Searched refs:session_key (Results 1 – 7 of 7) sorted by relevance
/fs/ecryptfs/ |
D | debug.c | 43 auth_tok->session_key.flags); in ecryptfs_dump_auth_tok() 44 if (auth_tok->session_key.flags in ecryptfs_dump_auth_tok() 48 if (auth_tok->session_key.flags in ecryptfs_dump_auth_tok() 52 if (auth_tok->session_key.flags & ECRYPTFS_CONTAINS_DECRYPTED_KEY) { in ecryptfs_dump_auth_tok() 56 auth_tok->session_key.decrypted_key_size); in ecryptfs_dump_auth_tok() 60 ecryptfs_dump_hex(auth_tok->session_key.decrypted_key, in ecryptfs_dump_auth_tok() 63 if (auth_tok->session_key.flags & ECRYPTFS_CONTAINS_ENCRYPTED_KEY) { in ecryptfs_dump_auth_tok() 67 auth_tok->session_key.encrypted_key_size); in ecryptfs_dump_auth_tok() 71 ecryptfs_dump_hex(auth_tok->session_key.encrypted_key, in ecryptfs_dump_auth_tok() 72 auth_tok->session_key. in ecryptfs_dump_auth_tok()
|
D | keystore.c | 144 write_tag_64_packet(char *signature, struct ecryptfs_session_key *session_key, in write_tag_64_packet() argument 162 + session_key->encrypted_key_size); in write_tag_64_packet() 182 session_key->encrypted_key_size, in write_tag_64_packet() 190 memcpy(&message[i], session_key->encrypted_key, in write_tag_64_packet() 191 session_key->encrypted_key_size); in write_tag_64_packet() 192 i += session_key->encrypted_key_size; in write_tag_64_packet() 199 parse_tag_65_packet(struct ecryptfs_session_key *session_key, u8 *cipher_code, in parse_tag_65_packet() argument 257 session_key->decrypted_key_size = m_size - 3; in parse_tag_65_packet() 258 if (session_key->decrypted_key_size > ECRYPTFS_MAX_KEY_BYTES) { in parse_tag_65_packet() 261 session_key->decrypted_key_size, in parse_tag_65_packet() [all …]
|
/fs/cifs/ |
D | cifsglob.h | 125 struct session_key { struct 636 struct session_key session_key; member 928 struct session_key auth_key;
|
D | cifsencrypt.c | 119 server->session_key.response, server->session_key.len); in cifs_calc_signature()
|
D | sess.c | 917 ses->server->session_key.response = in sess_establish_session() 920 if (!ses->server->session_key.response) { in sess_establish_session() 924 ses->server->session_key.len = in sess_establish_session()
|
D | connect.c | 215 kfree(server->session_key.response); in cifs_mark_tcp_ses_conns_for_reconnect() 216 server->session_key.response = NULL; in cifs_mark_tcp_ses_conns_for_reconnect() 217 server->session_key.len = 0; in cifs_mark_tcp_ses_conns_for_reconnect() 1402 kfree(server->session_key.response); in cifs_put_tcp_session() 1403 server->session_key.response = NULL; in cifs_put_tcp_session() 1404 server->session_key.len = 0; in cifs_put_tcp_session()
|
/fs/ceph/ |
D | mds_client.c | 5354 u8 *session_key, int *session_key_len, in mds_handle_auth_done() argument 5362 session_key, session_key_len, in mds_handle_auth_done()
|