| /Linux-v5.4/net/sunrpc/auth_gss/ |
| D | gss_krb5_wrap.c | 158 gss_wrap_kerberos_v1(struct krb5_ctx *kctx, int offset, in gss_wrap_kerberos_v1() argument 171 u32 conflen = kctx->gk5e->conflen; in gss_wrap_kerberos_v1() 177 blocksize = crypto_sync_skcipher_blocksize(kctx->enc); in gss_wrap_kerberos_v1() 182 headlen = g_token_size(&kctx->mech_used, in gss_wrap_kerberos_v1() 183 GSS_KRB5_TOK_HDR_LEN + kctx->gk5e->cksumlength + plainlen) - in gss_wrap_kerberos_v1() 193 g_make_token_header(&kctx->mech_used, in gss_wrap_kerberos_v1() 195 kctx->gk5e->cksumlength + plainlen, &ptr); in gss_wrap_kerberos_v1() 202 msg_start = ptr + GSS_KRB5_TOK_HDR_LEN + kctx->gk5e->cksumlength; in gss_wrap_kerberos_v1() 209 *(__le16 *)(ptr + 2) = cpu_to_le16(kctx->gk5e->signalg); in gss_wrap_kerberos_v1() 210 *(__le16 *)(ptr + 4) = cpu_to_le16(kctx->gk5e->sealalg); in gss_wrap_kerberos_v1() [all …]
|
| D | gss_krb5_crypto.c | 165 make_checksum_hmac_md5(struct krb5_ctx *kctx, char *header, int hdrlen, in make_checksum_hmac_md5() argument 180 if (cksumout->len < kctx->gk5e->cksumlength) { in make_checksum_hmac_md5() 182 __func__, cksumout->len, kctx->gk5e->name); in make_checksum_hmac_md5() 203 hmac_md5 = crypto_alloc_ahash(kctx->gk5e->cksum_name, 0, in make_checksum_hmac_md5() 244 err = crypto_ahash_setkey(hmac_md5, cksumkey, kctx->gk5e->keylength); in make_checksum_hmac_md5() 255 memcpy(cksumout->data, checksumdata, kctx->gk5e->cksumlength); in make_checksum_hmac_md5() 256 cksumout->len = kctx->gk5e->cksumlength; in make_checksum_hmac_md5() 276 make_checksum(struct krb5_ctx *kctx, char *header, int hdrlen, in make_checksum() argument 287 if (kctx->gk5e->ctype == CKSUMTYPE_HMAC_MD5_ARCFOUR) in make_checksum() 288 return make_checksum_hmac_md5(kctx, header, hdrlen, in make_checksum() [all …]
|
| D | gss_krb5_seqnum.c | 43 krb5_make_rc4_seq_num(struct krb5_ctx *kctx, int direction, s32 seqnum, in krb5_make_rc4_seq_num() argument 51 cipher = crypto_alloc_sync_skcipher(kctx->gk5e->encrypt_name, 0, 0); in krb5_make_rc4_seq_num() 68 code = krb5_rc4_setup_seq_key(kctx, cipher, cksum); in krb5_make_rc4_seq_num() 79 krb5_make_seq_num(struct krb5_ctx *kctx, in krb5_make_seq_num() argument 88 if (kctx->enctype == ENCTYPE_ARCFOUR_HMAC) in krb5_make_seq_num() 89 return krb5_make_rc4_seq_num(kctx, direction, seqnum, in krb5_make_seq_num() 112 krb5_get_rc4_seq_num(struct krb5_ctx *kctx, unsigned char *cksum, in krb5_get_rc4_seq_num() argument 120 cipher = crypto_alloc_sync_skcipher(kctx->gk5e->encrypt_name, 0, 0); in krb5_get_rc4_seq_num() 124 code = krb5_rc4_setup_seq_key(kctx, cipher, cksum); in krb5_get_rc4_seq_num() 156 krb5_get_seq_num(struct krb5_ctx *kctx, in krb5_get_seq_num() argument [all …]
|
| D | gss_krb5_mech.c | 691 struct krb5_ctx *kctx = internal_ctx; in gss_delete_sec_context_kerberos() local 693 crypto_free_sync_skcipher(kctx->seq); in gss_delete_sec_context_kerberos() 694 crypto_free_sync_skcipher(kctx->enc); in gss_delete_sec_context_kerberos() 695 crypto_free_sync_skcipher(kctx->acceptor_enc); in gss_delete_sec_context_kerberos() 696 crypto_free_sync_skcipher(kctx->initiator_enc); in gss_delete_sec_context_kerberos() 697 crypto_free_sync_skcipher(kctx->acceptor_enc_aux); in gss_delete_sec_context_kerberos() 698 crypto_free_sync_skcipher(kctx->initiator_enc_aux); in gss_delete_sec_context_kerberos() 699 kfree(kctx->mech_used.data); in gss_delete_sec_context_kerberos() 700 kfree(kctx); in gss_delete_sec_context_kerberos()
|
| /Linux-v5.4/include/linux/sunrpc/ |
| D | gss_krb5.h | 83 u32 (*encrypt_v2) (struct krb5_ctx *kctx, u32 offset, 86 u32 (*decrypt_v2) (struct krb5_ctx *kctx, u32 offset, 238 make_checksum(struct krb5_ctx *kctx, char *header, int hdrlen, 279 krb5_make_seq_num(struct krb5_ctx *kctx, 285 krb5_get_seq_num(struct krb5_ctx *kctx, 310 gss_krb5_aes_encrypt(struct krb5_ctx *kctx, u32 offset, 315 gss_krb5_aes_decrypt(struct krb5_ctx *kctx, u32 offset, 320 krb5_rc4_setup_seq_key(struct krb5_ctx *kctx, 325 krb5_rc4_setup_enc_key(struct krb5_ctx *kctx,
|
| /Linux-v5.4/drivers/crypto/chelsio/chtls/ |
| D | chtls_hw.c | 197 static void chtls_rxkey_ivauth(struct _key_ctx *kctx) in chtls_rxkey_ivauth() argument 199 kctx->iv_to_auth = cpu_to_be64(KEYCTX_TX_WR_IV_V(6ULL) | in chtls_rxkey_ivauth() 210 struct _key_ctx *kctx, in chtls_key_info() argument 251 kctx->ctx_hdr = FILL_KEY_CRX_HDR(ck_size, in chtls_key_info() 254 chtls_rxkey_ivauth(kctx); in chtls_key_info() 256 kctx->ctx_hdr = FILL_KEY_CTX_HDR(ck_size, in chtls_key_info() 261 memcpy(kctx->salt, gcm_ctx->salt, TLS_CIPHER_AES_GCM_128_SALT_SIZE); in chtls_key_info() 262 memcpy(kctx->key, gcm_ctx->key, keylen); in chtls_key_info() 263 memcpy(kctx->key + keylen, ghash_h, AEAD_H_SIZE); in chtls_key_info() 295 struct _key_ctx *kctx; in chtls_setkey() local [all …]
|