session_key 96 drivers/net/ppp/ppp_mppe.c unsigned char session_key[MPPE_MAX_KEY_LEN]; session_key 138 drivers/net/ppp/ppp_mppe.c crypto_shash_update(state->sha1, state->session_key, session_key 154 drivers/net/ppp/ppp_mppe.c arc4_crypt(&state->arc4, state->session_key, state->sha1_digest, session_key 157 drivers/net/ppp/ppp_mppe.c memcpy(state->session_key, state->sha1_digest, state->keylen); session_key 161 drivers/net/ppp/ppp_mppe.c state->session_key[0] = 0xd1; session_key 162 drivers/net/ppp/ppp_mppe.c state->session_key[1] = 0x26; session_key 163 drivers/net/ppp/ppp_mppe.c state->session_key[2] = 0x9e; session_key 165 drivers/net/ppp/ppp_mppe.c arc4_setkey(&state->arc4, state->session_key, state->keylen); session_key 211 drivers/net/ppp/ppp_mppe.c memcpy(state->session_key, state->master_key, session_key 284 drivers/net/ppp/ppp_mppe.c (int)sizeof(state->session_key), state->session_key); session_key 132 fs/cifs/cifsencrypt.c server->session_key.response, server->session_key.len); session_key 716 fs/cifs/cifsglob.h struct session_key session_key; session_key 980 fs/cifs/cifsglob.h struct session_key auth_key; session_key 579 fs/cifs/connect.c kfree(server->session_key.response); session_key 580 fs/cifs/connect.c server->session_key.response = NULL; session_key 581 fs/cifs/connect.c server->session_key.len = 0; session_key 2742 fs/cifs/connect.c kfree(server->session_key.response); session_key 2743 fs/cifs/connect.c server->session_key.response = NULL; session_key 2744 fs/cifs/connect.c server->session_key.len = 0; session_key 637 fs/cifs/sess.c ses->server->session_key.response = session_key 640 fs/cifs/sess.c if (!ses->server->session_key.response) { session_key 644 fs/cifs/sess.c ses->server->session_key.len = session_key 43 fs/ecryptfs/debug.c auth_tok->session_key.flags); session_key 44 fs/ecryptfs/debug.c if (auth_tok->session_key.flags session_key 48 fs/ecryptfs/debug.c if (auth_tok->session_key.flags session_key 52 fs/ecryptfs/debug.c if (auth_tok->session_key.flags & ECRYPTFS_CONTAINS_DECRYPTED_KEY) { session_key 56 fs/ecryptfs/debug.c auth_tok->session_key.decrypted_key_size); session_key 60 fs/ecryptfs/debug.c ecryptfs_dump_hex(auth_tok->session_key.decrypted_key, session_key 63 fs/ecryptfs/debug.c if (auth_tok->session_key.flags & ECRYPTFS_CONTAINS_ENCRYPTED_KEY) { session_key 67 fs/ecryptfs/debug.c auth_tok->session_key.encrypted_key_size); session_key 71 fs/ecryptfs/debug.c ecryptfs_dump_hex(auth_tok->session_key.encrypted_key, session_key 72 fs/ecryptfs/debug.c auth_tok->session_key. session_key 144 fs/ecryptfs/keystore.c write_tag_64_packet(char *signature, struct ecryptfs_session_key *session_key, session_key 162 fs/ecryptfs/keystore.c + session_key->encrypted_key_size); session_key 182 fs/ecryptfs/keystore.c session_key->encrypted_key_size, session_key 190 fs/ecryptfs/keystore.c memcpy(&message[i], session_key->encrypted_key, session_key 191 fs/ecryptfs/keystore.c session_key->encrypted_key_size); session_key 192 fs/ecryptfs/keystore.c i += session_key->encrypted_key_size; session_key 199 fs/ecryptfs/keystore.c parse_tag_65_packet(struct ecryptfs_session_key *session_key, u8 *cipher_code, session_key 257 fs/ecryptfs/keystore.c session_key->decrypted_key_size = m_size - 3; session_key 258 fs/ecryptfs/keystore.c if (session_key->decrypted_key_size > ECRYPTFS_MAX_KEY_BYTES) { session_key 261 fs/ecryptfs/keystore.c session_key->decrypted_key_size, session_key 266 fs/ecryptfs/keystore.c memcpy(session_key->decrypted_key, &data[i], session_key 267 fs/ecryptfs/keystore.c session_key->decrypted_key_size); session_key 268 fs/ecryptfs/keystore.c i += session_key->decrypted_key_size; session_key 271 fs/ecryptfs/keystore.c for (i = 0; i < session_key->decrypted_key_size; i++) session_key 272 fs/ecryptfs/keystore.c checksum += session_key->decrypted_key[i]; session_key 1142 fs/ecryptfs/keystore.c rc = write_tag_64_packet(auth_tok_sig, &(auth_tok->session_key), session_key 1161 fs/ecryptfs/keystore.c rc = parse_tag_65_packet(&(auth_tok->session_key), session_key 