Searched refs:kctx (Results 1 – 4 of 4) sorted by relevance
| /net/sunrpc/auth_gss/ |
| A D | gss_krb5_crypto.c | 593 if (kctx->initiate) { in gss_krb5_aes_encrypt() 594 cipher = kctx->initiator_enc; in gss_krb5_aes_encrypt() 598 cipher = kctx->acceptor_enc; in gss_krb5_aes_encrypt() 600 ahash = kctx->acceptor_integ; in gss_krb5_aes_encrypt() 669 if (kctx->initiate) { in gss_krb5_aes_decrypt() 670 cipher = kctx->acceptor_enc; in gss_krb5_aes_decrypt() 672 ahash = kctx->acceptor_integ; in gss_krb5_aes_decrypt() 823 if (kctx->initiate) { in krb5_etm_encrypt() 828 cipher = kctx->acceptor_enc; in krb5_etm_encrypt() 912 if (kctx->initiate) { in krb5_etm_decrypt() [all …]
|
| A D | gss_krb5_mech.c | 496 struct krb5_ctx *kctx = internal_ctx; in gss_krb5_delete_sec_context() local 498 crypto_free_sync_skcipher(kctx->seq); in gss_krb5_delete_sec_context() 499 crypto_free_sync_skcipher(kctx->enc); in gss_krb5_delete_sec_context() 504 crypto_free_ahash(kctx->acceptor_sign); in gss_krb5_delete_sec_context() 505 crypto_free_ahash(kctx->initiator_sign); in gss_krb5_delete_sec_context() 508 kfree(kctx->mech_used.data); in gss_krb5_delete_sec_context() 509 kfree(kctx); in gss_krb5_delete_sec_context() 528 return kctx->gk5e->get_mic(kctx, text, token); in gss_krb5_get_mic() 550 return kctx->gk5e->verify_mic(kctx, message_buffer, read_token); in gss_krb5_verify_mic() 570 return kctx->gk5e->wrap(kctx, offset, buf, pages); in gss_krb5_wrap() [all …]
|
| A D | gss_krb5_wrap.c | 94 gss_krb5_wrap_v2(struct krb5_ctx *kctx, int offset, in gss_krb5_wrap_v2() argument 115 if ((kctx->flags & KRB5_CTX_FLAG_INITIATOR) == 0) in gss_krb5_wrap_v2() 117 if ((kctx->flags & KRB5_CTX_FLAG_ACCEPTOR_SUBKEY) != 0) in gss_krb5_wrap_v2() 131 *be64ptr = cpu_to_be64(atomic64_fetch_inc(&kctx->seq_send64)); in gss_krb5_wrap_v2() 133 err = (*kctx->gk5e->encrypt)(kctx, offset, buf, pages); in gss_krb5_wrap_v2() 138 return (kctx->endtime < now) ? GSS_S_CONTEXT_EXPIRED : GSS_S_COMPLETE; in gss_krb5_wrap_v2() 142 gss_krb5_unwrap_v2(struct krb5_ctx *kctx, int offset, int len, in gss_krb5_unwrap_v2() argument 164 if ((!kctx->initiate && (flags & KG2_TOKEN_FLAG_SENTBYACCEPTOR)) || in gss_krb5_unwrap_v2() 165 (kctx->initiate && !(flags & KG2_TOKEN_FLAG_SENTBYACCEPTOR))) in gss_krb5_unwrap_v2() 187 err = (*kctx->gk5e->decrypt)(kctx, offset, len, buf, in gss_krb5_unwrap_v2() [all …]
|
| A D | gss_krb5_internal.h | 41 u32 (*encrypt)(struct krb5_ctx *kctx, u32 offset, 43 u32 (*decrypt)(struct krb5_ctx *kctx, u32 offset, u32 len, 45 u32 (*get_mic)(struct krb5_ctx *kctx, struct xdr_buf *text, 49 u32 (*wrap)(struct krb5_ctx *kctx, int offset, 51 u32 (*unwrap)(struct krb5_ctx *kctx, int offset, int len, 93 u32 gss_krb5_wrap_v2(struct krb5_ctx *kctx, int offset, 96 u32 gss_krb5_unwrap_v2(struct krb5_ctx *kctx, int offset, int len, 138 static inline int krb5_derive_key(struct krb5_ctx *kctx, in krb5_derive_key() argument 143 const struct gss_krb5_enctype *gk5e = kctx->gk5e; in krb5_derive_key() 168 u32 gss_krb5_aes_encrypt(struct krb5_ctx *kctx, u32 offset, [all …]
|
Completed in 11 milliseconds