Searched refs:gk5e (Results 1 – 7 of 7) sorted by relevance
| /linux/net/sunrpc/auth_gss/ |
| A D | gss_krb5_mech.c | 217 ctx->gk5e = get_gss_krb5_enctype(ctx->enctype); in gss_import_v1_context() 218 if (ctx->gk5e == NULL) { in gss_import_v1_context() 322 keyin.len = ctx->gk5e->keylength; in context_derive_keys_des3() 323 keyout.len = ctx->gk5e->keylength; in context_derive_keys_des3() 367 keyin.len = ctx->gk5e->keylength; in context_derive_keys_new() 368 keyout.len = ctx->gk5e->keylength; in context_derive_keys_new() 380 ctx->gk5e->encrypt_name, in context_derive_keys_new() 395 ctx->gk5e->encrypt_name, in context_derive_keys_new() 503 ctx->gk5e = get_gss_krb5_enctype(ctx->enctype); in gss_import_v2_context() 504 if (ctx->gk5e == NULL) { in gss_import_v2_context() [all …]
|
| A D | gss_krb5_crypto.c | 182 kctx->gk5e->keylength); in make_checksum() 204 switch (kctx->gk5e->ctype) { in make_checksum() 212 kctx->gk5e->cksumlength); in make_checksum() 249 if (kctx->gk5e->keyed_cksum == 0) { in make_checksum_v2() 251 __func__, kctx->gk5e->name); in make_checksum_v2() 256 __func__, kctx->gk5e->name); in make_checksum_v2() 299 switch (kctx->gk5e->ctype) { in make_checksum_v2() 711 buf->len += kctx->gk5e->cksumlength; in gss_krb5_aes_encrypt() 751 kctx->gk5e->cksumlength)); in gss_krb5_aes_decrypt() 804 *headskip = kctx->gk5e->conflen; in gss_krb5_aes_decrypt() [all …]
|
| A D | gss_krb5_keys.c | 141 u32 krb5_derive_key(const struct gss_krb5_enctype *gk5e, in krb5_derive_key() argument 153 blocksize = gk5e->blocksize; in krb5_derive_key() 154 keybytes = gk5e->keybytes; in krb5_derive_key() 155 keylength = gk5e->keylength; in krb5_derive_key() 160 cipher = crypto_alloc_sync_skcipher(gk5e->encrypt_name, 0, 0); in krb5_derive_key() 200 (*(gk5e->encrypt))(cipher, NULL, inblock.data, in krb5_derive_key() 218 BUG_ON(gk5e->mk_key == NULL); in krb5_derive_key() 219 ret = (*(gk5e->mk_key))(gk5e, &inblock, outkey); in krb5_derive_key() 222 __func__, ret, gk5e->encrypt_name); in krb5_derive_key() 258 u32 gss_krb5_des3_make_key(const struct gss_krb5_enctype *gk5e, in gss_krb5_des3_make_key() argument [all …]
|
| A D | gss_krb5_wrap.c | 171 u32 conflen = kctx->gk5e->conflen; in gss_wrap_kerberos_v1() 195 kctx->gk5e->cksumlength + plainlen, &ptr); in gss_wrap_kerberos_v1() 209 *(__le16 *)(ptr + 2) = cpu_to_le16(kctx->gk5e->signalg); in gss_wrap_kerberos_v1() 216 if (kctx->gk5e->keyed_cksum) in gss_wrap_kerberos_v1() 264 u32 conflen = kctx->gk5e->conflen; in gss_unwrap_kerberos_v1() 285 if (signalg != kctx->gk5e->signalg) in gss_unwrap_kerberos_v1() 289 if (sealalg != kctx->gk5e->sealalg) in gss_unwrap_kerberos_v1() 306 if (kctx->gk5e->keyed_cksum) in gss_unwrap_kerberos_v1() 316 kctx->gk5e->cksumlength)) in gss_unwrap_kerberos_v1() 421 if (kctx->gk5e->encrypt_v2 == NULL) in gss_wrap_kerberos_v2() [all …]
|
| A D | gss_krb5_unseal.c | 102 if (signalg != ctx->gk5e->signalg) in gss_verify_mic_v1() 112 if (ctx->gk5e->keyed_cksum) in gss_verify_mic_v1() 122 ctx->gk5e->cksumlength)) in gss_verify_mic_v1() 193 ctx->gk5e->cksumlength)) in gss_verify_mic_v2()
|
| A D | gss_krb5_seal.c | 77 int body_size = GSS_KRB5_TOK_HDR_LEN + ctx->gk5e->cksumlength; in setup_token() 91 *ptr++ = (__force u16)cpu_to_le16(ctx->gk5e->signalg); in setup_token() 122 token->len = GSS_KRB5_TOK_HDR_LEN + ctx->gk5e->cksumlength; in setup_token_v2() 145 if (ctx->gk5e->keyed_cksum) in gss_get_mic_v1()
|
| /linux/include/linux/sunrpc/ |
| A D | gss_krb5.h | 80 u32 (*mk_key) (const struct gss_krb5_enctype *gk5e, 100 const struct gss_krb5_enctype *gk5e; /* enctype-specific info */ member 291 krb5_derive_key(const struct gss_krb5_enctype *gk5e, 298 gss_krb5_des3_make_key(const struct gss_krb5_enctype *gk5e, 303 gss_krb5_aes_make_key(const struct gss_krb5_enctype *gk5e,
|
Completed in 18 milliseconds