session_key
u8 session_key[SHA256_DIGEST_SIZE];
tpm2_KDFa(auth->session_key, SHA256_DIGEST_SIZE
hmac_sha256_init_usingrawkey(&hctx, auth->session_key,
sizeof(auth->session_key) +
hmac_sha256_init_usingrawkey(&hctx, auth->session_key,
sizeof(auth->session_key) +
tpm2_KDFa(auth->session_key, SHA256_DIGEST_SIZE
auth->our_nonce, sizeof(auth->session_key),
auth->session_key);
sha1_update(&ctx, state->session_key, state->keylen);
arc4_crypt(&state->arc4, state->session_key, state->sha1_digest,
memcpy(state->session_key, state->sha1_digest, state->keylen);
state->session_key[0] = 0xd1;
state->session_key[1] = 0x26;
state->session_key[2] = 0x9e;
arc4_setkey(&state->arc4, state->session_key, state->keylen);
memcpy(state->session_key, state->master_key,
(int)sizeof(state->session_key), state->session_key);
unsigned char session_key[MPPE_MAX_KEY_LEN];
u8 *session_key, int *session_key_len,
session_key, session_key_len,
auth_tok->session_key.flags);
if (auth_tok->session_key.flags
if (auth_tok->session_key.flags
if (auth_tok->session_key.flags & ECRYPTFS_CONTAINS_DECRYPTED_KEY) {
auth_tok->session_key.decrypted_key_size);
ecryptfs_dump_hex(auth_tok->session_key.decrypted_key,
if (auth_tok->session_key.flags & ECRYPTFS_CONTAINS_ENCRYPTED_KEY) {
auth_tok->session_key.encrypted_key_size);
ecryptfs_dump_hex(auth_tok->session_key.encrypted_key,
auth_tok->session_key.
rc = write_tag_64_packet(auth_tok_sig, &(auth_tok->session_key),
rc = parse_tag_65_packet(&(auth_tok->session_key),
auth_tok->session_key.flags |= ECRYPTFS_CONTAINS_DECRYPTED_KEY;
memcpy(crypt_stat->key, auth_tok->session_key.decrypted_key,
auth_tok->session_key.decrypted_key_size);
crypt_stat->key_size = auth_tok->session_key.decrypted_key_size;
(*new_auth_tok)->session_key.encrypted_key_size =
if ((*new_auth_tok)->session_key.encrypted_key_size
memcpy((*new_auth_tok)->session_key.encrypted_key,
(*packet_size) += (*new_auth_tok)->session_key.encrypted_key_size;
(*new_auth_tok)->session_key.flags &=
(*new_auth_tok)->session_key.flags |=
(*new_auth_tok)->session_key.flags &=
(*new_auth_tok)->session_key.flags &=
(*new_auth_tok)->session_key.encrypted_key_size =
if ((*new_auth_tok)->session_key.encrypted_key_size
(*new_auth_tok)->session_key.encrypted_key_size;
write_tag_64_packet(char *signature, struct ecryptfs_session_key *session_key,
memcpy((*new_auth_tok)->session_key.encrypted_key,
(*new_auth_tok)->session_key.encrypted_key_size);
(*new_auth_tok)->session_key.encrypted_key_size;
(*new_auth_tok)->session_key.flags &=
(*new_auth_tok)->session_key.flags |=
(*new_auth_tok)->session_key.flags &=
(*new_auth_tok)->session_key.flags &=
+ session_key->encrypted_key_size);
rc = virt_to_scatterlist(auth_tok->session_key.encrypted_key,
auth_tok->session_key.encrypted_key_size,
auth_tok->session_key.encrypted_key_size);
auth_tok->session_key.decrypted_key_size =
auth_tok->session_key.encrypted_key_size;
rc = virt_to_scatterlist(auth_tok->session_key.decrypted_key,
auth_tok->session_key.decrypted_key_size,
auth_tok->session_key.encrypted_key_size,
auth_tok->session_key.flags |= ECRYPTFS_CONTAINS_DECRYPTED_KEY;
memcpy(crypt_stat->key, auth_tok->session_key.decrypted_key,
auth_tok->session_key.decrypted_key_size);
session_key->encrypted_key_size,
