Lines Matching defs:crypt_stat
286 struct ecryptfs_crypt_stat *crypt_stat, char **packet,
305 data_len = (5 + ECRYPTFS_SIG_SIZE_HEX + crypt_stat->key_size);
325 rc = ecryptfs_write_packet_length(&message[i], crypt_stat->key_size + 3,
334 memcpy(&message[i], crypt_stat->key, crypt_stat->key_size);
335 i += crypt_stat->key_size;
336 for (j = 0; j < crypt_stat->key_size; j++)
337 checksum += crypt_stat->key[j];
540 * @crypt_stat: inode crypt_stat crypto context
1120 * @crypt_stat: The cryptographic context
1126 struct ecryptfs_crypt_stat *crypt_stat)
1169 memcpy(crypt_stat->key, auth_tok->session_key.decrypted_key,
1171 crypt_stat->key_size = auth_tok->session_key.decrypted_key_size;
1172 rc = ecryptfs_cipher_code_to_string(crypt_stat->cipher, cipher_code);
1178 crypt_stat->flags |= ECRYPTFS_KEY_VALID;
1181 ecryptfs_dump_hex(crypt_stat->key,
1182 crypt_stat->key_size);
1207 * @crypt_stat: The cryptographic context to modify based on packet contents
1223 parse_tag_1_packet(struct ecryptfs_crypt_stat *crypt_stat,
1338 * @crypt_stat: The cryptographic context to modify based on packet
1355 parse_tag_3_packet(struct ecryptfs_crypt_stat *crypt_stat,
1437 rc = ecryptfs_cipher_code_to_string(crypt_stat->cipher,
1445 crypt_stat->key_size = 24;
1448 crypt_stat->key_size =
1451 rc = ecryptfs_init_crypt_ctx(crypt_stat);
1640 * @crypt_stat: The cryptographic context
1646 struct ecryptfs_crypt_stat *crypt_stat)
1664 crypt_stat->cipher);
1668 crypt_stat->cipher, rc);
1708 crypt_stat->key_size);
1725 memcpy(crypt_stat->key, auth_tok->session_key.decrypted_key,
1727 crypt_stat->flags |= ECRYPTFS_KEY_VALID;
1730 crypt_stat->key_size);
1731 ecryptfs_dump_hex(crypt_stat->key,
1732 crypt_stat->key_size);
1741 * @crypt_stat: The cryptographic context
1745 * Get crypt_stat to have the file's session key if the requisite key
1752 int ecryptfs_parse_packet_set(struct ecryptfs_crypt_stat *crypt_stat,
1781 rc = parse_tag_3_packet(crypt_stat,
1822 crypt_stat->flags |= ECRYPTFS_ENCRYPTED;
1825 rc = parse_tag_1_packet(crypt_stat,
1836 crypt_stat->flags |= ECRYPTFS_ENCRYPTED;
1883 crypt_stat->mount_crypt_stat,
1904 crypt_stat);
1912 candidate_auth_tok, crypt_stat);
1941 rc = ecryptfs_compute_root_iv(crypt_stat);
1947 rc = ecryptfs_init_crypt_ctx(crypt_stat);
1951 crypt_stat->cipher, rc);
1962 struct ecryptfs_crypt_stat *crypt_stat,
1973 crypt_stat->cipher,
1974 crypt_stat->key_size),
1975 crypt_stat, &payload, &payload_len);
2010 * @crypt_stat: The cryptographic context
2020 struct ecryptfs_crypt_stat *crypt_stat,
2033 for (i = 0; i < crypt_stat->key_size; i++)
2047 rc = pki_encrypt_session_key(auth_tok_key, auth_tok, crypt_stat,
2165 * @crypt_stat: The cryptographic context
2175 struct ecryptfs_crypt_stat *crypt_stat,
2188 crypt_stat->mount_crypt_stat;
2197 crypt_stat->cipher);
2201 crypt_stat->cipher, rc);
2211 if (crypt_stat->key_size == 0)
2212 crypt_stat->key_size =
2216 crypt_stat->key_size;
2217 if (crypt_stat->key_size == 24
2218 && strcmp("aes", crypt_stat->cipher) == 0) {
2219 memset((crypt_stat->key + 24), 0, 8);
2222 auth_tok->session_key.encrypted_key_size = crypt_stat->key_size;
2247 crypt_stat->key_size);
2257 rc = virt_to_scatterlist(crypt_stat->key, key_rec->enc_key_size,
2261 "for crypt_stat session key; expected rc = 1; "
2271 "for crypt_stat encrypted session key; "
2280 crypt_stat->key_size);
2303 crypt_stat->key_size);
2354 cipher_code = ecryptfs_code_for_cipher_string(crypt_stat->cipher,
2355 crypt_stat->key_size);
2358 "cipher [%s]\n", crypt_stat->cipher);
2385 * @crypt_stat: The cryptographic context from which the
2399 struct ecryptfs_crypt_stat *crypt_stat,
2414 mutex_lock(&crypt_stat->keysig_list_mutex);
2420 list_for_each_entry(key_sig, &crypt_stat->keysig_list,
2436 crypt_stat, key_rec,
2459 crypt_stat, key_rec, &written);
2486 mutex_unlock(&crypt_stat->keysig_list_mutex);
2492 int ecryptfs_add_keysig(struct ecryptfs_crypt_stat *crypt_stat, char *sig)
2503 list_add(&new_key_sig->crypt_stat_list, &crypt_stat->keysig_list);