/kernel/linux/linux-5.10/net/sunrpc/auth_gss/ |
H A D | gss_generic_token.c | 51 /* XXXX this code currently makes the assumption that a mech oid will 69 the sequence tag and length octets, the mech OID DER encoding, and the 144 /* returns the length of a token, given the mech oid and the body size */ 147 g_token_size(struct xdr_netobj *mech, unsigned int body_size) in g_token_size() argument 150 body_size += 2 + (int) mech->len; /* NEED overflow check */ in g_token_size() 160 g_make_token_header(struct xdr_netobj *mech, int body_size, unsigned char **buf) in g_make_token_header() argument 163 der_write_length(buf, 2 + mech->len + body_size); in g_make_token_header() 165 *(*buf)++ = (unsigned char) mech->len; in g_make_token_header() 166 TWRITE_STR(*buf, mech->data, ((int) mech in g_make_token_header() 180 g_verify_token_header(struct xdr_netobj *mech, int *body_size, unsigned char **buf_in, int toksize) g_verify_token_header() argument [all...] |
H A D | gss_rpc_upcall.c | 280 .mech.len = GSS_OID_MAX_LEN, in gssp_accept_sec_context_upcall() 316 data->mech_oid.len = rctxh.mech.len; in gssp_accept_sec_context_upcall() 317 if (rctxh.mech.data) { in gssp_accept_sec_context_upcall() 318 memcpy(data->mech_oid.data, rctxh.mech.data, in gssp_accept_sec_context_upcall() 320 kfree(rctxh.mech.data); in gssp_accept_sec_context_upcall()
|
H A D | gss_rpc_xdr.h | 46 gssx_OID mech; member 78 gssx_OID mech; member 101 gssx_OID mech; member
|
H A D | gss_mech_switch.c | 252 * @info: a GSS mech OID, quality of protection, and service value 350 /* The mech could probably be determined from the token instead, but it's just 354 struct gss_api_mech *mech, in gss_import_sec_context() 361 (*ctx_id)->mech_type = gss_mech_get(mech); in gss_import_sec_context() 363 return mech->gm_ops->gss_import_sec_context(input_token, bufsize, in gss_import_sec_context() 353 gss_import_sec_context(const void *input_token, size_t bufsize, struct gss_api_mech *mech, struct gss_ctx **ctx_id, time64_t *endtime, gfp_t gfp_mask) gss_import_sec_context() argument
|
H A D | auth_gss.c | 72 struct gss_api_mech *mech; member 419 struct gss_api_mech *mech = gss_msg->auth->mech; in gss_encode_v1_msg() local 424 len = scnprintf(p, buflen, "mech=%s uid=%d", mech->gm_name, in gss_encode_v1_msg() 467 if (mech->gm_upcall_enctypes) { in gss_encode_v1_msg() 469 mech->gm_upcall_enctypes); in gss_encode_v1_msg() 757 p = gss_fill_context(p, end, ctx, gss_msg->auth->mech); in gss_pipe_downcall() 1033 gss_auth->mech = gss_mech_get_by_pseudoflavor(flavor); in gss_create_new() 1034 if (!gss_auth->mech) in gss_create_new() [all...] |
H A D | gss_rpc_xdr.c | 316 /* status->mech */ in gssx_dec_status() 317 err = gssx_dec_buffer(xdr, &status->mech); in gssx_dec_status() 596 /* ctx->mech */ in gssx_enc_ctx() 597 err = gssx_enc_buffer(xdr, &ctx->mech); in gssx_enc_ctx() 659 /* ctx->mech */ in gssx_dec_ctx() 660 err = gssx_dec_buffer(xdr, &ctx->mech); in gssx_dec_ctx()
|
/kernel/linux/linux-6.6/net/sunrpc/auth_gss/ |
