/kernel/linux/linux-5.10/net/sunrpc/auth_gss/ |
H A D | gss_krb5_keys.c | 141 u32 krb5_derive_key(const struct gss_krb5_enctype *gk5e, in krb5_derive_key() argument 153 blocksize = gk5e->blocksize; in krb5_derive_key() 154 keybytes = gk5e->keybytes; in krb5_derive_key() 155 keylength = gk5e->keylength; in krb5_derive_key() 160 cipher = crypto_alloc_sync_skcipher(gk5e->encrypt_name, 0, 0); in krb5_derive_key() 200 (*(gk5e->encrypt))(cipher, NULL, inblock.data, in krb5_derive_key() 218 BUG_ON(gk5e->mk_key == NULL); in krb5_derive_key() 219 ret = (*(gk5e->mk_key))(gk5e, &inblock, outkey); in krb5_derive_key() 222 __func__, ret, gk5e in krb5_derive_key() 258 gss_krb5_des3_make_key(const struct gss_krb5_enctype *gk5e, struct xdr_netobj *randombits, struct xdr_netobj *key) gss_krb5_des3_make_key() argument 298 gss_krb5_aes_make_key(const struct gss_krb5_enctype *gk5e, struct xdr_netobj *randombits, struct xdr_netobj *key) gss_krb5_aes_make_key() argument [all...] |
H A D | gss_krb5_mech.c | 186 *res = crypto_alloc_sync_skcipher(ctx->gk5e->encrypt_name, 0, 0); in get_key() 189 "crypto algorithm %s\n", ctx->gk5e->encrypt_name); in get_key() 195 "crypto algorithm %s\n", ctx->gk5e->encrypt_name); in get_key() 225 ctx->gk5e = get_gss_krb5_enctype(ctx->enctype); in gss_import_v1_context() 226 if (ctx->gk5e == NULL) { in gss_import_v1_context() 300 if (crypto_sync_skcipher_setkey(cp, key, ctx->gk5e->keylength)) { in context_v2_alloc_cipher() 336 keyin.len = ctx->gk5e->keylength; in gss_krb5_import_ctx_v1() 337 keyout.len = ctx->gk5e->keylength; in gss_krb5_import_ctx_v1() 340 ctx->seq = context_v2_alloc_cipher(ctx, ctx->gk5e->encrypt_name, in gss_krb5_import_ctx_v1() 345 ctx->enc = context_v2_alloc_cipher(ctx, ctx->gk5e in gss_krb5_import_ctx_v1() [all...] |
H A D | gss_krb5_wrap.c | 171 u32 conflen = kctx->gk5e->conflen; in gss_wrap_kerberos_v1() 183 GSS_KRB5_TOK_HDR_LEN + kctx->gk5e->cksumlength + plainlen) - in gss_wrap_kerberos_v1() 195 kctx->gk5e->cksumlength + plainlen, &ptr); in gss_wrap_kerberos_v1() 202 msg_start = ptr + GSS_KRB5_TOK_HDR_LEN + kctx->gk5e->cksumlength; in gss_wrap_kerberos_v1() 209 *(__le16 *)(ptr + 2) = cpu_to_le16(kctx->gk5e->signalg); in gss_wrap_kerberos_v1() 210 *(__le16 *)(ptr + 4) = cpu_to_le16(kctx->gk5e->sealalg); in gss_wrap_kerberos_v1() 216 if (kctx->gk5e->keyed_cksum) in gss_wrap_kerberos_v1() 264 u32 conflen = kctx->gk5e->conflen; in gss_unwrap_kerberos_v1() 285 if (signalg != kctx->gk5e->signalg) in gss_unwrap_kerberos_v1() 289 if (sealalg != kctx->gk5e in gss_unwrap_kerberos_v1() [all...] |
H A D | gss_krb5_crypto.c | 158 if (cksumout->len < kctx->gk5e->cksumlength) { in make_checksum() 160 __func__, cksumout->len, kctx->gk5e->name); in make_checksum() 168 tfm = crypto_alloc_ahash(kctx->gk5e->cksum_name, 0, CRYPTO_ALG_ASYNC); in make_checksum() 182 kctx->gk5e->keylength); in make_checksum() 204 switch (kctx->gk5e->ctype) { in make_checksum() 206 err = kctx->gk5e->encrypt(kctx->seq, NULL, checksumdata, in make_checksum() 211 checksumdata + checksumlen - kctx->gk5e->cksumlength, in make_checksum() 212 kctx->gk5e->cksumlength); in make_checksum() 215 memcpy(cksumout->data, checksumdata, kctx->gk5e->cksumlength); in make_checksum() 221 cksumout->len = kctx->gk5e in make_checksum() [all...] |