1168 fs/ecryptfs/keystore.c auth_tok->session_key.flags |= ECRYPTFS_CONTAINS_DECRYPTED_KEY; session_key 1169 fs/ecryptfs/keystore.c memcpy(crypt_stat->key, auth_tok->session_key.decrypted_key, session_key 1170 fs/ecryptfs/keystore.c auth_tok->session_key.decrypted_key_size); session_key 1171 fs/ecryptfs/keystore.c crypt_stat->key_size = auth_tok->session_key.decrypted_key_size; session_key 1300 fs/ecryptfs/keystore.c (*new_auth_tok)->session_key.encrypted_key_size = session_key 1302 fs/ecryptfs/keystore.c if ((*new_auth_tok)->session_key.encrypted_key_size session_key 1309 fs/ecryptfs/keystore.c memcpy((*new_auth_tok)->session_key.encrypted_key, session_key 1311 fs/ecryptfs/keystore.c (*packet_size) += (*new_auth_tok)->session_key.encrypted_key_size; session_key 1312 fs/ecryptfs/keystore.c (*new_auth_tok)->session_key.flags &= session_key 1314 fs/ecryptfs/keystore.c (*new_auth_tok)->session_key.flags |= session_key 1318 fs/ecryptfs/keystore.c (*new_auth_tok)->session_key.flags &= session_key 1320 fs/ecryptfs/keystore.c (*new_auth_tok)->session_key.flags &= session_key 1422 fs/ecryptfs/keystore.c (*new_auth_tok)->session_key.encrypted_key_size = session_key 1424 fs/ecryptfs/keystore.c if ((*new_auth_tok)->session_key.encrypted_key_size session_key 1449 fs/ecryptfs/keystore.c (*new_auth_tok)->session_key.encrypted_key_size; session_key 1474 fs/ecryptfs/keystore.c memcpy((*new_auth_tok)->session_key.encrypted_key, session_key 1476 fs/ecryptfs/keystore.c (*new_auth_tok)->session_key.encrypted_key_size); session_key 1478 fs/ecryptfs/keystore.c (*new_auth_tok)->session_key.encrypted_key_size; session_key 1479 fs/ecryptfs/keystore.c (*new_auth_tok)->session_key.flags &= session_key 1481 fs/ecryptfs/keystore.c (*new_auth_tok)->session_key.flags |= session_key 1494 fs/ecryptfs/keystore.c (*new_auth_tok)->session_key.flags &= session_key 1496 fs/ecryptfs/keystore.c (*new_auth_tok)->session_key.flags &= session_key 1671 fs/ecryptfs/keystore.c rc = virt_to_scatterlist(auth_tok->session_key.encrypted_key, session_key 1672 fs/ecryptfs/keystore.c auth_tok->session_key.encrypted_key_size, session_key 1679 fs/ecryptfs/keystore.c auth_tok->session_key.encrypted_key_size); session_key 1682 fs/ecryptfs/keystore.c auth_tok->session_key.decrypted_key_size = session_key 1683 fs/ecryptfs/keystore.c auth_tok->session_key.encrypted_key_size; session_key 1684 fs/ecryptfs/keystore.c rc = virt_to_scatterlist(auth_tok->session_key.decrypted_key, session_key 1685 fs/ecryptfs/keystore.c auth_tok->session_key.decrypted_key_size, session_key 1716 fs/ecryptfs/keystore.c auth_tok->session_key.encrypted_key_size, session_key 1724 fs/ecryptfs/keystore.c auth_tok->session_key.flags |= ECRYPTFS_CONTAINS_DECRYPTED_KEY; session_key 1725 fs/ecryptfs/keystore.c memcpy(crypt_stat->key, auth_tok->session_key.decrypted_key, session_key 1726 fs/ecryptfs/keystore.c auth_tok->session_key.decrypted_key_size); session_key 2035 fs/ecryptfs/keystore.c auth_tok->session_key.encrypted_key[i]; session_key 2038 fs/ecryptfs/keystore.c auth_tok->session_key.encrypted_key, session_key 2039 fs/ecryptfs/keystore.c auth_tok->session_key.encrypted_key_size); session_key 2044 fs/ecryptfs/keystore.c if (auth_tok->session_key.encrypted_key_size == 0) session_key 2045 fs/ecryptfs/keystore.c auth_tok->session_key.encrypted_key_size = session_key 2214 fs/ecryptfs/keystore.c if (auth_tok->session_key.encrypted_key_size == 0) session_key 2215 fs/ecryptfs/keystore.c auth_tok->session_key.encrypted_key_size = session_key 2220 fs/ecryptfs/keystore.c auth_tok->session_key.encrypted_key_size = 32; session_key 2222 fs/ecryptfs/keystore.c auth_tok->session_key.encrypted_key_size = crypt_stat->key_size; session_key 2224 fs/ecryptfs/keystore.c auth_tok->session_key.encrypted_key_size; session_key 2226 fs/ecryptfs/keystore.c for (i = 0; i < auth_tok->session_key.encrypted_key_size; i++) session_key 2228 fs/ecryptfs/keystore.c auth_tok->session_key.encrypted_key[i]; session_key 2235 fs/ecryptfs/keystore.c