Lines Matching defs:session_key

144 write_tag_64_packet(char *signature, struct ecryptfs_session_key *session_key,
162 + session_key->encrypted_key_size);
182 session_key->encrypted_key_size,
190 memcpy(&message[i], session_key->encrypted_key,
191 session_key->encrypted_key_size);
192 i += session_key->encrypted_key_size;
199 parse_tag_65_packet(struct ecryptfs_session_key *session_key, u8 *cipher_code,
257 session_key->decrypted_key_size = m_size - 3;
258 if (session_key->decrypted_key_size > ECRYPTFS_MAX_KEY_BYTES) {
261 session_key->decrypted_key_size,
266 memcpy(session_key->decrypted_key, &data[i],
267 session_key->decrypted_key_size);
268 i += session_key->decrypted_key_size;
271 for (i = 0; i < session_key->decrypted_key_size; i++)
272 checksum += session_key->decrypted_key[i];
1143 rc = write_tag_64_packet(auth_tok_sig, &(auth_tok->session_key),
1162 rc = parse_tag_65_packet(&(auth_tok->session_key),
1169 auth_tok->session_key.flags |= ECRYPTFS_CONTAINS_DECRYPTED_KEY;
1170 memcpy(crypt_stat->key, auth_tok->session_key.decrypted_key,
1171 auth_tok->session_key.decrypted_key_size);
1172 crypt_stat->key_size = auth_tok->session_key.decrypted_key_size;
1301 (*new_auth_tok)->session_key.encrypted_key_size =
1303 if ((*new_auth_tok)->session_key.encrypted_key_size
1310 memcpy((*new_auth_tok)->session_key.encrypted_key,
1312 (*packet_size) += (*new_auth_tok)->session_key.encrypted_key_size;
1313 (*new_auth_tok)->session_key.flags &=
1315 (*new_auth_tok)->session_key.flags |=
1319 (*new_auth_tok)->session_key.flags &=
1321 (*new_auth_tok)->session_key.flags &=
1423 (*new_auth_tok)->session_key.encrypted_key_size =
1425 if ((*new_auth_tok)->session_key.encrypted_key_size
1450 (*new_auth_tok)->session_key.encrypted_key_size;
1473 * (*new_auth_tok)->session_key.encrypted_key_size =
1475 memcpy((*new_auth_tok)->session_key.encrypted_key,
1477 (*new_auth_tok)->session_key.encrypted_key_size);
1479 (*new_auth_tok)->session_key.encrypted_key_size;
1480 (*new_auth_tok)->session_key.flags &=
1482 (*new_auth_tok)->session_key.flags |=
1495 (*new_auth_tok)->session_key.flags &=
1497 (*new_auth_tok)->session_key.flags &=
1672 rc = virt_to_scatterlist(auth_tok->session_key.encrypted_key,
1673 auth_tok->session_key.encrypted_key_size,
1677 "auth_tok->session_key.encrypted_key to scatterlist; "
1679 "auth_tok->session_key.encrypted_key_size = [%d]\n", rc,
1680 auth_tok->session_key.encrypted_key_size);
1683 auth_tok->session_key.decrypted_key_size =
1684 auth_tok->session_key.encrypted_key_size;
1685 rc = virt_to_scatterlist(auth_tok->session_key.decrypted_key,
1686 auth_tok->session_key.decrypted_key_size,
1690 "auth_tok->session_key.decrypted_key to scatterlist; "
1717 auth_tok->session_key.encrypted_key_size,
1725 auth_tok->session_key.flags |= ECRYPTFS_CONTAINS_DECRYPTED_KEY;
1726 memcpy(crypt_stat->key, auth_tok->session_key.decrypted_key,
1727 auth_tok->session_key.decrypted_key_size);
2036 auth_tok->session_key.encrypted_key[i];
2039 auth_tok->session_key.encrypted_key,
2040 auth_tok->session_key.encrypted_key_size);
2045 if (auth_tok->session_key.encrypted_key_size == 0)
2046 auth_tok->session_key.encrypted_key_size =
2215 if (auth_tok->session_key.encrypted_key_size == 0)
2216 auth_tok->session_key.encrypted_key_size =
2221 auth_tok->session_key.encrypted_key_size = 32;
2223 auth_tok->session_key.encrypted_key_size = crypt_stat->key_size;
2225 auth_tok->session_key.encrypted_key_size;
2227 for (i = 0; i < auth_tok->session_key.encrypted_key_size; i++)
2229 auth_tok->session_key.encrypted_key[i];
2232 "using auth_tok->session_key.encrypted_key, "
2236 auth_tok->session_key.encrypted_key,