Lines Matching refs:crypt_stat
286 struct ecryptfs_crypt_stat *crypt_stat, char **packet,
307 data_len = (8 + ECRYPTFS_SIG_SIZE_HEX + crypt_stat->key_size);
327 rc = ecryptfs_write_packet_length(&message[i], crypt_stat->key_size + 3,
336 memcpy(&message[i], crypt_stat->key, crypt_stat->key_size);
337 i += crypt_stat->key_size;
338 for (j = 0; j < crypt_stat->key_size; j++)
339 checksum += crypt_stat->key[j];
543 * @mount_crypt_stat: inode crypt_stat crypto context
1123 * @crypt_stat: The cryptographic context
1129 struct ecryptfs_crypt_stat *crypt_stat)
1172 memcpy(crypt_stat->key, auth_tok->session_key.decrypted_key,
1174 crypt_stat->key_size = auth_tok->session_key.decrypted_key_size;
1175 rc = ecryptfs_cipher_code_to_string(crypt_stat->cipher, cipher_code);
1181 crypt_stat->flags |= ECRYPTFS_KEY_VALID;
1184 ecryptfs_dump_hex(crypt_stat->key,
1185 crypt_stat->key_size);
1210 * @crypt_stat: The cryptographic context to modify based on packet contents
1226 parse_tag_1_packet(struct ecryptfs_crypt_stat *crypt_stat,
1341 * @crypt_stat: The cryptographic context to modify based on packet
1358 parse_tag_3_packet(struct ecryptfs_crypt_stat *crypt_stat,
1440 rc = ecryptfs_cipher_code_to_string(crypt_stat->cipher,
1448 crypt_stat->key_size = 24;
1451 crypt_stat->key_size =
1454 rc = ecryptfs_init_crypt_ctx(crypt_stat);
1643 * @crypt_stat: The cryptographic context
1649 struct ecryptfs_crypt_stat *crypt_stat)
1667 crypt_stat->cipher);
1671 crypt_stat->cipher, rc);
1711 crypt_stat->key_size);
1728 memcpy(crypt_stat->key, auth_tok->session_key.decrypted_key,
1730 crypt_stat->flags |= ECRYPTFS_KEY_VALID;
1733 crypt_stat->key_size);
1734 ecryptfs_dump_hex(crypt_stat->key,
1735 crypt_stat->key_size);
1744 * @crypt_stat: The cryptographic context
1748 * Get crypt_stat to have the file's session key if the requisite key
1755 int ecryptfs_parse_packet_set(struct ecryptfs_crypt_stat *crypt_stat,
1784 rc = parse_tag_3_packet(crypt_stat,
1825 crypt_stat->flags |= ECRYPTFS_ENCRYPTED;
1828 rc = parse_tag_1_packet(crypt_stat,
1839 crypt_stat->flags |= ECRYPTFS_ENCRYPTED;
1886 crypt_stat->mount_crypt_stat,
1907 crypt_stat);
1915 candidate_auth_tok, crypt_stat);
1944 rc = ecryptfs_compute_root_iv(crypt_stat);
1950 rc = ecryptfs_init_crypt_ctx(crypt_stat);
1954 crypt_stat->cipher, rc);
1965 struct ecryptfs_crypt_stat *crypt_stat,
1976 crypt_stat->cipher,
1977 crypt_stat->key_size),
1978 crypt_stat, &payload, &payload_len);
2013 * @crypt_stat: The cryptographic context
2023 struct ecryptfs_crypt_stat *crypt_stat,
2036 for (i = 0; i < crypt_stat->key_size; i++)
2050 rc = pki_encrypt_session_key(auth_tok_key, auth_tok, crypt_stat,
2168 * @crypt_stat: The cryptographic context
2178 struct ecryptfs_crypt_stat *crypt_stat,
2191 crypt_stat->mount_crypt_stat;
2200 crypt_stat->cipher);
2204 crypt_stat->cipher, rc);
2214 if (crypt_stat->key_size == 0)
2215 crypt_stat->key_size =
2219 crypt_stat->key_size;
2220 if (crypt_stat->key_size == 24
2221 && strcmp("aes", crypt_stat->cipher) == 0) {
2222 memset((crypt_stat->key + 24), 0, 8);
2225 auth_tok->session_key.encrypted_key_size = crypt_stat->key_size;
2250 crypt_stat->key_size);
2260 rc = virt_to_scatterlist(crypt_stat->key, key_rec->enc_key_size,
2264 "for crypt_stat session key; expected rc = 1; "
2274 "for crypt_stat encrypted session key; "
2283 crypt_stat->key_size);
2306 crypt_stat->key_size);
2357 cipher_code = ecryptfs_code_for_cipher_string(crypt_stat->cipher,
2358 crypt_stat->key_size);
2361 "cipher [%s]\n", crypt_stat->cipher);
2388 * @crypt_stat: The cryptographic context from which the
2402 struct ecryptfs_crypt_stat *crypt_stat,
2417 mutex_lock(&crypt_stat->keysig_list_mutex);
2423 list_for_each_entry(key_sig, &crypt_stat->keysig_list,
2439 crypt_stat, key_rec,
2462 crypt_stat, key_rec, &written);
2489 mutex_unlock(&crypt_stat->keysig_list_mutex);
2495 int ecryptfs_add_keysig(struct ecryptfs_crypt_stat *crypt_stat, char *sig)
2506 list_add(&new_key_sig->crypt_stat_list, &crypt_stat->keysig_list);