Lines Matching defs:crypt_stat

286 		    struct ecryptfs_crypt_stat *crypt_stat, char **packet,
305 data_len = (5 + ECRYPTFS_SIG_SIZE_HEX + crypt_stat->key_size);
325 rc = ecryptfs_write_packet_length(&message[i], crypt_stat->key_size + 3,
334 memcpy(&message[i], crypt_stat->key, crypt_stat->key_size);
335 i += crypt_stat->key_size;
336 for (j = 0; j < crypt_stat->key_size; j++)
337 checksum += crypt_stat->key[j];
541 * @mount_crypt_stat: inode crypt_stat crypto context
1121 * @crypt_stat: The cryptographic context
1127 struct ecryptfs_crypt_stat *crypt_stat)
1170 memcpy(crypt_stat->key, auth_tok->session_key.decrypted_key,
1172 crypt_stat->key_size = auth_tok->session_key.decrypted_key_size;
1173 rc = ecryptfs_cipher_code_to_string(crypt_stat->cipher, cipher_code);
1179 crypt_stat->flags |= ECRYPTFS_KEY_VALID;
1182 ecryptfs_dump_hex(crypt_stat->key,
1183 crypt_stat->key_size);
1208 * @crypt_stat: The cryptographic context to modify based on packet contents
1224 parse_tag_1_packet(struct ecryptfs_crypt_stat *crypt_stat,
1339 * @crypt_stat: The cryptographic context to modify based on packet
1356 parse_tag_3_packet(struct ecryptfs_crypt_stat *crypt_stat,
1438 rc = ecryptfs_cipher_code_to_string(crypt_stat->cipher,
1446 crypt_stat->key_size = 24;
1449 crypt_stat->key_size =
1452 rc = ecryptfs_init_crypt_ctx(crypt_stat);
1641 * @crypt_stat: The cryptographic context
1647 struct ecryptfs_crypt_stat *crypt_stat)
1665 crypt_stat->cipher);
1669 crypt_stat->cipher, rc);
1709 crypt_stat->key_size);
1726 memcpy(crypt_stat->key, auth_tok->session_key.decrypted_key,
1728 crypt_stat->flags |= ECRYPTFS_KEY_VALID;
1731 crypt_stat->key_size);
1732 ecryptfs_dump_hex(crypt_stat->key,
1733 crypt_stat->key_size);
1742 * @crypt_stat: The cryptographic context
1746 * Get crypt_stat to have the file's session key if the requisite key
1753 int ecryptfs_parse_packet_set(struct ecryptfs_crypt_stat *crypt_stat,
1782 rc = parse_tag_3_packet(crypt_stat,
1823 crypt_stat->flags |= ECRYPTFS_ENCRYPTED;
1826 rc = parse_tag_1_packet(crypt_stat,
1837 crypt_stat->flags |= ECRYPTFS_ENCRYPTED;
1884 crypt_stat->mount_crypt_stat,
1905 crypt_stat);
1913 candidate_auth_tok, crypt_stat);
1942 rc = ecryptfs_compute_root_iv(crypt_stat);
1948 rc = ecryptfs_init_crypt_ctx(crypt_stat);
1952 crypt_stat->cipher, rc);
1963 struct ecryptfs_crypt_stat *crypt_stat,
1974 crypt_stat->cipher,
1975 crypt_stat->key_size),
1976 crypt_stat, &payload, &payload_len);
2011 * @crypt_stat: The cryptographic context
2021 struct ecryptfs_crypt_stat *crypt_stat,
2034 for (i = 0; i < crypt_stat->key_size; i++)
2048 rc = pki_encrypt_session_key(auth_tok_key, auth_tok, crypt_stat,
2166 * @crypt_stat: The cryptographic context
2176 struct ecryptfs_crypt_stat *crypt_stat,
2189 crypt_stat->mount_crypt_stat;
2198 crypt_stat->cipher);
2202 crypt_stat->cipher, rc);
2212 if (crypt_stat->key_size == 0)
2213 crypt_stat->key_size =
2217 crypt_stat->key_size;
2218 if (crypt_stat->key_size == 24
2219 && strcmp("aes", crypt_stat->cipher) == 0) {
2220 memset((crypt_stat->key + 24), 0, 8);
2223 auth_tok->session_key.encrypted_key_size = crypt_stat->key_size;
2248 crypt_stat->key_size);
2258 rc = virt_to_scatterlist(crypt_stat->key, key_rec->enc_key_size,
2262 "for crypt_stat session key; expected rc = 1; "
2272 "for crypt_stat encrypted session key; "
2281 crypt_stat->key_size);
2304 crypt_stat->key_size);
2355 cipher_code = ecryptfs_code_for_cipher_string(crypt_stat->cipher,
2356 crypt_stat->key_size);
2359 "cipher [%s]\n", crypt_stat->cipher);
2386 * @crypt_stat: The cryptographic context from which the
2400 struct ecryptfs_crypt_stat *crypt_stat,
2415 mutex_lock(&crypt_stat->keysig_list_mutex);
2421 list_for_each_entry(key_sig, &crypt_stat->keysig_list,
2437 crypt_stat, key_rec,
2460 crypt_stat, key_rec, &written);
2487 mutex_unlock(&crypt_stat->keysig_list_mutex);
2493 int ecryptfs_add_keysig(struct ecryptfs_crypt_stat *crypt_stat, char *sig)
2504 list_add(&new_key_sig->crypt_stat_list, &crypt_stat->keysig_list);