Symbol: session_key
drivers/char/tpm/tpm2-sessions.c
126
u8 session_key[SHA256_DIGEST_SIZE];
drivers/char/tpm/tpm2-sessions.c
674
tpm2_KDFa(auth->session_key, SHA256_DIGEST_SIZE
drivers/char/tpm/tpm2-sessions.c
715
hmac_sha256_init_usingrawkey(&hctx, auth->session_key,
drivers/char/tpm/tpm2-sessions.c
716
sizeof(auth->session_key) +
drivers/char/tpm/tpm2-sessions.c
837
hmac_sha256_init_usingrawkey(&hctx, auth->session_key,
drivers/char/tpm/tpm2-sessions.c
838
sizeof(auth->session_key) +
drivers/char/tpm/tpm2-sessions.c
855
tpm2_KDFa(auth->session_key, SHA256_DIGEST_SIZE
drivers/char/tpm/tpm2-sessions.c
929
auth->our_nonce, sizeof(auth->session_key),
drivers/char/tpm/tpm2-sessions.c
930
auth->session_key);
drivers/net/ppp/ppp_mppe.c
121
sha1_update(&ctx, state->session_key, state->keylen);
drivers/net/ppp/ppp_mppe.c
135
arc4_crypt(&state->arc4, state->session_key, state->sha1_digest,
drivers/net/ppp/ppp_mppe.c
138
memcpy(state->session_key, state->sha1_digest, state->keylen);
drivers/net/ppp/ppp_mppe.c
142
state->session_key[0] = 0xd1;
drivers/net/ppp/ppp_mppe.c
143
state->session_key[1] = 0x26;
drivers/net/ppp/ppp_mppe.c
144
state->session_key[2] = 0x9e;
drivers/net/ppp/ppp_mppe.c
146
arc4_setkey(&state->arc4, state->session_key, state->keylen);
drivers/net/ppp/ppp_mppe.c
168
memcpy(state->session_key, state->master_key,
drivers/net/ppp/ppp_mppe.c
227
(int)sizeof(state->session_key), state->session_key);
drivers/net/ppp/ppp_mppe.c
79
unsigned char session_key[MPPE_MAX_KEY_LEN];
fs/ceph/mds_client.c
6444
u8 *session_key, int *session_key_len,
fs/ceph/mds_client.c
6452
session_key, session_key_len,
fs/ecryptfs/debug.c
42
auth_tok->session_key.flags);
fs/ecryptfs/debug.c
43
if (auth_tok->session_key.flags
fs/ecryptfs/debug.c
47
if (auth_tok->session_key.flags
fs/ecryptfs/debug.c
51
if (auth_tok->session_key.flags & ECRYPTFS_CONTAINS_DECRYPTED_KEY) {
fs/ecryptfs/debug.c
55
auth_tok->session_key.decrypted_key_size);
fs/ecryptfs/debug.c
59
ecryptfs_dump_hex(auth_tok->session_key.decrypted_key,
fs/ecryptfs/debug.c
62
if (auth_tok->session_key.flags & ECRYPTFS_CONTAINS_ENCRYPTED_KEY) {
fs/ecryptfs/debug.c
66
auth_tok->session_key.encrypted_key_size);
fs/ecryptfs/debug.c
70
ecryptfs_dump_hex(auth_tok->session_key.encrypted_key,
fs/ecryptfs/debug.c
71
auth_tok->session_key.
