.c 			ses->server->session_key.response =
session_key       640 fs/cifs/sess.c 			if (!ses->server->session_key.response) {
session_key       644 fs/cifs/sess.c 			ses->server->session_key.len =
session_key        43 fs/ecryptfs/debug.c 			auth_tok->session_key.flags);
session_key        44 fs/ecryptfs/debug.c 	if (auth_tok->session_key.flags
session_key        48 fs/ecryptfs/debug.c 	if (auth_tok->session_key.flags
session_key        52 fs/ecryptfs/debug.c 	if (auth_tok->session_key.flags & ECRYPTFS_CONTAINS_DECRYPTED_KEY) {
session_key        56 fs/ecryptfs/debug.c 				auth_tok->session_key.decrypted_key_size);
session_key        60 fs/ecryptfs/debug.c 			ecryptfs_dump_hex(auth_tok->session_key.decrypted_key,
session_key        63 fs/ecryptfs/debug.c 	if (auth_tok->session_key.flags & ECRYPTFS_CONTAINS_ENCRYPTED_KEY) {
session_key        67 fs/ecryptfs/debug.c 				auth_tok->session_key.encrypted_key_size);
session_key        71 fs/ecryptfs/debug.c 			ecryptfs_dump_hex(auth_tok->session_key.encrypted_key,
session_key        72 fs/ecryptfs/debug.c 					  auth_tok->session_key.
session_key       144 fs/ecryptfs/keystore.c write_tag_64_packet(char *signature, struct ecryptfs_session_key *session_key,
session_key       162 fs/ecryptfs/keystore.c 		    + session_key->encrypted_key_size);
session_key       182 fs/ecryptfs/keystore.c 					  session_key->encrypted_key_size,
session_key       190 fs/ecryptfs/keystore.c 	memcpy(&message[i], session_key->encrypted_key,
session_key       191 fs/ecryptfs/keystore.c 	       session_key->encrypted_key_size);
session_key       192 fs/ecryptfs/keystore.c 	i += session_key->encrypted_key_size;
session_key       199 fs/ecryptfs/keystore.c parse_tag_65_packet(struct ecryptfs_session_key *session_key, u8 *cipher_code,
session_key       257 fs/ecryptfs/keystore.c 	session_key->decrypted_key_size = m_size - 3;
session_key       258 fs/ecryptfs/keystore.c 	if (session_key->decrypted_key_size > ECRYPTFS_MAX_KEY_BYTES) {
session_key       261 fs/ecryptfs/keystore.c 				session_key->decrypted_key_size,
session_key       266 fs/ecryptfs/keystore.c 	memcpy(session_key->decrypted_key, &data[i],
session_key       267 fs/ecryptfs/keystore.c 	       session_key->decrypted_key_size);
session_key       268 fs/ecryptfs/keystore.c 	i += session_key->decrypted_key_size;
session_key       271 fs/ecryptfs/keystore.c 	for (i = 0; i < session_key->decrypted_key_size; i++)
session_key       272 fs/ecryptfs/keystore.c 		checksum += session_key->decrypted_key[i];
session_key      1142 fs/ecryptfs/keystore.c 	rc = write_tag_64_packet(auth_tok_sig, &(auth_tok->session_key),
session_key      1161 fs/ecryptfs/keystore.c 	rc = parse_tag_65_packet(&(auth_tok->session_key),
session_key      1168 fs/ecryptfs/keystore.c 	auth_tok->session_key.flags |= ECRYPTFS_CONTAINS_DECRYPTED_KEY;
session_key      1169 fs/ecryptfs/keystore.c 	memcpy(crypt_stat->key, auth_tok->session_key.decrypted_key,
session_key      1170 fs/ecryptfs/keystore.c 	       auth_tok->session_key.decrypted_key_size);
session_key      1171 fs/ecryptfs/keystore.c 	crypt_stat->key_size = auth_tok->session_key.decrypted_key_size;
session_key      1300 fs/ecryptfs/keystore.c 	(*new_auth_tok)->session_key.encrypted_key_size =
session_key      1302 fs/ecryptfs/keystore.c 	if ((*new_auth_tok)->session_key.encrypted_key_size
session_key      1309 fs/ecryptfs/keystore.c 	memcpy((*new_auth_tok)->session_key.encrypted_key,
session_key      1311 fs/ecryptfs/keystore.c 	(*packet_size) += (*new_auth_tok)->session_key.encrypted_key_size;
session_key      1312 fs/ecryptfs/keystore.c 	(*new_auth_tok)->session_key.flags &=
session_key      1314 fs/ecryptfs/keystore.c 	(*new_auth_tok)->session_key.flags |=
session_key      1318 fs/ecryptfs/keystore.c 	(*new_auth_tok)->session_key.flags &=