auth_tok->session_key.encrypted_key, session_key 30 include/keys/rxrpc-type.h u8 session_key[8]; /* DES session key */ session_key 102 include/keys/rxrpc-type.h u8 session_key[8]; session_key 98 include/linux/ecryptfs.h struct ecryptfs_session_key session_key; session_key 151 net/ceph/auth_x.c ceph_crypto_key_destroy(&th->session_key); session_key 220 net/ceph/auth_x.c ret = ceph_x_decrypt(&th->session_key, p, end); session_key 244 net/ceph/auth_x.c ceph_crypto_key_destroy(&th->session_key); session_key 247 net/ceph/auth_x.c th->session_key = new_session_key; session_key 324 net/ceph/auth_x.c ret = ceph_x_encrypt(&au->session_key, p, end - p, sizeof(*msg_b)); session_key 341 net/ceph/auth_x.c ceph_crypto_key_destroy(&au->session_key); session_key 362 net/ceph/auth_x.c ceph_crypto_key_destroy(&au->session_key); session_key 363 net/ceph/auth_x.c ret = ceph_crypto_key_clone(&au->session_key, &th->session_key); session_key 604 net/ceph/auth_x.c ret = ceph_x_proc_ticket_reply(ac, &th->session_key, session_key 691 net/ceph/auth_x.c ret = __ceph_x_decrypt(&au->session_key, challenge_buf, session_key 737 net/ceph/auth_x.c ret = ceph_x_decrypt(&au->session_key, &p, p + CEPHX_AU_ENC_BUF_LEN); session_key 826 net/ceph/auth_x.c ret = ceph_x_encrypt(&au->session_key, enc_buf, session_key 858 net/ceph/auth_x.c ret = ceph_crypt(&au->session_key, true, enc_buf, session_key 19 net/ceph/auth_x.h struct ceph_crypto_key session_key; session_key 32 net/ceph/auth_x.h struct ceph_crypto_key session_key; session_key 131 net/rxrpc/key.c memcpy(&token->kad->session_key, &xdr[2], 8); session_key 140 net/rxrpc/key.c token->kad->session_key[0], token->kad->session_key[1], session_key 141 net/rxrpc/key.c token->kad->session_key[2], token->kad->session_key[3], session_key 142 net/rxrpc/key.c token->kad->session_key[4], token->kad->session_key[5], session_key 143 net/rxrpc/key.c token->kad->session_key[6], token->kad->session_key[7]); session_key 742 net/rxrpc/key.c v1->session_key[0], v1->session_key[1], session_key 743 net/rxrpc/key.c v1->session_key[2], v1->session_key[3], session_key 744 net/rxrpc/key.c v1->session_key[4], v1->session_key[5], session_key 745 net/rxrpc/key.c v1->session_key[6], v1->session_key[7]); session_key 772 net/rxrpc/key.c memcpy(&token->kad->session_key, &v1->session_key, 8); session_key 961 net/rxrpc/key.c const void *session_key, session_key 992 net/rxrpc/key.c memcpy(&data.v1.session_key, session_key, sizeof(data.v1.session_key)); session_key 1169 net/rxrpc/key.c ENCODE_DATA(8, token->kad->session_key); session_key 70 net/rxrpc/rxkad.c if (crypto_sync_skcipher_setkey(ci, token->kad->session_key, session_key 71 net/rxrpc/rxkad.c sizeof(token->kad->session_key)) < 0) session_key 126 net/rxrpc/rxkad.c memcpy(&iv, token->kad->session_key, sizeof(iv)); session_key 242 net/rxrpc/rxkad.c memcpy(&iv, token->kad->session_key, sizeof(iv)); session_key 473 net/rxrpc/rxkad.c memcpy(&iv, token->kad->session_key, sizeof(iv)); session_key 793 net/rxrpc/rxkad.c memcpy(&iv, s2->session_key, sizeof(iv)); session_key 1054 net/rxrpc/rxkad.c const struct rxrpc_crypt *session_key) session_key 1061 net/rxrpc/rxkad.c ntohl(session_key->n[0]), ntohl(session_key->n[1])); session_key 1064 net/rxrpc/rxkad.c if (crypto_sync_skcipher_setkey(rxkad_ci, session_key->x, session_key 1065 net/rxrpc/rxkad.c sizeof(*session_key)) < 0) session_key 1068 net/rxrpc/rxkad.c memcpy(&iv, session_key, sizeof(iv)); session_key 1092 net/rxrpc/rxkad.c struct rxrpc_crypt session_key; session_key 1148 net/rxrpc/rxkad.c ret = rxkad_decrypt_ticket(conn, skb, ticket, ticket_len, &session_key, session_key 1155 net/rxrpc/rxkad.c rxkad_decrypt_response(conn, response, &session_key); session_key 1212 net/rxrpc/rxkad.c ret = rxrpc_get_server_data_key(conn, &session_key, expiry, kvno); session_key 70 security/keys/encrypted-keys/ecryptfs_format.c auth_tok->session_key.encrypted_key[0] = 0; session_key 71 security/keys/encrypted-keys/ecryptfs_format.c auth_tok->session_key.encrypted_key_size = 0;