Searched refs:gk5e (Results 1 - 8 of 8) sorted by relevance
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/net/sunrpc/auth_gss/ |
H A D | gss_krb5_keys.c | 150 u32 krb5_derive_key(const struct gss_krb5_enctype *gk5e, argument 162 blocksize = gk5e->blocksize; 163 keybytes = gk5e->keybytes; 164 keylength = gk5e->keylength; 169 cipher = crypto_alloc_blkcipher(gk5e->encrypt_name, 0, 210 (*(gk5e->encrypt))(cipher, NULL, inblock.data, 228 BUG_ON(gk5e->mk_key == NULL); 229 ret = (*(gk5e->mk_key))(gk5e, &inblock, outkey); 232 __func__, ret, gk5e 271 gss_krb5_des3_make_key(const struct gss_krb5_enctype *gk5e, struct xdr_netobj *randombits, struct xdr_netobj *key) argument 311 gss_krb5_aes_make_key(const struct gss_krb5_enctype *gk5e, struct xdr_netobj *randombits, struct xdr_netobj *key) argument [all...] |
H A D | gss_krb5_crypto.c | 166 if (cksumout->len < kctx->gk5e->cksumlength) { 168 __func__, cksumout->len, kctx->gk5e->name); 181 hmac_md5 = crypto_alloc_hash(kctx->gk5e->cksum_name, 0, 217 err = crypto_hash_setkey(hmac_md5, cksumkey, kctx->gk5e->keylength); 227 memcpy(cksumout->data, checksumdata, kctx->gk5e->cksumlength); 228 cksumout->len = kctx->gk5e->cksumlength; 251 if (kctx->gk5e->ctype == CKSUMTYPE_HMAC_MD5_ARCFOUR) 256 if (cksumout->len < kctx->gk5e->cksumlength) { 258 __func__, cksumout->len, kctx->gk5e->name); 262 desc.tfm = crypto_alloc_hash(kctx->gk5e [all...] |
H A D | gss_krb5_mech.c | 247 *res = crypto_alloc_blkcipher(ctx->gk5e->encrypt_name, 0, 251 "crypto algorithm %s\n", ctx->gk5e->encrypt_name); 257 "crypto algorithm %s\n", ctx->gk5e->encrypt_name); 285 ctx->gk5e = get_gss_krb5_enctype(ctx->enctype); 286 if (ctx->gk5e == NULL) { 357 if (crypto_blkcipher_setkey(cp, key, ctx->gk5e->keylength)) { 387 keyin.len = ctx->gk5e->keylength; 388 keyout.len = ctx->gk5e->keylength; 391 ctx->seq = context_v2_alloc_cipher(ctx, ctx->gk5e->encrypt_name, 396 ctx->enc = context_v2_alloc_cipher(ctx, ctx->gk5e [all...] |
H A D | gss_krb5_wrap.c | 155 u32 conflen = kctx->gk5e->conflen; 167 GSS_KRB5_TOK_HDR_LEN + kctx->gk5e->cksumlength + plainlen) - 178 kctx->gk5e->cksumlength + plainlen, &ptr); 185 msg_start = ptr + GSS_KRB5_TOK_HDR_LEN + kctx->gk5e->cksumlength; 187 *(__be16 *)(ptr + 2) = cpu_to_le16(kctx->gk5e->signalg); 189 *(__be16 *)(ptr + 4) = cpu_to_le16(kctx->gk5e->sealalg); 193 if (kctx->gk5e->keyed_cksum) 219 cipher = crypto_alloc_blkcipher(kctx->gk5e->encrypt_name, 0, 256 u32 conflen = kctx->gk5e->conflen; 275 if (signalg != kctx->gk5e [all...] |
H A D | gss_krb5_seal.c | 77 int body_size = GSS_KRB5_TOK_HDR_LEN + ctx->gk5e->cksumlength; 87 *ptr++ = cpu_to_le16(ctx->gk5e->signalg); 117 token->len = GSS_KRB5_TOK_HDR_LEN + ctx->gk5e->cksumlength; 140 if (ctx->gk5e->keyed_cksum)
|
H A D | gss_krb5_unseal.c | 101 if (signalg != ctx->gk5e->signalg) 111 if (ctx->gk5e->keyed_cksum) 121 ctx->gk5e->cksumlength)) 191 ctx->gk5e->cksumlength))
|
H A D | gss_krb5_seqnum.c | 51 cipher = crypto_alloc_blkcipher(kctx->gk5e->encrypt_name, 0, 109 cipher = crypto_alloc_blkcipher(kctx->gk5e->encrypt_name, 0,
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/include/linux/sunrpc/ |
H A D | gss_krb5.h | 80 u32 (*mk_key) (const struct gss_krb5_enctype *gk5e, 100 const struct gss_krb5_enctype *gk5e; /* enctype-specific info */ member in struct:krb5_ctx 294 krb5_derive_key(const struct gss_krb5_enctype *gk5e, 301 gss_krb5_des3_make_key(const struct gss_krb5_enctype *gk5e, 306 gss_krb5_aes_make_key(const struct gss_krb5_enctype *gk5e,
|
Completed in 60 milliseconds