Home
last modified time | relevance | path

Searched refs:auth_tok (Results 1 – 7 of 7) sorted by relevance

/linux-5.19.10/fs/ecryptfs/
Ddebug.c18 void ecryptfs_dump_auth_tok(struct ecryptfs_auth_tok *auth_tok) in ecryptfs_dump_auth_tok() argument
24 auth_tok); in ecryptfs_dump_auth_tok()
25 if (auth_tok->flags & ECRYPTFS_PRIVATE_KEY) { in ecryptfs_dump_auth_tok()
29 ecryptfs_to_hex(salt, auth_tok->token.password.salt, in ecryptfs_dump_auth_tok()
33 if (auth_tok->token.password.flags & in ecryptfs_dump_auth_tok()
37 memcpy(sig, auth_tok->token.password.signature, in ecryptfs_dump_auth_tok()
43 auth_tok->session_key.flags); in ecryptfs_dump_auth_tok()
44 if (auth_tok->session_key.flags in ecryptfs_dump_auth_tok()
48 if (auth_tok->session_key.flags in ecryptfs_dump_auth_tok()
52 if (auth_tok->session_key.flags & ECRYPTFS_CONTAINS_DECRYPTED_KEY) { in ecryptfs_dump_auth_tok()
[all …]
Dkeystore.c453 struct ecryptfs_auth_tok **auth_tok) in ecryptfs_verify_auth_tok_from_key() argument
457 (*auth_tok) = ecryptfs_get_key_payload_data(auth_tok_key); in ecryptfs_verify_auth_tok_from_key()
458 if (IS_ERR(*auth_tok)) { in ecryptfs_verify_auth_tok_from_key()
459 rc = PTR_ERR(*auth_tok); in ecryptfs_verify_auth_tok_from_key()
460 *auth_tok = NULL; in ecryptfs_verify_auth_tok_from_key()
464 if (ecryptfs_verify_version((*auth_tok)->version)) { in ecryptfs_verify_auth_tok_from_key()
472 if ((*auth_tok)->token_type != ECRYPTFS_PASSWORD in ecryptfs_verify_auth_tok_from_key()
473 && (*auth_tok)->token_type != ECRYPTFS_PRIVATE_KEY) { in ecryptfs_verify_auth_tok_from_key()
486 struct ecryptfs_auth_tok **auth_tok, in ecryptfs_find_global_auth_tok_for_sig() argument
493 (*auth_tok) = NULL; in ecryptfs_find_global_auth_tok_for_sig()
[all …]
Decryptfs_kernel.h40 void ecryptfs_dump_auth_tok(struct ecryptfs_auth_tok *auth_tok);
58 struct ecryptfs_auth_tok *auth_tok; member
114 struct ecryptfs_auth_tok *auth_tok; in ecryptfs_get_key_payload_data() local
117 auth_tok = ecryptfs_get_encrypted_key_payload_data(key); in ecryptfs_get_key_payload_data()
118 if (auth_tok) in ecryptfs_get_key_payload_data()
119 return auth_tok; in ecryptfs_get_key_payload_data()
364 struct ecryptfs_auth_tok auth_tok; member
651 struct ecryptfs_auth_tok **auth_tok,
Dcrypto.c202 struct ecryptfs_global_auth_tok *auth_tok, *auth_tok_tmp; in ecryptfs_destroy_mount_crypt_stat() local
207 list_for_each_entry_safe(auth_tok, auth_tok_tmp, in ecryptfs_destroy_mount_crypt_stat()
210 list_del(&auth_tok->mount_crypt_stat_list); in ecryptfs_destroy_mount_crypt_stat()
211 if (!(auth_tok->flags & ECRYPTFS_AUTH_TOK_INVALID)) in ecryptfs_destroy_mount_crypt_stat()
212 key_put(auth_tok->global_auth_tok_key); in ecryptfs_destroy_mount_crypt_stat()
213 kmem_cache_free(ecryptfs_global_auth_tok_cache, auth_tok); in ecryptfs_destroy_mount_crypt_stat()
Dmain.c188 struct ecryptfs_auth_tok *auth_tok; in ecryptfs_init_global_auth_toks() local
195 &global_auth_tok->global_auth_tok_key, &auth_tok, in ecryptfs_init_global_auth_toks()
/linux-5.19.10/security/keys/encrypted-keys/
Decryptfs_format.c19 u8 *ecryptfs_get_auth_tok_key(struct ecryptfs_auth_tok *auth_tok) in ecryptfs_get_auth_tok_key() argument
21 return auth_tok->token.password.session_key_encryption_key; in ecryptfs_get_auth_tok_key()
48 int ecryptfs_fill_auth_tok(struct ecryptfs_auth_tok *auth_tok, in ecryptfs_fill_auth_tok() argument
54 auth_tok->version = (((uint16_t)(major << 8) & 0xFF00) in ecryptfs_fill_auth_tok()
56 auth_tok->token_type = ECRYPTFS_PASSWORD; in ecryptfs_fill_auth_tok()
57 strncpy((char *)auth_tok->token.password.signature, key_desc, in ecryptfs_fill_auth_tok()
59 auth_tok->token.password.session_key_encryption_key_bytes = in ecryptfs_fill_auth_tok()
67 auth_tok->token.password.flags |= in ecryptfs_fill_auth_tok()
70 auth_tok->session_key.encrypted_key[0] = 0; in ecryptfs_fill_auth_tok()
71 auth_tok->session_key.encrypted_key_size = 0; in ecryptfs_fill_auth_tok()
[all …]
Decryptfs_format.h22 u8 *ecryptfs_get_auth_tok_key(struct ecryptfs_auth_tok *auth_tok);
24 int ecryptfs_fill_auth_tok(struct ecryptfs_auth_tok *auth_tok,