Lines Matching refs:RPCSEC_GSS
30 * These functions implement RPCSEC_GSS security for the NFS client and server.
34 * In contrast to the original AUTH_SYS authentication, RPCSEC_GSS is stateful.
54 * creation. During this phase, the client's RPC header contains an RPCSEC_GSS
148 * in the RPCSEC_GSS verifiers.
409 * Inserts an RPCSEC_GSS credential into an RPC header.
528 nfsm_chain_add_32(error, nmc, RPCSEC_GSS);
564 nfsm_chain_add_32(error, nmc, RPCSEC_GSS); // flavor
693 * If it's not an RPCSEC_GSS verifier, then it has to
699 if (verftype != RPCSEC_GSS) {
712 * If we received an RPCSEC_GSS verifier but the
894 * An RPCSEC_GSS request with no integrity or privacy consists
1506 * Invoked at the completion of an RPC call that uses an RPCSEC_GSS
1778 * in an RPCSEC_GSS credential.
1872 * cached RPCSEC_GSS contexts.
1926 * Here the server receives an RPCSEC_GSS credential in an
2063 if (flavor != RPCSEC_GSS || verflen != KRB5_SZ_TOKEN(ki->hash_len))
2286 nfsm_chain_add_32(error, nmc, RPCSEC_GSS);
2427 * an RPCSEC_GSS credential is used.
2903 * Encode an ASN.1 token to be wrapped in an RPCSEC_GSS verifier.
2958 * to the RPCSEC_GSS protocol sequence number. This
3044 * Decode an ASN.1 token from an RPCSEC_GSS verifier.
3086 * in the ASN.1 token because the RPCSEC_GSS protocol has its
3265 * of an RPCSEC_GSS reply.