memcpy(&message[i], session_key->encrypted_key,
session_key->encrypted_key_size);
i += session_key->encrypted_key_size;
parse_tag_65_packet(struct ecryptfs_session_key *session_key, u8 *cipher_code,
auth_tok->session_key.encrypted_key[i];
auth_tok->session_key.encrypted_key,
auth_tok->session_key.encrypted_key_size);
if (auth_tok->session_key.encrypted_key_size == 0)
auth_tok->session_key.encrypted_key_size =
if (auth_tok->session_key.encrypted_key_size == 0)
auth_tok->session_key.encrypted_key_size =
auth_tok->session_key.encrypted_key_size = 32;
auth_tok->session_key.encrypted_key_size = crypt_stat->key_size;
auth_tok->session_key.encrypted_key_size;
for (i = 0; i < auth_tok->session_key.encrypted_key_size; i++)
auth_tok->session_key.encrypted_key[i];
auth_tok->session_key.encrypted_key,
session_key->decrypted_key_size = m_size - 3;
if (session_key->decrypted_key_size > ECRYPTFS_MAX_KEY_BYTES) {
session_key->decrypted_key_size,
memcpy(session_key->decrypted_key, &data[i],
session_key->decrypted_key_size);
i += session_key->decrypted_key_size;
for (i = 0; i < session_key->decrypted_key_size; i++)
checksum += session_key->decrypted_key[i];
struct session_key auth_key;
struct session_key session_key;
kfree_sensitive(server->session_key.response);
server->session_key.response = NULL;
server->session_key.len = 0;
kfree_sensitive(server->session_key.response);
server->session_key.response = NULL;
server->session_key.len = 0;
md5_update(&ctx, server->session_key.response, server->session_key.len);
server->session_key.response =
if (!server->session_key.response) {
server->session_key.len =
u8 session_key[8]; /* DES session key */
u8 session_key[8];
u8 *session_key, int *session_key_len,
u8 *session_key, int *session_key_len,
u8 *session_key, int *session_key_len,
void *buf, void *end, u8 *session_key,
u8 *session_key, int *session_key_len,
u8 *session_key, int *session_key_len,
struct ecryptfs_session_key session_key;
u8 *session_key, int *session_key_len,
reply, reply_len, session_key, session_key_len,
u8 *session_key, int *session_key_len,
session_key, session_key_len,
u8 *session_key, int *session_key_len,
reply, reply_len, session_key, session_key_len,
void *buf, void *end, u8 *session_key,
ceph_x_encrypt_offset(&au->session_key);
ret = ceph_x_encrypt(&au->session_key, 0 /* dummy */,
if (au->session_key.type == CEPH_CRYPTO_AES) {
if (au->session_key.type == CEPH_CRYPTO_AES) {
ret = ceph_crypt(&au->session_key, 0 /* dummy */,
ceph_hmac_sha256(&au->session_key, sigblock,
ceph_crypto_key_destroy(&th->session_key);
tp = *p + ceph_x_encrypt_offset(&th->session_key);
ret = ceph_x_decrypt(&th->session_key,
ceph_crypto_key_destroy(&th->session_key);
th->session_key = new_session_key;
msg_b = p + ceph_x_encrypt_offset(&au->session_key);
ret = ceph_x_encrypt(&au->session_key,
ceph_crypto_key_destroy(&au->session_key);
ceph_crypto_key_destroy(&au->session_key);
ret = ceph_crypto_key_clone(&au->session_key, &th->session_key);
ret = ceph_crypto_key_prepare(&au->session_key, authorizer_key_usages,
ceph_x_encrypt_buflen(&au->session_key, sizeof(*msg_b));
u8 *session_key, int *session_key_len,
WARN_ON(session_key || con_secret);
if (session_key) {