fs/ecryptfs/keystore.c
1103
rc = write_tag_64_packet(auth_tok_sig, &(auth_tok->session_key),
fs/ecryptfs/keystore.c
1122
rc = parse_tag_65_packet(&(auth_tok->session_key),
fs/ecryptfs/keystore.c
1129
auth_tok->session_key.flags |= ECRYPTFS_CONTAINS_DECRYPTED_KEY;
fs/ecryptfs/keystore.c
1130
memcpy(crypt_stat->key, auth_tok->session_key.decrypted_key,
fs/ecryptfs/keystore.c
1131
auth_tok->session_key.decrypted_key_size);
fs/ecryptfs/keystore.c
1132
crypt_stat->key_size = auth_tok->session_key.decrypted_key_size;
fs/ecryptfs/keystore.c
1263
(*new_auth_tok)->session_key.encrypted_key_size =
fs/ecryptfs/keystore.c
1265
if ((*new_auth_tok)->session_key.encrypted_key_size
fs/ecryptfs/keystore.c
1272
memcpy((*new_auth_tok)->session_key.encrypted_key,
fs/ecryptfs/keystore.c
1274
(*packet_size) += (*new_auth_tok)->session_key.encrypted_key_size;
fs/ecryptfs/keystore.c
1275
(*new_auth_tok)->session_key.flags &=
fs/ecryptfs/keystore.c
1277
(*new_auth_tok)->session_key.flags |=
fs/ecryptfs/keystore.c
1281
(*new_auth_tok)->session_key.flags &=
fs/ecryptfs/keystore.c
1283
(*new_auth_tok)->session_key.flags &=
fs/ecryptfs/keystore.c
1385
(*new_auth_tok)->session_key.encrypted_key_size =
fs/ecryptfs/keystore.c
1387
if ((*new_auth_tok)->session_key.encrypted_key_size
fs/ecryptfs/keystore.c
1413
(*new_auth_tok)->session_key.encrypted_key_size;
fs/ecryptfs/keystore.c
143
write_tag_64_packet(char *signature, struct ecryptfs_session_key *session_key,
fs/ecryptfs/keystore.c
1438
memcpy((*new_auth_tok)->session_key.encrypted_key,
fs/ecryptfs/keystore.c
1440
(*new_auth_tok)->session_key.encrypted_key_size);
fs/ecryptfs/keystore.c
1442
(*new_auth_tok)->session_key.encrypted_key_size;
fs/ecryptfs/keystore.c
1443
(*new_auth_tok)->session_key.flags &=
fs/ecryptfs/keystore.c
1445
(*new_auth_tok)->session_key.flags |=
fs/ecryptfs/keystore.c
1458
(*new_auth_tok)->session_key.flags &=
fs/ecryptfs/keystore.c
1460
(*new_auth_tok)->session_key.flags &=
fs/ecryptfs/keystore.c
161
+ session_key->encrypted_key_size);
fs/ecryptfs/keystore.c
1635
rc = virt_to_scatterlist(auth_tok->session_key.encrypted_key,
fs/ecryptfs/keystore.c
1636
auth_tok->session_key.encrypted_key_size,
fs/ecryptfs/keystore.c
1643
auth_tok->session_key.encrypted_key_size);
fs/ecryptfs/keystore.c
1646
auth_tok->session_key.decrypted_key_size =
fs/ecryptfs/keystore.c
1647
auth_tok->session_key.encrypted_key_size;
fs/ecryptfs/keystore.c
1648
rc = virt_to_scatterlist(auth_tok->session_key.decrypted_key,
fs/ecryptfs/keystore.c
1649
auth_tok->session_key.decrypted_key_size,
fs/ecryptfs/keystore.c
1680
auth_tok->session_key.encrypted_key_size,
fs/ecryptfs/keystore.c
1688
auth_tok->session_key.flags |= ECRYPTFS_CONTAINS_DECRYPTED_KEY;
fs/ecryptfs/keystore.c
1689
memcpy(crypt_stat->key, auth_tok->session_key.decrypted_key,
fs/ecryptfs/keystore.c
1690
auth_tok->session_key.decrypted_key_size);
fs/ecryptfs/keystore.c
181
session_key->encrypted_key_size,
fs/ecryptfs/keystore.c
189
memcpy(&message[i], session_key->encrypted_key,
fs/ecryptfs/keystore.c
190
session_key->encrypted_key_size);
fs/ecryptfs/keystore.c
191
i += session_key->encrypted_key_size;
fs/ecryptfs/keystore.c
198
parse_tag_65_packet(struct ecryptfs_session_key *session_key, u8 *cipher_code,
