Home
last modified time | relevance | path

Searched refs:mech (Results 1 - 19 of 19) sorted by relevance

/kernel/linux/linux-5.10/net/sunrpc/auth_gss/
H A Dgss_generic_token.c51 /* XXXX this code currently makes the assumption that a mech oid will
69 the sequence tag and length octets, the mech OID DER encoding, and the
144 /* returns the length of a token, given the mech oid and the body size */
147 g_token_size(struct xdr_netobj *mech, unsigned int body_size) in g_token_size() argument
150 body_size += 2 + (int) mech->len; /* NEED overflow check */ in g_token_size()
160 g_make_token_header(struct xdr_netobj *mech, int body_size, unsigned char **buf) in g_make_token_header() argument
163 der_write_length(buf, 2 + mech->len + body_size); in g_make_token_header()
165 *(*buf)++ = (unsigned char) mech->len; in g_make_token_header()
166 TWRITE_STR(*buf, mech->data, ((int) mech in g_make_token_header()
180 g_verify_token_header(struct xdr_netobj *mech, int *body_size, unsigned char **buf_in, int toksize) g_verify_token_header() argument
[all...]
H A Dgss_rpc_upcall.c280 .mech.len = GSS_OID_MAX_LEN, in gssp_accept_sec_context_upcall()
316 data->mech_oid.len = rctxh.mech.len; in gssp_accept_sec_context_upcall()
317 if (rctxh.mech.data) { in gssp_accept_sec_context_upcall()
318 memcpy(data->mech_oid.data, rctxh.mech.data, in gssp_accept_sec_context_upcall()
320 kfree(rctxh.mech.data); in gssp_accept_sec_context_upcall()
H A Dgss_rpc_xdr.h46 gssx_OID mech; member
78 gssx_OID mech; member
101 gssx_OID mech; member
H A Dgss_mech_switch.c252 * @info: a GSS mech OID, quality of protection, and service value
350 /* The mech could probably be determined from the token instead, but it's just
354 struct gss_api_mech *mech, in gss_import_sec_context()
361 (*ctx_id)->mech_type = gss_mech_get(mech); in gss_import_sec_context()
363 return mech->gm_ops->gss_import_sec_context(input_token, bufsize, in gss_import_sec_context()
353 gss_import_sec_context(const void *input_token, size_t bufsize, struct gss_api_mech *mech, struct gss_ctx **ctx_id, time64_t *endtime, gfp_t gfp_mask) gss_import_sec_context() argument
H A Dauth_gss.c72 struct gss_api_mech *mech; member
419 struct gss_api_mech *mech = gss_msg->auth->mech; in gss_encode_v1_msg() local
424 len = scnprintf(p, buflen, "mech=%s uid=%d", mech->gm_name, in gss_encode_v1_msg()
467 if (mech->gm_upcall_enctypes) { in gss_encode_v1_msg()
469 mech->gm_upcall_enctypes); in gss_encode_v1_msg()
757 p = gss_fill_context(p, end, ctx, gss_msg->auth->mech); in gss_pipe_downcall()
1033 gss_auth->mech = gss_mech_get_by_pseudoflavor(flavor); in gss_create_new()
1034 if (!gss_auth->mech) in gss_create_new()
[all...]
H A Dgss_rpc_xdr.c316 /* status->mech */ in gssx_dec_status()
317 err = gssx_dec_buffer(xdr, &status->mech); in gssx_dec_status()
596 /* ctx->mech */ in gssx_enc_ctx()
597 err = gssx_enc_buffer(xdr, &ctx->mech); in gssx_enc_ctx()
659 /* ctx->mech */ in gssx_dec_ctx()
660 err = gssx_dec_buffer(xdr, &ctx->mech); in gssx_dec_ctx()
/kernel/linux/linux-6.6/net/sunrpc/auth_gss/
H A Dgss_generic_token.c51 /* XXXX this code currently makes the assumption that a mech oid will
69 the sequence tag and length octets, the mech OID DER encoding, and the
144 /* returns the length of a token, given the mech oid and the body size */
147 g_token_size(struct xdr_netobj *mech, unsigned int body_size) in g_token_size() argument
150 body_size += 2 + (int) mech->len; /* NEED overflow check */ in g_token_size()
160 g_make_token_header(struct xdr_netobj *mech, int body_size, unsigned char **buf) in g_make_token_header() argument
163 der_write_length(buf, 2 + mech->len + body_size); in g_make_token_header()
165 *(*buf)++ = (unsigned char) mech->len; in g_make_token_header()
166 TWRITE_STR(*buf, mech->data, ((int) mech in g_make_token_header()
180 g_verify_token_header(struct xdr_netobj *mech, int *body_size, unsigned char **buf_in, int toksize) g_verify_token_header() argument
[all...]
