| /OK3568_Linux_fs/kernel/net/sunrpc/auth_gss/ |
| H A D | gss_generic_token.c | 147 g_token_size(struct xdr_netobj *mech, unsigned int body_size) in g_token_size() argument 150 body_size += 2 + (int) mech->len; /* NEED overflow check */ in g_token_size() 160 g_make_token_header(struct xdr_netobj *mech, int body_size, unsigned char **buf) in g_make_token_header() argument 163 der_write_length(buf, 2 + mech->len + body_size); in g_make_token_header() 165 *(*buf)++ = (unsigned char) mech->len; in g_make_token_header() 166 TWRITE_STR(*buf, mech->data, ((int) mech->len)); in g_make_token_header() 180 g_verify_token_header(struct xdr_netobj *mech, int *body_size, in g_verify_token_header() argument 213 if (! g_OID_equal(&toid, mech)) in g_verify_token_header()
|
| H A D | gss_rpc_upcall.c | 280 .mech.len = GSS_OID_MAX_LEN, in gssp_accept_sec_context_upcall() 316 data->mech_oid.len = rctxh.mech.len; in gssp_accept_sec_context_upcall() 317 if (rctxh.mech.data) { in gssp_accept_sec_context_upcall() 318 memcpy(data->mech_oid.data, rctxh.mech.data, in gssp_accept_sec_context_upcall() 320 kfree(rctxh.mech.data); in gssp_accept_sec_context_upcall()
|
| H A D | gss_rpc_xdr.h | 46 gssx_OID mech; member 78 gssx_OID mech; member 101 gssx_OID mech; member
|
| H A D | gss_mech_switch.c | 354 struct gss_api_mech *mech, in gss_import_sec_context() argument 361 (*ctx_id)->mech_type = gss_mech_get(mech); in gss_import_sec_context() 363 return mech->gm_ops->gss_import_sec_context(input_token, bufsize, in gss_import_sec_context()
|
| H A D | auth_gss.c | 72 struct gss_api_mech *mech; member 419 struct gss_api_mech *mech = gss_msg->auth->mech; in gss_encode_v1_msg() local 424 len = scnprintf(p, buflen, "mech=%s uid=%d", mech->gm_name, in gss_encode_v1_msg() 467 if (mech->gm_upcall_enctypes) { in gss_encode_v1_msg() 469 mech->gm_upcall_enctypes); in gss_encode_v1_msg() 742 p = gss_fill_context(p, end, ctx, gss_msg->auth->mech); in gss_pipe_downcall() 1018 gss_auth->mech = gss_mech_get_by_pseudoflavor(flavor); in gss_create_new() 1019 if (!gss_auth->mech) in gss_create_new() 1021 gss_auth->service = gss_pseudoflavor_to_service(gss_auth->mech, flavor); in gss_create_new() 1034 if (gss_pseudoflavor_to_datatouch(gss_auth->mech, flavor)) in gss_create_new() [all …]
|
| H A D | gss_rpc_xdr.c | 306 err = gssx_dec_buffer(xdr, &status->mech); in gssx_dec_status() 586 err = gssx_enc_buffer(xdr, &ctx->mech); in gssx_enc_ctx() 649 err = gssx_dec_buffer(xdr, &ctx->mech); in gssx_dec_ctx()
|
| /OK3568_Linux_fs/kernel/include/linux/sunrpc/ |
| H A D | gss_asn1.h | 69 struct xdr_netobj *mech, 75 struct xdr_netobj *mech, 79 struct xdr_netobj *mech,
|
| H A D | gss_api.h | 50 struct gss_api_mech *mech,
|
| /OK3568_Linux_fs/kernel/drivers/s390/crypto/ |
| H A D | zcrypt_ep11misc.c | 681 u32 mech; in ep11_genaeskey() member 735 req_pl->mech = 0x00001080; /* CKM_AES_KEY_GEN */ in ep11_genaeskey() 802 u16 mode, u32 mech, const u8 *iv, in ep11_cryptsingle() argument 814 u32 mech; in ep11_cryptsingle() member 854 req_pl->mech = (mech ? mech : 0x00001085); /* CKM_AES_CBC_PAD */ in ep11_cryptsingle() 931 u32 mech, const u8 *iv, in ep11_unwrapkey() argument 948 u32 mech; in ep11_unwrapkey() member 996 req_pl->mech = (mech ? mech : 0x00001085); /* CKM_AES_CBC_PAD */ in ep11_unwrapkey() 1070 u32 mech, const u8 *iv, in ep11_wrapkey() argument 1080 u32 mech; in ep11_wrapkey() member [all …]
|
| /OK3568_Linux_fs/yocto/poky/meta/recipes-support/curl/curl/ |
| H A D | CVE-2022-32208.patch | 58 - buf->size = conn->mech->decode(conn->app_data, buf->data, len, 60 + nread = conn->mech->decode(conn->app_data, buf->data, len,
|
| /OK3568_Linux_fs/yocto/meta-openembedded/meta-networking/recipes-daemons/cyrus-sasl/cyrus-sasl/ |
| H A D | 0001-sample-Rename-dprintf-to-cyrus_dprintf.patch | 30 if (mech) { 31 /* make sure that 'mech' appears in 'buf' */
|