H A D | gss_generic_token.c | 51 /* XXXX this code currently makes the assumption that a mech oid will 69 the sequence tag and length octets, the mech OID DER encoding, and the 144 /* returns the length of a token, given the mech oid and the body size */ 147 g_token_size(struct xdr_netobj *mech, unsigned int body_size) in g_token_size() argument 150 body_size += 2 + (int) mech->len; /* NEED overflow check */ in g_token_size() 160 g_make_token_header(struct xdr_netobj *mech, int body_size, unsigned char **buf) in g_make_token_header() argument 163 der_write_length(buf, 2 + mech->len + body_size); in g_make_token_header() 165 *(*buf)++ = (unsigned char) mech->len; in g_make_token_header() 166 TWRITE_STR(*buf, mech->data, ((int) mech in g_make_token_header() 180 g_verify_token_header(struct xdr_netobj *mech, int *body_size, unsigned char **buf_in, int toksize) g_verify_token_header() argument [all...] |
H A D | gss_rpc_upcall.c | 286 .mech.len = GSS_OID_MAX_LEN, in gssp_accept_sec_context_upcall() 322 data->mech_oid.len = rctxh.mech.len; in gssp_accept_sec_context_upcall() 323 if (rctxh.mech.data) { in gssp_accept_sec_context_upcall() 324 memcpy(data->mech_oid.data, rctxh.mech.data, in gssp_accept_sec_context_upcall() 326 kfree(rctxh.mech.data); in gssp_accept_sec_context_upcall()
|
H A D | gss_rpc_xdr.h | 46 gssx_OID mech; member 78 gssx_OID mech; member 101 gssx_OID mech; member
|
H A D | gss_mech_switch.c | 252 * @info: a GSS mech OID, quality of protection, and service value 350 /* The mech could probably be determined from the token instead, but it's just 354 struct gss_api_mech *mech, in gss_import_sec_context() 361 (*ctx_id)->mech_type = gss_mech_get(mech); in gss_import_sec_context() 363 return mech->gm_ops->gss_import_sec_context(input_token, bufsize, in gss_import_sec_context() 353 gss_import_sec_context(const void *input_token, size_t bufsize, struct gss_api_mech *mech, struct gss_ctx **ctx_id, time64_t *endtime, gfp_t gfp_mask) gss_import_sec_context() argument
|
H A D | auth_gss.c | 88 struct gss_api_mech *mech; member 436 struct gss_api_mech *mech = gss_msg->auth->mech; in gss_encode_v1_msg() local 441 len = scnprintf(p, buflen, "mech=%s uid=%d", mech->gm_name, in gss_encode_v1_msg() 484 if (mech->gm_upcall_enctypes) { in gss_encode_v1_msg() 486 mech->gm_upcall_enctypes); in gss_encode_v1_msg() 774 p = gss_fill_context(p, end, ctx, gss_msg->auth->mech); in gss_pipe_downcall() 1051 gss_auth->mech = gss_mech_get_by_pseudoflavor(flavor); in gss_create_new() 1052 if (!gss_auth->mech) in gss_create_new() [all...] |
H A D | gss_rpc_xdr.c | 316 /* status->mech */ in gssx_dec_status() 317 err = gssx_dec_buffer(xdr, &status->mech); in gssx_dec_status() 596 /* ctx->mech */ in gssx_enc_ctx() 597 err = gssx_enc_buffer(xdr, &ctx->mech); in gssx_enc_ctx() 659 /* ctx->mech */ in gssx_dec_ctx() 660 err = gssx_dec_buffer(xdr, &ctx->mech); in gssx_dec_ctx()
|
H A D | svcauth_gss.c | 351 * uid, gidlist, mechanism, service-set, mech-specific-data 543 /* mech name */ in rsc_parse() 553 /* mech-specific data: */ in rsc_parse() 1275 /* get mech handle from OID */ in gss_proxy_save_rsc() 1282 /* mech-specific data: */ in gss_proxy_save_rsc() 1505 struct gss_api_mech *mech; in read_gss_krb5_enctypes() local 1508 mech = gss_mech_get_by_OID(&oid); in read_gss_krb5_enctypes() 1509 if (!mech) in read_gss_krb5_enctypes() 1511 if (!mech->gm_upcall_enctypes) { in read_gss_krb5_enctypes() 1512 gss_mech_put(mech); in read_gss_krb5_enctypes() [all...] |
