Lines Matching defs:session_key
144 write_tag_64_packet(char *signature, struct ecryptfs_session_key *session_key,
162 + session_key->encrypted_key_size);
182 session_key->encrypted_key_size,
190 memcpy(&message[i], session_key->encrypted_key,
191 session_key->encrypted_key_size);
192 i += session_key->encrypted_key_size;
199 parse_tag_65_packet(struct ecryptfs_session_key *session_key, u8 *cipher_code,
257 session_key->decrypted_key_size = m_size - 3;
258 if (session_key->decrypted_key_size > ECRYPTFS_MAX_KEY_BYTES) {
261 session_key->decrypted_key_size,
266 memcpy(session_key->decrypted_key, &data[i],
267 session_key->decrypted_key_size);
268 i += session_key->decrypted_key_size;
271 for (i = 0; i < session_key->decrypted_key_size; i++)
272 checksum += session_key->decrypted_key[i];
1142 rc = write_tag_64_packet(auth_tok_sig, &(auth_tok->session_key),
1161 rc = parse_tag_65_packet(&(auth_tok->session_key),
1168 auth_tok->session_key.flags |= ECRYPTFS_CONTAINS_DECRYPTED_KEY;
1169 memcpy(crypt_stat->key, auth_tok->session_key.decrypted_key,
1170 auth_tok->session_key.decrypted_key_size);
1171 crypt_stat->key_size = auth_tok->session_key.decrypted_key_size;
1300 (*new_auth_tok)->session_key.encrypted_key_size =
1302 if ((*new_auth_tok)->session_key.encrypted_key_size
1309 memcpy((*new_auth_tok)->session_key.encrypted_key,
1311 (*packet_size) += (*new_auth_tok)->session_key.encrypted_key_size;
1312 (*new_auth_tok)->session_key.flags &=
1314 (*new_auth_tok)->session_key.flags |=
1318 (*new_auth_tok)->session_key.flags &=
1320 (*new_auth_tok)->session_key.flags &=
1422 (*new_auth_tok)->session_key.encrypted_key_size =
1424 if ((*new_auth_tok)->session_key.encrypted_key_size
1449 (*new_auth_tok)->session_key.encrypted_key_size;
1472 * (*new_auth_tok)->session_key.encrypted_key_size =
1474 memcpy((*new_auth_tok)->session_key.encrypted_key,
1476 (*new_auth_tok)->session_key.encrypted_key_size);
1478 (*new_auth_tok)->session_key.encrypted_key_size;
1479 (*new_auth_tok)->session_key.flags &=
1481 (*new_auth_tok)->session_key.flags |=
1494 (*new_auth_tok)->session_key.flags &=
1496 (*new_auth_tok)->session_key.flags &=
1671 rc = virt_to_scatterlist(auth_tok->session_key.encrypted_key,
1672 auth_tok->session_key.encrypted_key_size,
1676 "auth_tok->session_key.encrypted_key to scatterlist; "
1678 "auth_tok->session_key.encrypted_key_size = [%d]\n", rc,
1679 auth_tok->session_key.encrypted_key_size);
1682 auth_tok->session_key.decrypted_key_size =
1683 auth_tok->session_key.encrypted_key_size;
1684 rc = virt_to_scatterlist(auth_tok->session_key.decrypted_key,
1685 auth_tok->session_key.decrypted_key_size,
1689 "auth_tok->session_key.decrypted_key to scatterlist; "
1716 auth_tok->session_key.encrypted_key_size,
1724 auth_tok->session_key.flags |= ECRYPTFS_CONTAINS_DECRYPTED_KEY;
1725 memcpy(crypt_stat->key, auth_tok->session_key.decrypted_key,
1726 auth_tok->session_key.decrypted_key_size);
2035 auth_tok->session_key.encrypted_key[i];
2038 auth_tok->session_key.encrypted_key,
2039 auth_tok->session_key.encrypted_key_size);
2044 if (auth_tok->session_key.encrypted_key_size == 0)
2045 auth_tok->session_key.encrypted_key_size =
2214 if (auth_tok->session_key.encrypted_key_size == 0)
2215 auth_tok->session_key.encrypted_key_size =
2220 auth_tok->session_key.encrypted_key_size = 32;
2222 auth_tok->session_key.encrypted_key_size = crypt_stat->key_size;
2224 auth_tok->session_key.encrypted_key_size;
2226 for (i = 0; i < auth_tok->session_key.encrypted_key_size; i++)
2228 auth_tok->session_key.encrypted_key[i];
2231 "using auth_tok->session_key.encrypted_key, "
2235 auth_tok->session_key.encrypted_key,