Home
last modified time | relevance | path

Searched refs:kctx (Results 1 – 5 of 5) sorted by relevance

/linux-4.4.14/net/sunrpc/auth_gss/
Dgss_krb5_wrap.c158 gss_wrap_kerberos_v1(struct krb5_ctx *kctx, int offset, in gss_wrap_kerberos_v1() argument
171 u32 conflen = kctx->gk5e->conflen; in gss_wrap_kerberos_v1()
177 blocksize = crypto_blkcipher_blocksize(kctx->enc); in gss_wrap_kerberos_v1()
182 headlen = g_token_size(&kctx->mech_used, in gss_wrap_kerberos_v1()
183 GSS_KRB5_TOK_HDR_LEN + kctx->gk5e->cksumlength + plainlen) - in gss_wrap_kerberos_v1()
193 g_make_token_header(&kctx->mech_used, in gss_wrap_kerberos_v1()
195 kctx->gk5e->cksumlength + plainlen, &ptr); in gss_wrap_kerberos_v1()
202 msg_start = ptr + GSS_KRB5_TOK_HDR_LEN + kctx->gk5e->cksumlength; in gss_wrap_kerberos_v1()
209 *(__le16 *)(ptr + 2) = cpu_to_le16(kctx->gk5e->signalg); in gss_wrap_kerberos_v1()
210 *(__le16 *)(ptr + 4) = cpu_to_le16(kctx->gk5e->sealalg); in gss_wrap_kerberos_v1()
[all …]
Dgss_krb5_crypto.c151 make_checksum_hmac_md5(struct krb5_ctx *kctx, char *header, int hdrlen, in make_checksum_hmac_md5() argument
166 if (cksumout->len < kctx->gk5e->cksumlength) { in make_checksum_hmac_md5()
168 __func__, cksumout->len, kctx->gk5e->name); in make_checksum_hmac_md5()
181 hmac_md5 = crypto_alloc_hash(kctx->gk5e->cksum_name, 0, in make_checksum_hmac_md5()
217 err = crypto_hash_setkey(hmac_md5, cksumkey, kctx->gk5e->keylength); in make_checksum_hmac_md5()
227 memcpy(cksumout->data, checksumdata, kctx->gk5e->cksumlength); in make_checksum_hmac_md5()
228 cksumout->len = kctx->gk5e->cksumlength; in make_checksum_hmac_md5()
241 make_checksum(struct krb5_ctx *kctx, char *header, int hdrlen, in make_checksum() argument
251 if (kctx->gk5e->ctype == CKSUMTYPE_HMAC_MD5_ARCFOUR) in make_checksum()
252 return make_checksum_hmac_md5(kctx, header, hdrlen, in make_checksum()
[all …]
Dgss_krb5_seqnum.c43 krb5_make_rc4_seq_num(struct krb5_ctx *kctx, int direction, s32 seqnum, in krb5_make_rc4_seq_num() argument
51 cipher = crypto_alloc_blkcipher(kctx->gk5e->encrypt_name, 0, in krb5_make_rc4_seq_num()
65 code = krb5_rc4_setup_seq_key(kctx, cipher, cksum); in krb5_make_rc4_seq_num()
75 krb5_make_seq_num(struct krb5_ctx *kctx, in krb5_make_seq_num() argument
83 if (kctx->enctype == ENCTYPE_ARCFOUR_HMAC) in krb5_make_seq_num()
84 return krb5_make_rc4_seq_num(kctx, direction, seqnum, in krb5_make_seq_num()
101 krb5_get_rc4_seq_num(struct krb5_ctx *kctx, unsigned char *cksum, in krb5_get_rc4_seq_num() argument
109 cipher = crypto_alloc_blkcipher(kctx->gk5e->encrypt_name, 0, in krb5_get_rc4_seq_num()
114 code = krb5_rc4_setup_seq_key(kctx, cipher, cksum); in krb5_get_rc4_seq_num()
138 krb5_get_seq_num(struct krb5_ctx *kctx, in krb5_get_seq_num() argument
[all …]
Dgss_krb5_mech.c711 struct krb5_ctx *kctx = internal_ctx; in gss_delete_sec_context_kerberos() local
713 crypto_free_blkcipher(kctx->seq); in gss_delete_sec_context_kerberos()
714 crypto_free_blkcipher(kctx->enc); in gss_delete_sec_context_kerberos()
715 crypto_free_blkcipher(kctx->acceptor_enc); in gss_delete_sec_context_kerberos()
716 crypto_free_blkcipher(kctx->initiator_enc); in gss_delete_sec_context_kerberos()
717 crypto_free_blkcipher(kctx->acceptor_enc_aux); in gss_delete_sec_context_kerberos()
718 crypto_free_blkcipher(kctx->initiator_enc_aux); in gss_delete_sec_context_kerberos()
719 kfree(kctx->mech_used.data); in gss_delete_sec_context_kerberos()
720 kfree(kctx); in gss_delete_sec_context_kerberos()
/linux-4.4.14/include/linux/sunrpc/
Dgss_krb5.h83 u32 (*encrypt_v2) (struct krb5_ctx *kctx, u32 offset,
86 u32 (*decrypt_v2) (struct krb5_ctx *kctx, u32 offset,
240 make_checksum(struct krb5_ctx *kctx, char *header, int hdrlen,
281 krb5_make_seq_num(struct krb5_ctx *kctx,
287 krb5_get_seq_num(struct krb5_ctx *kctx,
312 gss_krb5_aes_encrypt(struct krb5_ctx *kctx, u32 offset,
317 gss_krb5_aes_decrypt(struct krb5_ctx *kctx, u32 offset,
322 krb5_rc4_setup_seq_key(struct krb5_ctx *kctx,
327 krb5_rc4_setup_enc_key(struct krb5_ctx *kctx,