/kernel/linux/linux-5.10/include/linux/sunrpc/ |
H A D | gss_asn1.h | 69 struct xdr_netobj *mech, 75 struct xdr_netobj *mech, 79 struct xdr_netobj *mech,
|
H A D | gss_api.h | 50 struct gss_api_mech *mech,
|
/kernel/linux/linux-6.6/include/linux/sunrpc/ |
H A D | gss_asn1.h | 69 struct xdr_netobj *mech, 75 struct xdr_netobj *mech, 79 struct xdr_netobj *mech,
|
H A D | gss_api.h | 50 struct gss_api_mech *mech,
|
/kernel/linux/linux-5.10/drivers/s390/crypto/ |
H A D | zcrypt_ep11misc.c | 681 u32 mech; in ep11_genaeskey() member 735 req_pl->mech = 0x00001080; /* CKM_AES_KEY_GEN */ in ep11_genaeskey() 802 u16 mode, u32 mech, const u8 *iv, in ep11_cryptsingle() 814 u32 mech; in ep11_cryptsingle() member 851 /* mech is mech + mech params (iv here) */ in ep11_cryptsingle() 854 req_pl->mech = (mech ? mech in ep11_cryptsingle() 801 ep11_cryptsingle(u16 card, u16 domain, u16 mode, u32 mech, const u8 *iv, const u8 *key, size_t keysize, const u8 *inbuf, size_t inbufsize, u8 *outbuf, size_t *outbufsize) ep11_cryptsingle() argument 928 ep11_unwrapkey(u16 card, u16 domain, const u8 *kek, size_t keksize, const u8 *enckey, size_t enckeysize, u32 mech, const u8 *iv, u32 keybitsize, u32 keygenflags, u8 *keybuf, size_t *keybufsize) ep11_unwrapkey() argument 948 u32 mech; ep11_unwrapkey() member 1068 ep11_wrapkey(u16 card, u16 domain, const u8 *key, size_t keysize, u32 mech, const u8 *iv, u8 *databuf, size_t *datasize) ep11_wrapkey() argument 1080 u32 mech; ep11_wrapkey() member [all...] |
/kernel/linux/linux-6.6/drivers/s390/crypto/ |
H A D | zcrypt_ep11misc.c | 786 u32 mech; in _ep11_genaeskey() member 850 req_pl->mech = 0x00001080; /* CKM_AES_KEY_GEN */ in _ep11_genaeskey() 952 u16 mode, u32 mech, const u8 *iv, in ep11_cryptsingle() 964 u32 mech; in ep11_cryptsingle() member 1001 /* mech is mech + mech params (iv here) */ in ep11_cryptsingle() 1004 req_pl->mech = (mech ? mech in ep11_cryptsingle() 951 ep11_cryptsingle(u16 card, u16 domain, u16 mode, u32 mech, const u8 *iv, const u8 *key, size_t keysize, const u8 *inbuf, size_t inbufsize, u8 *outbuf, size_t *outbufsize) ep11_cryptsingle() argument 1078 _ep11_unwrapkey(u16 card, u16 domain, const u8 *kek, size_t keksize, const u8 *enckey, size_t enckeysize, u32 mech, const u8 *iv, u32 keybitsize, u32 keygenflags, u8 *keybuf, size_t *keybufsize) _ep11_unwrapkey() argument 1098 u32 mech; _ep11_unwrapkey() member 1223 ep11_unwrapkey(u16 card, u16 domain, const u8 *kek, size_t keksize, const u8 *enckey, size_t enckeysize, u32 mech, const u8 *iv, u32 keybitsize, u32 keygenflags, u8 *keybuf, size_t *keybufsize, u8 keybufver) ep11_unwrapkey() argument 1259 _ep11_wrapkey(u16 card, u16 domain, const u8 *key, size_t keysize, u32 mech, const u8 *iv, u8 *databuf, size_t *datasize) _ep11_wrapkey() argument 1271 u32 mech; _ep11_wrapkey() member [all...] |