fs/ecryptfs/keystore.c
1996
auth_tok->session_key.encrypted_key[i];
fs/ecryptfs/keystore.c
1999
auth_tok->session_key.encrypted_key,
fs/ecryptfs/keystore.c
2000
auth_tok->session_key.encrypted_key_size);
fs/ecryptfs/keystore.c
2005
if (auth_tok->session_key.encrypted_key_size == 0)
fs/ecryptfs/keystore.c
2006
auth_tok->session_key.encrypted_key_size =
fs/ecryptfs/keystore.c
2175
if (auth_tok->session_key.encrypted_key_size == 0)
fs/ecryptfs/keystore.c
2176
auth_tok->session_key.encrypted_key_size =
fs/ecryptfs/keystore.c
2181
auth_tok->session_key.encrypted_key_size = 32;
fs/ecryptfs/keystore.c
2183
auth_tok->session_key.encrypted_key_size = crypt_stat->key_size;
fs/ecryptfs/keystore.c
2185
auth_tok->session_key.encrypted_key_size;
fs/ecryptfs/keystore.c
2187
for (i = 0; i < auth_tok->session_key.encrypted_key_size; i++)
fs/ecryptfs/keystore.c
2189
auth_tok->session_key.encrypted_key[i];
fs/ecryptfs/keystore.c
2196
auth_tok->session_key.encrypted_key,
fs/ecryptfs/keystore.c
256
session_key->decrypted_key_size = m_size - 3;
fs/ecryptfs/keystore.c
257
if (session_key->decrypted_key_size > ECRYPTFS_MAX_KEY_BYTES) {
fs/ecryptfs/keystore.c
260
session_key->decrypted_key_size,
fs/ecryptfs/keystore.c
265
memcpy(session_key->decrypted_key, &data[i],
fs/ecryptfs/keystore.c
266
session_key->decrypted_key_size);
fs/ecryptfs/keystore.c
267
i += session_key->decrypted_key_size;
fs/ecryptfs/keystore.c
270
for (i = 0; i < session_key->decrypted_key_size; i++)
fs/ecryptfs/keystore.c
271
checksum += session_key->decrypted_key[i];
fs/smb/client/cifsglob.h
1084
struct session_key auth_key;
fs/smb/client/cifsglob.h
747
struct session_key session_key;
fs/smb/client/connect.c
1735
kfree_sensitive(server->session_key.response);
fs/smb/client/connect.c
1736
server->session_key.response = NULL;
fs/smb/client/connect.c
1737
server->session_key.len = 0;
fs/smb/client/connect.c
321
kfree_sensitive(server->session_key.response);
fs/smb/client/connect.c
322
server->session_key.response = NULL;
fs/smb/client/connect.c
323
server->session_key.len = 0;
fs/smb/client/smb1encrypt.c
40
md5_update(&ctx, server->session_key.response, server->session_key.len);
fs/smb/client/smb1session.c
376
server->session_key.response =
fs/smb/client/smb1session.c
379
if (!server->session_key.response) {
fs/smb/client/smb1session.c
383
server->session_key.len =
include/keys/rxrpc-type.h
31
u8 session_key[8]; /* DES session key */
include/keys/rxrpc-type.h
71
u8 session_key[8];
include/linux/ceph/auth.h
139
u8 *session_key, int *session_key_len,
include/linux/ceph/auth.h
166
u8 *session_key, int *session_key_len,
include/linux/ceph/auth.h
183
u8 *session_key, int *session_key_len,
include/linux/ceph/auth.h
54
void *buf, void *end, u8 *session_key,
include/linux/ceph/auth.h
74
u8 *session_key, int *session_key_len,
include/linux/ceph/messenger.h
69
u8 *session_key, int *session_key_len,
include/linux/ecryptfs.h
98
struct ecryptfs_session_key session_key;
net/ceph/auth.c
368
u8 *session_key, int *session_key_len,
net/ceph/auth.c
376
reply, reply_len, session_key, session_key_len,
net/ceph/auth.c
495
u8 *session_key, int *session_key_len,
net/ceph/auth.c
502
session_key, session_key_len,
net/ceph/auth.c
606
u8 *session_key, int *session_key_len,