session_key      1320 fs/ecryptfs/keystore.c 	(*new_auth_tok)->session_key.flags &=
session_key      1422 fs/ecryptfs/keystore.c 	(*new_auth_tok)->session_key.encrypted_key_size =
session_key      1424 fs/ecryptfs/keystore.c 	if ((*new_auth_tok)->session_key.encrypted_key_size
session_key      1449 fs/ecryptfs/keystore.c 			(*new_auth_tok)->session_key.encrypted_key_size;
session_key      1474 fs/ecryptfs/keystore.c 		memcpy((*new_auth_tok)->session_key.encrypted_key,
session_key      1476 fs/ecryptfs/keystore.c 		       (*new_auth_tok)->session_key.encrypted_key_size);
session_key      1478 fs/ecryptfs/keystore.c 			(*new_auth_tok)->session_key.encrypted_key_size;
session_key      1479 fs/ecryptfs/keystore.c 		(*new_auth_tok)->session_key.flags &=
session_key      1481 fs/ecryptfs/keystore.c 		(*new_auth_tok)->session_key.flags |=
session_key      1494 fs/ecryptfs/keystore.c 	(*new_auth_tok)->session_key.flags &=
session_key      1496 fs/ecryptfs/keystore.c 	(*new_auth_tok)->session_key.flags &=
session_key      1671 fs/ecryptfs/keystore.c 	rc = virt_to_scatterlist(auth_tok->session_key.encrypted_key,
session_key      1672 fs/ecryptfs/keystore.c 				 auth_tok->session_key.encrypted_key_size,
session_key      1679 fs/ecryptfs/keystore.c 			auth_tok->session_key.encrypted_key_size);
session_key      1682 fs/ecryptfs/keystore.c 	auth_tok->session_key.decrypted_key_size =
session_key      1683 fs/ecryptfs/keystore.c 		auth_tok->session_key.encrypted_key_size;
session_key      1684 fs/ecryptfs/keystore.c 	rc = virt_to_scatterlist(auth_tok->session_key.decrypted_key,
session_key      1685 fs/ecryptfs/keystore.c 				 auth_tok->session_key.decrypted_key_size,
session_key      1716 fs/ecryptfs/keystore.c 				   auth_tok->session_key.encrypted_key_size,
session_key      1724 fs/ecryptfs/keystore.c 	auth_tok->session_key.flags |= ECRYPTFS_CONTAINS_DECRYPTED_KEY;
session_key      1725 fs/ecryptfs/keystore.c 	memcpy(crypt_stat->key, auth_tok->session_key.decrypted_key,
session_key      1726 fs/ecryptfs/keystore.c 	       auth_tok->session_key.decrypted_key_size);
session_key      2035 fs/ecryptfs/keystore.c 			auth_tok->session_key.encrypted_key[i];
session_key      2038 fs/ecryptfs/keystore.c 		       auth_tok->session_key.encrypted_key,
session_key      2039 fs/ecryptfs/keystore.c 		       auth_tok->session_key.encrypted_key_size);
session_key      2044 fs/ecryptfs/keystore.c 	if (auth_tok->session_key.encrypted_key_size == 0)
session_key      2045 fs/ecryptfs/keystore.c 		auth_tok->session_key.encrypted_key_size =
session_key      2214 fs/ecryptfs/keystore.c 	if (auth_tok->session_key.encrypted_key_size == 0)
session_key      2215 fs/ecryptfs/keystore.c 		auth_tok->session_key.encrypted_key_size =
session_key      2220 fs/ecryptfs/keystore.c 		auth_tok->session_key.encrypted_key_size = 32;
session_key      2222 fs/ecryptfs/keystore.c 		auth_tok->session_key.encrypted_key_size = crypt_stat->key_size;
session_key      2224 fs/ecryptfs/keystore.c 		auth_tok->session_key.encrypted_key_size;
session_key      2226 fs/ecryptfs/keystore.c 	for (i = 0; i < auth_tok->session_key.encrypted_key_size; i++)
session_key      2228 fs/ecryptfs/keystore.c 			auth_tok->session_key.encrypted_key[i];
session_key      2235 fs/ecryptfs/keystore.c 		       auth_tok->session_key.encrypted_key,
session_key        30 include/keys/rxrpc-type.h 	u8	session_key[8];		/* DES session key */
session_key       102 include/keys/rxrpc-type.h 	u8		session_key[8];
session_key        98 include/linux/ecryptfs.h 	struct ecryptfs_session_key session_key;
session_key       151 net/ceph/auth_x.c 	ceph_crypto_key_destroy(&th->session_key);
session_key       220 net/ceph/auth_x.c 		ret = ceph_x_decrypt(&th->session_key, p, end);
session_key       244 net/ceph/auth_x.c 	ceph_crypto_key_destroy(&th->session_key);
session_key       247 net/ceph/auth_x.c 	th->session_key = new_session_key;
