Searched refs:gk5e (Results 1 – 8 of 8) sorted by relevance
/openbmc/linux/net/sunrpc/auth_gss/ |
H A D | gss_krb5_test.c | 52 if (!gk5e) in kdf_case() 61 err = gk5e->derive_key(gk5e, param->base_key, &derivedkey, in kdf_case() 86 if (!gk5e) in checksum_case() 92 err = gk5e->derive_key(gk5e, param->base_key, &Kc, in checksum_case() 538 if (!gk5e) in rfc3962_encrypt_case() 1134 if (!gk5e) in rfc6803_encrypt_case() 1178 err = gk5e->derive_key(gk5e, param->base_key, &Ki, in rfc6803_encrypt_case() 1628 if (!gk5e) in rfc8009_encrypt_case() 1637 err = gk5e->derive_key(gk5e, param->base_key, &Ke, in rfc8009_encrypt_case() 1671 err = gk5e->derive_key(gk5e, param->base_key, &Ki, in rfc8009_encrypt_case() [all …]
|
H A D | gss_krb5_mech.c | 300 .len = ctx->gk5e->keylength, in gss_krb5_import_ctx_v2() 311 keyout.len = ctx->gk5e->Ke_length; in gss_krb5_import_ctx_v2() 319 if (ctx->gk5e->aux_cipher) { in gss_krb5_import_ctx_v2() 321 gss_krb5_alloc_cipher_v2(ctx->gk5e->aux_cipher, in gss_krb5_import_ctx_v2() 335 if (ctx->gk5e->aux_cipher) { in gss_krb5_import_ctx_v2() 337 gss_krb5_alloc_cipher_v2(ctx->gk5e->aux_cipher, in gss_krb5_import_ctx_v2() 344 keyout.len = ctx->gk5e->Kc_length; in gss_krb5_import_ctx_v2() 361 keyout.len = ctx->gk5e->Ki_length; in gss_krb5_import_ctx_v2() 429 if (ctx->gk5e == NULL) { in gss_import_v2_context() 435 keylen = ctx->gk5e->keylength; in gss_import_v2_context() [all …]
|
H A D | gss_krb5_keys.c | 150 static int krb5_DK(const struct gss_krb5_enctype *gk5e, in krb5_DK() argument 160 keybytes = gk5e->keybytes; in krb5_DK() 161 keylength = gk5e->keylength; in krb5_DK() 267 int krb5_derive_key_v2(const struct gss_krb5_enctype *gk5e, in krb5_derive_key_v2() argument 276 inblock.len = gk5e->keybytes; in krb5_derive_key_v2() 281 ret = krb5_DK(gk5e, inkey, inblock.data, label, gfp_mask); in krb5_derive_key_v2() 283 ret = krb5_random_to_key_v2(gk5e, &inblock, outkey); in krb5_derive_key_v2() 368 krb5_kdf_feedback_cmac(const struct gss_krb5_enctype *gk5e, in krb5_kdf_feedback_cmac() argument 386 tfm = crypto_alloc_shash(gk5e->cksum_name, 0, 0); in krb5_kdf_feedback_cmac() 500 krb5_kdf_hmac_sha2(const struct gss_krb5_enctype *gk5e, in krb5_kdf_hmac_sha2() argument [all …]
|
H A D | gss_krb5_internal.h | 36 int (*derive_key)(const struct gss_krb5_enctype *gk5e, 64 const struct gss_krb5_enctype *gk5e; /* enctype-specific info */ member 106 int krb5_derive_key_v2(const struct gss_krb5_enctype *gk5e, 112 int krb5_kdf_hmac_sha2(const struct gss_krb5_enctype *gk5e, 118 int krb5_kdf_feedback_cmac(const struct gss_krb5_enctype *gk5e, 143 const struct gss_krb5_enctype *gk5e = kctx->gk5e; in krb5_derive_key() local 153 return gk5e->derive_key(gk5e, inkey, outkey, &label, gfp_mask); in krb5_derive_key()
|
H A D | gss_krb5_crypto.c | 246 kctx->gk5e->keylength); in make_checksum() 268 switch (kctx->gk5e->ctype) { in make_checksum() 276 kctx->gk5e->cksumlength); in make_checksum() 824 hmac.len = kctx->gk5e->cksumlength; in gss_krb5_aes_encrypt() 851 buf->len += kctx->gk5e->cksumlength; in gss_krb5_aes_encrypt() 881 kctx->gk5e->cksumlength)); in gss_krb5_aes_decrypt() 904 *tailskip = kctx->gk5e->cksumlength; in gss_krb5_aes_decrypt() 1059 hmac.len = kctx->gk5e->cksumlength; in krb5_etm_encrypt() 1065 buf->len += kctx->gk5e->cksumlength; in krb5_etm_encrypt() 1124 kctx->gk5e->cksumlength)); in krb5_etm_decrypt() [all …]
|
H A D | gss_krb5_unseal.c | 80 .len = ctx->gk5e->cksumlength, in gss_krb5_verify_mic_v2() 114 ctx->gk5e->cksumlength)) in gss_krb5_verify_mic_v2()
|
H A D | gss_krb5_seal.c | 100 token->len = GSS_KRB5_TOK_HDR_LEN + ctx->gk5e->cksumlength; in setup_token_v2() 111 .len = ctx->gk5e->cksumlength, in gss_krb5_get_mic_v2()
|
H A D | gss_krb5_wrap.c | 133 err = (*kctx->gk5e->encrypt)(kctx, offset, buf, pages); in gss_krb5_wrap_v2() 187 err = (*kctx->gk5e->decrypt)(kctx, offset, len, buf, in gss_krb5_unwrap_v2()
|