H A Dgss_rpc_upcall.c286 .mech.len = GSS_OID_MAX_LEN, in gssp_accept_sec_context_upcall()
322 data->mech_oid.len = rctxh.mech.len; in gssp_accept_sec_context_upcall()
323 if (rctxh.mech.data) { in gssp_accept_sec_context_upcall()
324 memcpy(data->mech_oid.data, rctxh.mech.data, in gssp_accept_sec_context_upcall()
326 kfree(rctxh.mech.data); in gssp_accept_sec_context_upcall()
H A Dgss_rpc_xdr.h46 gssx_OID mech; member
78 gssx_OID mech; member
101 gssx_OID mech; member
H A Dgss_mech_switch.c252 * @info: a GSS mech OID, quality of protection, and service value
350 /* The mech could probably be determined from the token instead, but it's just
354 struct gss_api_mech *mech, in gss_import_sec_context()
361 (*ctx_id)->mech_type = gss_mech_get(mech); in gss_import_sec_context()
363 return mech->gm_ops->gss_import_sec_context(input_token, bufsize, in gss_import_sec_context()
353 gss_import_sec_context(const void *input_token, size_t bufsize, struct gss_api_mech *mech, struct gss_ctx **ctx_id, time64_t *endtime, gfp_t gfp_mask) gss_import_sec_context() argument
H A Dauth_gss.c88 struct gss_api_mech *mech; member
436 struct gss_api_mech *mech = gss_msg->auth->mech; in gss_encode_v1_msg() local
441 len = scnprintf(p, buflen, "mech=%s uid=%d", mech->gm_name, in gss_encode_v1_msg()
484 if (mech->gm_upcall_enctypes) { in gss_encode_v1_msg()
486 mech->gm_upcall_enctypes); in gss_encode_v1_msg()
774 p = gss_fill_context(p, end, ctx, gss_msg->auth->mech); in gss_pipe_downcall()
1051 gss_auth->mech = gss_mech_get_by_pseudoflavor(flavor); in gss_create_new()
1052 if (!gss_auth->mech) in gss_create_new()
[all...]
H A Dgss_rpc_xdr.c316 /* status->mech */ in gssx_dec_status()
317 err = gssx_dec_buffer(xdr, &status->mech); in gssx_dec_status()
596 /* ctx->mech */ in gssx_enc_ctx()
597 err = gssx_enc_buffer(xdr, &ctx->mech); in gssx_enc_ctx()
659 /* ctx->mech */ in gssx_dec_ctx()
660 err = gssx_dec_buffer(xdr, &ctx->mech); in gssx_dec_ctx()
H A Dsvcauth_gss.c351 * uid, gidlist, mechanism, service-set, mech-specific-data
543 /* mech name */ in rsc_parse()
553 /* mech-specific data: */ in rsc_parse()
1275 /* get mech handle from OID */ in gss_proxy_save_rsc()
1282 /* mech-specific data: */ in gss_proxy_save_rsc()
1505 struct gss_api_mech *mech; in read_gss_krb5_enctypes() local
1508 mech = gss_mech_get_by_OID(&oid); in read_gss_krb5_enctypes()
1509 if (!mech) in read_gss_krb5_enctypes()
1511 if (!mech->gm_upcall_enctypes) { in read_gss_krb5_enctypes()
1512 gss_mech_put(mech); in read_gss_krb5_enctypes()
[all...]