memcpy(session_key, th->session_key.key, th->session_key.len);
*session_key_len = th->session_key.len;
dp = *p + ceph_x_encrypt_offset(&th->session_key);
ret = ceph_x_decrypt(&th->session_key,
ret = ceph_x_proc_ticket_reply(ac, &th->session_key,
u8 *session_key, int *session_key_len,
session_key, session_key_len,
ret = ceph_x_proc_ticket_reply(ac, &th->session_key, &p, end);
ret = decrypt_authorizer_challenge(&au->session_key, challenge,
u8 *session_key, int *session_key_len,
if (session_key) {
memcpy(session_key, au->session_key.key, au->session_key.len);
*session_key_len = au->session_key.len;
ret = decrypt_authorizer_reply(&au->session_key, &reply,
struct ceph_crypto_key session_key;
struct ceph_crypto_key session_key;
u8 *session_key = PTR_ALIGN(&session_key_buf[0], 16);
session_key, &session_key_len,
ret = setup_crypto(con, session_key, session_key_len, con_secret,
const u8 *session_key, int session_key_len,
hmac_sha256_preparekey(&con->v2.hmac_key, session_key, session_key_len);
u8 *session_key, int *session_key_len,
session_key, session_key_len,
u8 *session_key, int *session_key_len,
session_key, session_key_len,
u32 session_key = l2tp_v2_session_key(tunnel->tunnel_id,
session_key);
u32 session_key = l2tp_v2_session_key(tunnel_id, session_id);
session = idr_find(&pn->l2tp_v2_session_idr, session_key);
unsigned long session_key = session->session_id;
void *old = idr_replace(&pn->l2tp_v3_session_idr, session2, session_key);
void *removed = idr_remove(&pn->l2tp_v3_session_idr, session_key);
u32 session_key;
session_key = session->session_id;
&session_key, session_key, GFP_ATOMIC);
session_key);
session_key = l2tp_v2_session_key(tunnel->tunnel_id,
&session_key, session_key, GFP_ATOMIC);
old = idr_replace(&pn->l2tp_v3_session_idr, session, session_key);
old = idr_replace(&pn->l2tp_v2_session_idr, session, session_key);
token->kad->session_key[0], token->kad->session_key[1],
token->kad->session_key[2], token->kad->session_key[3],
token->kad->session_key[4], token->kad->session_key[5],
token->kad->session_key[6], token->kad->session_key[7]);
v1->session_key[0], v1->session_key[1],
v1->session_key[2], v1->session_key[3],
v1->session_key[4], v1->session_key[5],
v1->session_key[6], v1->session_key[7]);
memcpy(&token->kad->session_key, &v1->session_key, 8);
const void *session_key,
memcpy(&data.v1.session_key, session_key, sizeof(data.v1.session_key));
ENCODE_BYTES(8, token->kad->session_key);
memcpy(&token->kad->session_key, &xdr[2], 8);
const struct rxrpc_crypt *session_key)
ntohl(session_key->n[0]), ntohl(session_key->n[1]));
if (crypto_sync_skcipher_setkey(rxkad_ci, session_key->x,
sizeof(*session_key)) < 0)
memcpy(&iv, session_key, sizeof(iv));
struct rxrpc_crypt session_key;
if (crypto_sync_skcipher_setkey(ci, token->kad->session_key,
sizeof(token->kad->session_key)) < 0)
&session_key, &expiry);
rxkad_decrypt_response(conn, response, &session_key);
ret = rxrpc_get_server_data_key(conn, &session_key, expiry, kvno);
memcpy(&iv, token->kad->session_key, sizeof(iv));
memcpy(&iv, token->kad->session_key, sizeof(iv));
memcpy(&iv, token->kad->session_key, sizeof(iv));
memcpy(&iv, s2->session_key, sizeof(iv));
auth_tok->session_key.encrypted_key[0] = 0;
auth_tok->session_key.encrypted_key_size = 0;