net/ceph/auth.c
610
reply, reply_len, session_key, session_key_len,
net/ceph/auth_none.c
73
void *buf, void *end, u8 *session_key,
net/ceph/auth_x.c
1044
ceph_x_encrypt_offset(&au->session_key);
net/ceph/auth_x.c
1052
ret = ceph_x_encrypt(&au->session_key, 0 /* dummy */,
net/ceph/auth_x.c
1074
if (au->session_key.type == CEPH_CRYPTO_AES) {
net/ceph/auth_x.c
1092
if (au->session_key.type == CEPH_CRYPTO_AES) {
net/ceph/auth_x.c
1095
ret = ceph_crypt(&au->session_key, 0 /* dummy */,
net/ceph/auth_x.c
1101
ceph_hmac_sha256(&au->session_key, sigblock,
net/ceph/auth_x.c
185
ceph_crypto_key_destroy(&th->session_key);
net/ceph/auth_x.c
261
tp = *p + ceph_x_encrypt_offset(&th->session_key);
net/ceph/auth_x.c
262
ret = ceph_x_decrypt(&th->session_key,
net/ceph/auth_x.c
288
ceph_crypto_key_destroy(&th->session_key);
net/ceph/auth_x.c
291
th->session_key = new_session_key;
net/ceph/auth_x.c
355
msg_b = p + ceph_x_encrypt_offset(&au->session_key);
net/ceph/auth_x.c
367
ret = ceph_x_encrypt(&au->session_key,
net/ceph/auth_x.c
386
ceph_crypto_key_destroy(&au->session_key);
net/ceph/auth_x.c
407
ceph_crypto_key_destroy(&au->session_key);
net/ceph/auth_x.c
408
ret = ceph_crypto_key_clone(&au->session_key, &th->session_key);
net/ceph/auth_x.c
412
ret = ceph_crypto_key_prepare(&au->session_key, authorizer_key_usages,
net/ceph/auth_x.c
418
ceph_x_encrypt_buflen(&au->session_key, sizeof(*msg_b));
net/ceph/auth_x.c
663
u8 *session_key, int *session_key_len,
net/ceph/auth_x.c
680
WARN_ON(session_key || con_secret);
net/ceph/auth_x.c
688
if (session_key) {
net/ceph/auth_x.c
689
memcpy(session_key, th->session_key.key, th->session_key.len);
net/ceph/auth_x.c
690
*session_key_len = th->session_key.len;
net/ceph/auth_x.c
698
dp = *p + ceph_x_encrypt_offset(&th->session_key);
net/ceph/auth_x.c
699
ret = ceph_x_decrypt(&th->session_key,
net/ceph/auth_x.c
718
ret = ceph_x_proc_ticket_reply(ac, &th->session_key,
net/ceph/auth_x.c
732
u8 *session_key, int *session_key_len,
net/ceph/auth_x.c
765
session_key, session_key_len,
net/ceph/auth_x.c
775
ret = ceph_x_proc_ticket_reply(ac, &th->session_key, &p, end);
net/ceph/auth_x.c
892
ret = decrypt_authorizer_challenge(&au->session_key, challenge,
net/ceph/auth_x.c
946
u8 *session_key, int *session_key_len,
net/ceph/auth_x.c
953
if (session_key) {
net/ceph/auth_x.c
954
memcpy(session_key, au->session_key.key, au->session_key.len);
net/ceph/auth_x.c
955
*session_key_len = au->session_key.len;
net/ceph/auth_x.c
958
ret = decrypt_authorizer_reply(&au->session_key, &reply,
net/ceph/auth_x.h
19
struct ceph_crypto_key session_key;
net/ceph/auth_x.h
32
struct ceph_crypto_key session_key;
net/ceph/messenger_v2.c
2364
u8 *session_key = PTR_ALIGN(&session_key_buf[0], 16);
net/ceph/messenger_v2.c
2389
session_key, &session_key_len,
net/ceph/messenger_v2.c
2403
ret = setup_crypto(con, session_key, session_key_len, con_secret,
net/ceph/messenger_v2.c
703
const u8 *session_key, int session_key_len,
net/ceph/messenger_v2.c
725
hmac_sha256_preparekey(&con->v2.hmac_key, session_key, session_key_len);
net/ceph/mon_client.c
1401
u8 *session_key, int *session_key_len,
net/ceph/mon_client.c
1413
session_key, session_key_len,
net/ceph/osd_client.c
5642
u8 *session_key, int *session_key_len,