H A D | gss_krb5_unseal.c | 102 if (signalg != ctx->gk5e->signalg) in gss_verify_mic_v1() 112 if (ctx->gk5e->keyed_cksum) in gss_verify_mic_v1() 122 ctx->gk5e->cksumlength)) in gss_verify_mic_v1() 193 ctx->gk5e->cksumlength)) in gss_verify_mic_v2()
|
H A D | gss_krb5_seal.c | 77 int body_size = GSS_KRB5_TOK_HDR_LEN + ctx->gk5e->cksumlength; in setup_token() 91 *ptr++ = (__force u16)cpu_to_le16(ctx->gk5e->signalg); in setup_token() 122 token->len = GSS_KRB5_TOK_HDR_LEN + ctx->gk5e->cksumlength; in setup_token_v2() 145 if (ctx->gk5e->keyed_cksum) in gss_get_mic_v1()
|
/kernel/linux/linux-6.6/net/sunrpc/auth_gss/ |
H A D | gss_krb5_mech.c | 286 tfm = crypto_alloc_ahash(kctx->gk5e->cksum_name, 0, CRYPTO_ALG_ASYNC); in gss_krb5_alloc_hash_v2() 300 .len = ctx->gk5e->keylength, in gss_krb5_import_ctx_v2() 311 keyout.len = ctx->gk5e->Ke_length; in gss_krb5_import_ctx_v2() 315 ctx->initiator_enc = gss_krb5_alloc_cipher_v2(ctx->gk5e->encrypt_name, in gss_krb5_import_ctx_v2() 319 if (ctx->gk5e->aux_cipher) { in gss_krb5_import_ctx_v2() 321 gss_krb5_alloc_cipher_v2(ctx->gk5e->aux_cipher, in gss_krb5_import_ctx_v2() 331 ctx->acceptor_enc = gss_krb5_alloc_cipher_v2(ctx->gk5e->encrypt_name, in gss_krb5_import_ctx_v2() 335 if (ctx->gk5e->aux_cipher) { in gss_krb5_import_ctx_v2() 337 gss_krb5_alloc_cipher_v2(ctx->gk5e->aux_cipher, in gss_krb5_import_ctx_v2() 344 keyout.len = ctx->gk5e in gss_krb5_import_ctx_v2() [all...] |
H A D | gss_krb5_internal.h | 36 int (*derive_key)(const struct gss_krb5_enctype *gk5e, 64 const struct gss_krb5_enctype *gk5e; /* enctype-specific info */ member 106 int krb5_derive_key_v2(const struct gss_krb5_enctype *gk5e, 112 int krb5_kdf_hmac_sha2(const struct gss_krb5_enctype *gk5e, 118 int krb5_kdf_feedback_cmac(const struct gss_krb5_enctype *gk5e, 143 const struct gss_krb5_enctype *gk5e = kctx->gk5e; in krb5_derive_key() local 153 return gk5e->derive_key(gk5e, inkey, outkey, &label, gfp_mask); in krb5_derive_key()
|
H A D | gss_krb5_keys.c | 150 static int krb5_DK(const struct gss_krb5_enctype *gk5e, in krb5_DK() argument 160 keybytes = gk5e->keybytes; in krb5_DK() 161 keylength = gk5e->keylength; in krb5_DK() 166 cipher = crypto_alloc_sync_skcipher(gk5e->encrypt_name, 0, 0); in krb5_DK() 228 static int krb5_random_to_key_v2(const struct gss_krb5_enctype *gk5e, in krb5_random_to_key_v2() argument 256 * @gk5e: Kerberos 5 enctype profile 267 int krb5_derive_key_v2(const struct gss_krb5_enctype *gk5e, in krb5_derive_key_v2() argument 276 inblock.len = gk5e->keybytes; in krb5_derive_key_v2() 281 ret = krb5_DK(gk5e, inkey, inblock.data, label, gfp_mask); in krb5_derive_key_v2() 283 ret = krb5_random_to_key_v2(gk5e, in krb5_derive_key_v2() 368 krb5_kdf_feedback_cmac(const struct gss_krb5_enctype *gk5e, const struct xdr_netobj *inkey, struct xdr_netobj *outkey, const struct xdr_netobj *constant, gfp_t gfp_mask) krb5_kdf_feedback_cmac() argument 500 krb5_kdf_hmac_sha2(const struct gss_krb5_enctype *gk5e, const struct xdr_netobj *inkey, struct xdr_netobj *outkey, const struct xdr_netobj *label, gfp_t gfp_mask) krb5_kdf_hmac_sha2() argument [all...] |
H A D | gss_krb5_crypto.c | 222 if (cksumout->len < kctx->gk5e->cksumlength) { in make_checksum() 224 __func__, cksumout->len, kctx->gk5e->name); in make_checksum() 232 tfm = crypto_alloc_ahash(kctx->gk5e->cksum_name, 0, CRYPTO_ALG_ASYNC); in make_checksum() 246 kctx->gk5e->keylength); in make_checksum() 268 switch (kctx->gk5e->ctype) { in make_checksum() 275 checksumdata + checksumlen - kctx->gk5e->cksumlength, in make_checksum() 276 kctx->gk5e->cksumlength); in make_checksum() 279 memcpy(cksumout->data, checksumdata, kctx->gk5e->cksumlength); in make_checksum() 285 cksumout->len = kctx->gk5e->cksumlength; in make_checksum() 824 hmac.len = kctx->gk5e in gss_krb5_aes_encrypt() [all...] |
H A D | gss_krb5_test.c | 46 const struct gss_krb5_enctype *gk5e; in kdf_case() local 51 gk5e = gss_krb5_lookup_enctype(param->enctype); in kdf_case() 52 if (!gk5e) in kdf_case() 61 err = gk5e->derive_key(gk5e, param->base_key, &derivedkey, in kdf_case() 79 const struct gss_krb5_enctype *gk5e; in checksum_case() local 85 gk5e = gss_krb5_lookup_enctype(param->enctype); in checksum_case() 86 if (!gk5e) in checksum_case() 89 Kc.len = gk5e->Kc_length; in checksum_case() 92 err = gk5e in checksum_case() 531 const struct gss_krb5_enctype *gk5e; rfc3962_encrypt_case() local 1118 const struct gss_krb5_enctype *gk5e; rfc6803_encrypt_case() local 1613 const struct gss_krb5_enctype *gk5e; rfc8009_encrypt_case() local 1788 const struct gss_krb5_enctype *gk5e; encrypt_selftest_case() local [all...] |
H A D | gss_krb5_unseal.c | 80 .len = ctx->gk5e->cksumlength, in gss_krb5_verify_mic_v2() 114 ctx->gk5e->cksumlength)) in gss_krb5_verify_mic_v2()
|
H A D | gss_krb5_seal.c | 100 token->len = GSS_KRB5_TOK_HDR_LEN + ctx->gk5e->cksumlength; in setup_token_v2() 111 .len = ctx->gk5e->cksumlength, in gss_krb5_get_mic_v2()
|
H A D | gss_krb5_wrap.c | 133 err = (*kctx->gk5e->encrypt)(kctx, offset, buf, pages); in gss_krb5_wrap_v2() 187 err = (*kctx->gk5e->decrypt)(kctx, offset, len, buf, in gss_krb5_unwrap_v2()
|
/kernel/linux/linux-5.10/include/linux/sunrpc/ |
H A D | gss_krb5.h | 81 u32 (*mk_key) (const struct gss_krb5_enctype *gk5e, 101 const struct gss_krb5_enctype *gk5e; /* enctype-specific info */ member 292 krb5_derive_key(const struct gss_krb5_enctype *gk5e, 299 gss_krb5_des3_make_key(const struct gss_krb5_enctype *gk5e, 304 gss_krb5_aes_make_key(const struct gss_krb5_enctype *gk5e,
|