Searched refs:mech (Results 1 – 10 of 10) sorted by relevance
/linux-6.3-rc2/net/sunrpc/auth_gss/ |
A D | gss_generic_token.c | 147 g_token_size(struct xdr_netobj *mech, unsigned int body_size) in g_token_size() argument 150 body_size += 2 + (int) mech->len; /* NEED overflow check */ in g_token_size() 160 g_make_token_header(struct xdr_netobj *mech, int body_size, unsigned char **buf) in g_make_token_header() argument 163 der_write_length(buf, 2 + mech->len + body_size); in g_make_token_header() 165 *(*buf)++ = (unsigned char) mech->len; in g_make_token_header() 166 TWRITE_STR(*buf, mech->data, ((int) mech->len)); in g_make_token_header() 180 g_verify_token_header(struct xdr_netobj *mech, int *body_size, in g_verify_token_header() argument 213 if (! g_OID_equal(&toid, mech)) in g_verify_token_header()
|
A D | gss_rpc_upcall.c | 286 .mech.len = GSS_OID_MAX_LEN, in gssp_accept_sec_context_upcall() 322 data->mech_oid.len = rctxh.mech.len; in gssp_accept_sec_context_upcall() 323 if (rctxh.mech.data) { in gssp_accept_sec_context_upcall() 324 memcpy(data->mech_oid.data, rctxh.mech.data, in gssp_accept_sec_context_upcall() 326 kfree(rctxh.mech.data); in gssp_accept_sec_context_upcall()
|
A D | gss_rpc_xdr.h | 46 gssx_OID mech; member 78 gssx_OID mech; member 101 gssx_OID mech; member
|
A D | gss_mech_switch.c | 354 struct gss_api_mech *mech, in gss_import_sec_context() argument 361 (*ctx_id)->mech_type = gss_mech_get(mech); in gss_import_sec_context() 363 return mech->gm_ops->gss_import_sec_context(input_token, bufsize, in gss_import_sec_context()
|
A D | auth_gss.c | 88 struct gss_api_mech *mech; member 436 struct gss_api_mech *mech = gss_msg->auth->mech; in gss_encode_v1_msg() local 441 len = scnprintf(p, buflen, "mech=%s uid=%d", mech->gm_name, in gss_encode_v1_msg() 484 if (mech->gm_upcall_enctypes) { in gss_encode_v1_msg() 486 mech->gm_upcall_enctypes); in gss_encode_v1_msg() 774 p = gss_fill_context(p, end, ctx, gss_msg->auth->mech); in gss_pipe_downcall() 1051 gss_auth->mech = gss_mech_get_by_pseudoflavor(flavor); in gss_create_new() 1052 if (!gss_auth->mech) in gss_create_new() 1089 gss_pipe = gss_pipe_get(clnt, gss_auth->mech->gm_name, in gss_create_new() 1103 gss_mech_put(gss_auth->mech); in gss_create_new() [all …]
|
A D | svcauth_gss.c | 1505 struct gss_api_mech *mech; in read_gss_krb5_enctypes() local 1508 mech = gss_mech_get_by_OID(&oid); in read_gss_krb5_enctypes() 1509 if (!mech) in read_gss_krb5_enctypes() 1511 if (!mech->gm_upcall_enctypes) { in read_gss_krb5_enctypes() 1512 gss_mech_put(mech); in read_gss_krb5_enctypes() 1517 mech->gm_upcall_enctypes, in read_gss_krb5_enctypes() 1518 strlen(mech->gm_upcall_enctypes)); in read_gss_krb5_enctypes() 1519 gss_mech_put(mech); in read_gss_krb5_enctypes()
|
A D | gss_rpc_xdr.c | 306 err = gssx_dec_buffer(xdr, &status->mech); in gssx_dec_status() 586 err = gssx_enc_buffer(xdr, &ctx->mech); in gssx_enc_ctx() 649 err = gssx_dec_buffer(xdr, &ctx->mech); in gssx_dec_ctx()
|
/linux-6.3-rc2/include/linux/sunrpc/ |
A D | gss_asn1.h | 69 struct xdr_netobj *mech, 75 struct xdr_netobj *mech, 79 struct xdr_netobj *mech,
|
A D | gss_api.h | 50 struct gss_api_mech *mech,
|
/linux-6.3-rc2/drivers/s390/crypto/ |
A D | zcrypt_ep11misc.c | 680 u32 mech; in ep11_genaeskey() member 813 u32 mech; in ep11_cryptsingle() member 853 req_pl->mech = (mech ? mech : 0x00001085); /* CKM_AES_CBC_PAD */ in ep11_cryptsingle() 930 u32 mech, const u8 *iv, in ep11_unwrapkey() argument 947 u32 mech; in ep11_unwrapkey() member 995 req_pl->mech = (mech ? mech : 0x00001085); /* CKM_AES_CBC_PAD */ in ep11_unwrapkey() 1069 u32 mech, const u8 *iv, in ep11_wrapkey() argument 1079 u32 mech; in ep11_wrapkey() member 1120 if (!mech || mech == 0x80060001) in ep11_wrapkey() 1123 api = (!mech || mech == 0x80060001) ? 4 : 1; /* CKM_IBM_CPACF_WRAP */ in ep11_wrapkey() [all …]
|
Completed in 24 milliseconds