/Linux-v4.19/net/sunrpc/auth_gss/ |
D | gss_krb5_wrap.c | 158 gss_wrap_kerberos_v1(struct krb5_ctx *kctx, int offset, in gss_wrap_kerberos_v1() argument 171 u32 conflen = kctx->gk5e->conflen; in gss_wrap_kerberos_v1() 177 blocksize = crypto_skcipher_blocksize(kctx->enc); in gss_wrap_kerberos_v1() 182 headlen = g_token_size(&kctx->mech_used, in gss_wrap_kerberos_v1() 183 GSS_KRB5_TOK_HDR_LEN + kctx->gk5e->cksumlength + plainlen) - in gss_wrap_kerberos_v1() 193 g_make_token_header(&kctx->mech_used, in gss_wrap_kerberos_v1() 195 kctx->gk5e->cksumlength + plainlen, &ptr); in gss_wrap_kerberos_v1() 202 msg_start = ptr + GSS_KRB5_TOK_HDR_LEN + kctx->gk5e->cksumlength; in gss_wrap_kerberos_v1() 209 *(__le16 *)(ptr + 2) = cpu_to_le16(kctx->gk5e->signalg); in gss_wrap_kerberos_v1() 210 *(__le16 *)(ptr + 4) = cpu_to_le16(kctx->gk5e->sealalg); in gss_wrap_kerberos_v1() [all …]
|
D | gss_krb5_crypto.c | 165 make_checksum_hmac_md5(struct krb5_ctx *kctx, char *header, int hdrlen, in make_checksum_hmac_md5() argument 180 if (cksumout->len < kctx->gk5e->cksumlength) { in make_checksum_hmac_md5() 182 __func__, cksumout->len, kctx->gk5e->name); in make_checksum_hmac_md5() 203 hmac_md5 = crypto_alloc_ahash(kctx->gk5e->cksum_name, 0, in make_checksum_hmac_md5() 244 err = crypto_ahash_setkey(hmac_md5, cksumkey, kctx->gk5e->keylength); in make_checksum_hmac_md5() 255 memcpy(cksumout->data, checksumdata, kctx->gk5e->cksumlength); in make_checksum_hmac_md5() 256 cksumout->len = kctx->gk5e->cksumlength; in make_checksum_hmac_md5() 276 make_checksum(struct krb5_ctx *kctx, char *header, int hdrlen, in make_checksum() argument 287 if (kctx->gk5e->ctype == CKSUMTYPE_HMAC_MD5_ARCFOUR) in make_checksum() 288 return make_checksum_hmac_md5(kctx, header, hdrlen, in make_checksum() [all …]
|
D | gss_krb5_seqnum.c | 43 krb5_make_rc4_seq_num(struct krb5_ctx *kctx, int direction, s32 seqnum, in krb5_make_rc4_seq_num() argument 51 cipher = crypto_alloc_skcipher(kctx->gk5e->encrypt_name, 0, in krb5_make_rc4_seq_num() 65 code = krb5_rc4_setup_seq_key(kctx, cipher, cksum); in krb5_make_rc4_seq_num() 75 krb5_make_seq_num(struct krb5_ctx *kctx, in krb5_make_seq_num() argument 83 if (kctx->enctype == ENCTYPE_ARCFOUR_HMAC) in krb5_make_seq_num() 84 return krb5_make_rc4_seq_num(kctx, direction, seqnum, in krb5_make_seq_num() 101 krb5_get_rc4_seq_num(struct krb5_ctx *kctx, unsigned char *cksum, in krb5_get_rc4_seq_num() argument 109 cipher = crypto_alloc_skcipher(kctx->gk5e->encrypt_name, 0, in krb5_get_rc4_seq_num() 114 code = krb5_rc4_setup_seq_key(kctx, cipher, cksum); in krb5_get_rc4_seq_num() 138 krb5_get_seq_num(struct krb5_ctx *kctx, in krb5_get_seq_num() argument [all …]
|
D | gss_krb5_mech.c | 714 struct krb5_ctx *kctx = internal_ctx; in gss_delete_sec_context_kerberos() local 716 crypto_free_skcipher(kctx->seq); in gss_delete_sec_context_kerberos() 717 crypto_free_skcipher(kctx->enc); in gss_delete_sec_context_kerberos() 718 crypto_free_skcipher(kctx->acceptor_enc); in gss_delete_sec_context_kerberos() 719 crypto_free_skcipher(kctx->initiator_enc); in gss_delete_sec_context_kerberos() 720 crypto_free_skcipher(kctx->acceptor_enc_aux); in gss_delete_sec_context_kerberos() 721 crypto_free_skcipher(kctx->initiator_enc_aux); in gss_delete_sec_context_kerberos() 722 kfree(kctx->mech_used.data); in gss_delete_sec_context_kerberos() 723 kfree(kctx); in gss_delete_sec_context_kerberos()
|
/Linux-v4.19/include/linux/sunrpc/ |
D | gss_krb5.h | 83 u32 (*encrypt_v2) (struct krb5_ctx *kctx, u32 offset, 86 u32 (*decrypt_v2) (struct krb5_ctx *kctx, u32 offset, 240 make_checksum(struct krb5_ctx *kctx, char *header, int hdrlen, 281 krb5_make_seq_num(struct krb5_ctx *kctx, 287 krb5_get_seq_num(struct krb5_ctx *kctx, 312 gss_krb5_aes_encrypt(struct krb5_ctx *kctx, u32 offset, 317 gss_krb5_aes_decrypt(struct krb5_ctx *kctx, u32 offset, 322 krb5_rc4_setup_seq_key(struct krb5_ctx *kctx, 327 krb5_rc4_setup_enc_key(struct krb5_ctx *kctx,
|
/Linux-v4.19/drivers/crypto/chelsio/chtls/ |
D | chtls_hw.c | 200 static void chtls_rxkey_ivauth(struct _key_ctx *kctx) in chtls_rxkey_ivauth() argument 202 kctx->iv_to_auth = cpu_to_be64(KEYCTX_TX_WR_IV_V(6ULL) | in chtls_rxkey_ivauth() 213 struct _key_ctx *kctx, in chtls_key_info() argument 259 kctx->ctx_hdr = FILL_KEY_CRX_HDR(ck_size, in chtls_key_info() 262 chtls_rxkey_ivauth(kctx); in chtls_key_info() 264 kctx->ctx_hdr = FILL_KEY_CTX_HDR(ck_size, in chtls_key_info() 269 memcpy(kctx->salt, gcm_ctx->salt, TLS_CIPHER_AES_GCM_128_SALT_SIZE); in chtls_key_info() 270 memcpy(kctx->key, gcm_ctx->key, keylen); in chtls_key_info() 271 memcpy(kctx->key + keylen, ghash_h, AEAD_H_SIZE); in chtls_key_info() 306 struct _key_ctx *kctx; in chtls_setkey() local [all …]
|