/linux/net/sunrpc/auth_gss/ |
H A D | gss_generic_token.c |
|
H A D | gss_rpc_upcall.c | 286 .mech.len = GSS_OID_MAX_LEN, in gssp_accept_sec_context_upcall() 322 data->mech_oid.len = rctxh.mech.len; in gssp_accept_sec_context_upcall() 323 if (rctxh.mech.data) { in gssp_accept_sec_context_upcall() 324 memcpy(data->mech_oid.data, rctxh.mech.data, in gssp_accept_sec_context_upcall() 326 kfree(rctxh.mech.data); in gssp_accept_sec_context_upcall()
|
H A D | gss_rpc_xdr.h | 46 gssx_OID mech; member 78 gssx_OID mech; member 101 gssx_OID mech; member
|
H A D | gss_mech_switch.c | 251 * @info: a GSS mech OID, quality of protection, and service value 349 /* The mech could probably be determined from the token instead, but it's just 353 struct gss_api_mech *mech, in gss_import_sec_context() 360 (*ctx_id)->mech_type = gss_mech_get(mech); in gss_import_sec_context() 362 return mech->gm_ops->gss_import_sec_context(input_token, bufsize, in gss_import_sec_context() 354 gss_import_sec_context(const void * input_token,size_t bufsize,struct gss_api_mech * mech,struct gss_ctx ** ctx_id,time64_t * endtime,gfp_t gfp_mask) gss_import_sec_context() argument
|
H A D | auth_gss.c | 88 struct gss_api_mech *mech; member 436 struct gss_api_mech *mech = gss_msg->auth->mech; in gss_encode_v1_msg() local 441 len = scnprintf(p, buflen, "mech=%s uid=%d", mech->gm_name, in gss_encode_v1_msg() 484 if (mech->gm_upcall_enctypes) { in gss_encode_v1_msg() 486 mech->gm_upcall_enctypes); in gss_encode_v1_msg() 774 p = gss_fill_context(p, end, ctx, gss_msg->auth->mech); in gss_pipe_downcall() 1051 gss_auth->mech = gss_mech_get_by_pseudoflavor(flavor); in gss_create_new() 1052 if (!gss_auth->mech) in gss_create_new() [all...] |
H A D | svcauth_gss.c | 351 * uid, gidlist, mechanism, service-set, mech-specific-data 543 /* mech name */ in rsc_parse() 553 /* mech-specific data: */ in rsc_parse() 1259 /* get mech handle from OID */ in gss_proxy_save_rsc() 1266 /* mech-specific data: */ in gss_proxy_save_rsc() 1489 struct gss_api_mech *mech; in read_gss_krb5_enctypes() local 1492 mech = gss_mech_get_by_OID(&oid); in read_gss_krb5_enctypes() 1493 if (!mech) in read_gss_krb5_enctypes() 1495 if (!mech->gm_upcall_enctypes) { in read_gss_krb5_enctypes() 1496 gss_mech_put(mech); in read_gss_krb5_enctypes() [all...] |
H A D | gss_rpc_xdr.c | 317 err = gssx_dec_buffer(xdr, &status->mech); in gssx_dec_status() 597 err = gssx_enc_buffer(xdr, &ctx->mech); in gssx_enc_ctx() 660 err = gssx_dec_buffer(xdr, &ctx->mech); in gssx_dec_ctx()
|
/linux/include/linux/sunrpc/ |
H A D | gss_asn1.h |
|
H A D | gss_api.h | 50 struct gss_api_mech *mech,
|
/linux/drivers/s390/crypto/ |
H A D | zcrypt_ep11misc.c | 803 u32 mech; in _ep11_genaeskey() member 866 req_pl->mech = 0x00001080; /* CKM_AES_KEY_GEN */ in _ep11_genaeskey() 973 u16 mode, u32 mech, const u8 *iv, in ep11_cryptsingle() argument 985 u32 mech; in ep11_cryptsingle() member 1025 req_pl->mech = (mech ? mech : 0x00001085); /* CKM_AES_CBC_PAD */ in ep11_cryptsingle() 1107 u32 mech, const u8 *iv, in _ep11_unwrapkey() argument 1124 u32 mech; in _ep11_unwrapkey() member 1181 req_pl->mech = (mech ? mech : 0x00001085); /* CKM_AES_CBC_PAD */ in _ep11_unwrapkey() 1257 u32 mech, const u8 *iv, in ep11_unwrapkey() argument 1273 mech, iv, keybitsize, keygenflags, in ep11_unwrapkey() [all …]
|