net/ceph/osd_client.c
5650
session_key, session_key_len,
net/l2tp/l2tp_core.c
1368
u32 session_key = l2tp_v2_session_key(tunnel->tunnel_id,
net/l2tp/l2tp_core.c
1371
session_key);
net/l2tp/l2tp_core.c
299
u32 session_key = l2tp_v2_session_key(tunnel_id, session_id);
net/l2tp/l2tp_core.c
304
session = idr_find(&pn->l2tp_v2_session_idr, session_key);
net/l2tp/l2tp_core.c
518
unsigned long session_key = session->session_id;
net/l2tp/l2tp_core.c
536
void *old = idr_replace(&pn->l2tp_v3_session_idr, session2, session_key);
net/l2tp/l2tp_core.c
540
void *removed = idr_remove(&pn->l2tp_v3_session_idr, session_key);
net/l2tp/l2tp_core.c
558
u32 session_key;
net/l2tp/l2tp_core.c
570
session_key = session->session_id;
net/l2tp/l2tp_core.c
572
&session_key, session_key, GFP_ATOMIC);
net/l2tp/l2tp_core.c
580
session_key);
net/l2tp/l2tp_core.c
585
session_key = l2tp_v2_session_key(tunnel->tunnel_id,
net/l2tp/l2tp_core.c
588
&session_key, session_key, GFP_ATOMIC);
net/l2tp/l2tp_core.c
604
old = idr_replace(&pn->l2tp_v3_session_idr, session, session_key);
net/l2tp/l2tp_core.c
606
old = idr_replace(&pn->l2tp_v2_session_idr, session, session_key);
net/rxrpc/key.c
104
token->kad->session_key[0], token->kad->session_key[1],
net/rxrpc/key.c
105
token->kad->session_key[2], token->kad->session_key[3],
net/rxrpc/key.c
106
token->kad->session_key[4], token->kad->session_key[5],
net/rxrpc/key.c
107
token->kad->session_key[6], token->kad->session_key[7]);
net/rxrpc/key.c
484
v1->session_key[0], v1->session_key[1],
net/rxrpc/key.c
485
v1->session_key[2], v1->session_key[3],
net/rxrpc/key.c
486
v1->session_key[4], v1->session_key[5],
net/rxrpc/key.c
487
v1->session_key[6], v1->session_key[7]);
net/rxrpc/key.c
514
memcpy(&token->kad->session_key, &v1->session_key, 8);
net/rxrpc/key.c
643
const void *session_key,
net/rxrpc/key.c
674
memcpy(&data.v1.session_key, session_key, sizeof(data.v1.session_key));
net/rxrpc/key.c
840
ENCODE_BYTES(8, token->kad->session_key);
net/rxrpc/key.c
95
memcpy(&token->kad->session_key, &xdr[2], 8);
net/rxrpc/rxkad.c
1078
const struct rxrpc_crypt *session_key)
net/rxrpc/rxkad.c
1085
ntohl(session_key->n[0]), ntohl(session_key->n[1]));
net/rxrpc/rxkad.c
1088
if (crypto_sync_skcipher_setkey(rxkad_ci, session_key->x,
net/rxrpc/rxkad.c
1089
sizeof(*session_key)) < 0)
net/rxrpc/rxkad.c
1092
memcpy(&iv, session_key, sizeof(iv));
net/rxrpc/rxkad.c
1115
struct rxrpc_crypt session_key;
net/rxrpc/rxkad.c
117
if (crypto_sync_skcipher_setkey(ci, token->kad->session_key,
net/rxrpc/rxkad.c
118
sizeof(token->kad->session_key)) < 0)
net/rxrpc/rxkad.c
1191
&session_key, &expiry);
net/rxrpc/rxkad.c
1197
rxkad_decrypt_response(conn, response, &session_key);
net/rxrpc/rxkad.c
1259
ret = rxrpc_get_server_data_key(conn, &session_key, expiry, kvno);
net/rxrpc/rxkad.c
217
memcpy(&iv, token->kad->session_key, sizeof(iv));
net/rxrpc/rxkad.c
326
memcpy(&iv, token->kad->session_key, sizeof(iv));
net/rxrpc/rxkad.c
529
memcpy(&iv, token->kad->session_key, sizeof(iv));
net/rxrpc/rxkad.c
744
memcpy(&iv, s2->session_key, sizeof(iv));
security/keys/encrypted-keys/ecryptfs_format.c
69
auth_tok->session_key.encrypted_key[0] = 0;
security/keys/encrypted-keys/ecryptfs_format.c
70
auth_tok->session_key.encrypted_key_size = 0;