/kernel/linux/linux-5.10/include/linux/sunrpc/
H A Dgss_asn1.h69 struct xdr_netobj *mech,
75 struct xdr_netobj *mech,
79 struct xdr_netobj *mech,
H A Dgss_api.h50 struct gss_api_mech *mech,
/kernel/linux/linux-6.6/include/linux/sunrpc/
H A Dgss_asn1.h69 struct xdr_netobj *mech,
75 struct xdr_netobj *mech,
79 struct xdr_netobj *mech,
H A Dgss_api.h50 struct gss_api_mech *mech,
/kernel/linux/linux-5.10/drivers/s390/crypto/
H A Dzcrypt_ep11misc.c681 u32 mech; in ep11_genaeskey() member
735 req_pl->mech = 0x00001080; /* CKM_AES_KEY_GEN */ in ep11_genaeskey()
802 u16 mode, u32 mech, const u8 *iv, in ep11_cryptsingle()
814 u32 mech; in ep11_cryptsingle() member
851 /* mech is mech + mech params (iv here) */ in ep11_cryptsingle()
854 req_pl->mech = (mech ? mech in ep11_cryptsingle()
801 ep11_cryptsingle(u16 card, u16 domain, u16 mode, u32 mech, const u8 *iv, const u8 *key, size_t keysize, const u8 *inbuf, size_t inbufsize, u8 *outbuf, size_t *outbufsize) ep11_cryptsingle() argument
928 ep11_unwrapkey(u16 card, u16 domain, const u8 *kek, size_t keksize, const u8 *enckey, size_t enckeysize, u32 mech, const u8 *iv, u32 keybitsize, u32 keygenflags, u8 *keybuf, size_t *keybufsize) ep11_unwrapkey() argument
948 u32 mech; ep11_unwrapkey() member
1068 ep11_wrapkey(u16 card, u16 domain, const u8 *key, size_t keysize, u32 mech, const u8 *iv, u8 *databuf, size_t *datasize) ep11_wrapkey() argument
1080 u32 mech; ep11_wrapkey() member
[all...]
/kernel/linux/linux-6.6/drivers/s390/crypto/
H A Dzcrypt_ep11misc.c786 u32 mech; in _ep11_genaeskey() member
850 req_pl->mech = 0x00001080; /* CKM_AES_KEY_GEN */ in _ep11_genaeskey()
952 u16 mode, u32 mech, const u8 *iv, in ep11_cryptsingle()
964 u32 mech; in ep11_cryptsingle() member
1001 /* mech is mech + mech params (iv here) */ in ep11_cryptsingle()
1004 req_pl->mech = (mech ? mech in ep11_cryptsingle()
951 ep11_cryptsingle(u16 card, u16 domain, u16 mode, u32 mech, const u8 *iv, const u8 *key, size_t keysize, const u8 *inbuf, size_t inbufsize, u8 *outbuf, size_t *outbufsize) ep11_cryptsingle() argument
1078 _ep11_unwrapkey(u16 card, u16 domain, const u8 *kek, size_t keksize, const u8 *enckey, size_t enckeysize, u32 mech, const u8 *iv, u32 keybitsize, u32 keygenflags, u8 *keybuf, size_t *keybufsize) _ep11_unwrapkey() argument
1098 u32 mech; _ep11_unwrapkey() member
1223 ep11_unwrapkey(u16 card, u16 domain, const u8 *kek, size_t keksize, const u8 *enckey, size_t enckeysize, u32 mech, const u8 *iv, u32 keybitsize, u32 keygenflags, u8 *keybuf, size_t *keybufsize, u8 keybufver) ep11_unwrapkey() argument
1259 _ep11_wrapkey(u16 card, u16 domain, const u8 *key, size_t keysize, u32 mech, const u8 *iv, u8 *databuf, size_t *datasize) _ep11_wrapkey() argument
1271 u32 mech; _ep11_wrapkey() member
[all...]

Completed in 27 milliseconds