session_key       324 net/ceph/auth_x.c 	ret = ceph_x_encrypt(&au->session_key, p, end - p, sizeof(*msg_b));
session_key       341 net/ceph/auth_x.c 	ceph_crypto_key_destroy(&au->session_key);
session_key       362 net/ceph/auth_x.c 	ceph_crypto_key_destroy(&au->session_key);
session_key       363 net/ceph/auth_x.c 	ret = ceph_crypto_key_clone(&au->session_key, &th->session_key);
session_key       604 net/ceph/auth_x.c 		ret = ceph_x_proc_ticket_reply(ac, &th->session_key,
session_key       691 net/ceph/auth_x.c 	ret = __ceph_x_decrypt(&au->session_key, challenge_buf,
session_key       737 net/ceph/auth_x.c 	ret = ceph_x_decrypt(&au->session_key, &p, p + CEPHX_AU_ENC_BUF_LEN);
session_key       826 net/ceph/auth_x.c 		ret = ceph_x_encrypt(&au->session_key, enc_buf,
session_key       858 net/ceph/auth_x.c 		ret = ceph_crypt(&au->session_key, true, enc_buf,
session_key        19 net/ceph/auth_x.h 	struct ceph_crypto_key session_key;
session_key        32 net/ceph/auth_x.h 	struct ceph_crypto_key session_key;
session_key       131 net/rxrpc/key.c 	memcpy(&token->kad->session_key, &xdr[2], 8);
session_key       140 net/rxrpc/key.c 	       token->kad->session_key[0], token->kad->session_key[1],
session_key       141 net/rxrpc/key.c 	       token->kad->session_key[2], token->kad->session_key[3],
session_key       142 net/rxrpc/key.c 	       token->kad->session_key[4], token->kad->session_key[5],
session_key       143 net/rxrpc/key.c 	       token->kad->session_key[6], token->kad->session_key[7]);
session_key       742 net/rxrpc/key.c 	       v1->session_key[0], v1->session_key[1],
session_key       743 net/rxrpc/key.c 	       v1->session_key[2], v1->session_key[3],
session_key       744 net/rxrpc/key.c 	       v1->session_key[4], v1->session_key[5],
session_key       745 net/rxrpc/key.c 	       v1->session_key[6], v1->session_key[7]);
session_key       772 net/rxrpc/key.c 	memcpy(&token->kad->session_key, &v1->session_key, 8);
session_key       961 net/rxrpc/key.c 			      const void *session_key,
session_key       992 net/rxrpc/key.c 	memcpy(&data.v1.session_key, session_key, sizeof(data.v1.session_key));
session_key      1169 net/rxrpc/key.c 			ENCODE_DATA(8, token->kad->session_key);
session_key        70 net/rxrpc/rxkad.c 	if (crypto_sync_skcipher_setkey(ci, token->kad->session_key,
session_key        71 net/rxrpc/rxkad.c 				   sizeof(token->kad->session_key)) < 0)
session_key       126 net/rxrpc/rxkad.c 	memcpy(&iv, token->kad->session_key, sizeof(iv));
session_key       242 net/rxrpc/rxkad.c 	memcpy(&iv, token->kad->session_key, sizeof(iv));
session_key       473 net/rxrpc/rxkad.c 	memcpy(&iv, token->kad->session_key, sizeof(iv));
session_key       793 net/rxrpc/rxkad.c 	memcpy(&iv, s2->session_key, sizeof(iv));
session_key      1054 net/rxrpc/rxkad.c 				   const struct rxrpc_crypt *session_key)
session_key      1061 net/rxrpc/rxkad.c 	       ntohl(session_key->n[0]), ntohl(session_key->n[1]));
session_key      1064 net/rxrpc/rxkad.c 	if (crypto_sync_skcipher_setkey(rxkad_ci, session_key->x,
session_key      1065 net/rxrpc/rxkad.c 					sizeof(*session_key)) < 0)
session_key      1068 net/rxrpc/rxkad.c 	memcpy(&iv, session_key, sizeof(iv));
session_key      1092 net/rxrpc/rxkad.c 	struct rxrpc_crypt session_key;
session_key      1148 net/rxrpc/rxkad.c 	ret = rxkad_decrypt_ticket(conn, skb, ticket, ticket_len, &session_key,
session_key      1155 net/rxrpc/rxkad.c 	rxkad_decrypt_response(conn, response, &session_key);
session_key      1212 net/rxrpc/rxkad.c 	ret = rxrpc_get_server_data_key(conn, &session_key, expiry, kvno);
session_key        70 security/keys/encrypted-keys/ecryptfs_format.c 	auth_tok->session_key.encrypted_key[0] = 0;
session_key        71 security/keys/encrypted-keys/ecryptfs_format.c 	auth_tok->session_key.encrypted_key_size = 0;