<feed xmlns='http://www.w3.org/2005/Atom'>
<title>kernel/include/linux/sunrpc/gss_krb5.h, branch linux-3.0.y</title>
<subtitle>Hosts the 0x221E linux distro kernel.</subtitle>
<id>https://universe.0xinfinity.dev/distro/kernel/atom?h=linux-3.0.y</id>
<link rel='self' href='https://universe.0xinfinity.dev/distro/kernel/atom?h=linux-3.0.y'/>
<link rel='alternate' type='text/html' href='https://universe.0xinfinity.dev/distro/kernel/'/>
<updated>2010-05-14T19:09:33Z</updated>
<entry>
<title>NFS: Don't use GFP_KERNEL in rpcsec_gss downcalls</title>
<updated>2010-05-14T19:09:33Z</updated>
<author>
<name>Trond Myklebust</name>
<email>Trond.Myklebust@netapp.com</email>
</author>
<published>2010-05-13T16:51:02Z</published>
<link rel='alternate' type='text/html' href='https://universe.0xinfinity.dev/distro/kernel/commit/?id=1f4c86c0be9064ab4eebd9e67c84606c1cfeec4b'/>
<id>urn:sha1:1f4c86c0be9064ab4eebd9e67c84606c1cfeec4b</id>
<content type='text'>
Again, we can deadlock if the memory reclaim triggers a writeback that
requires a rpcsec_gss credential lookup.

Signed-off-by: Trond Myklebust &lt;Trond.Myklebust@netapp.com&gt;
</content>
</entry>
<entry>
<title>gss_krb5: Add support for rc4-hmac encryption</title>
<updated>2010-05-14T19:09:20Z</updated>
<author>
<name>Kevin Coffman</name>
<email>kwc@citi.umich.edu</email>
</author>
<published>2010-03-17T17:03:06Z</published>
<link rel='alternate' type='text/html' href='https://universe.0xinfinity.dev/distro/kernel/commit/?id=fffdaef2eb4a7333952e55cf97f1fc0fcc35f981'/>
<id>urn:sha1:fffdaef2eb4a7333952e55cf97f1fc0fcc35f981</id>
<content type='text'>
Add necessary changes to add kernel support for the rc4-hmac Kerberos
encryption type used by Microsoft and described in rfc4757.

Signed-off-by: Kevin Coffman &lt;kwc@citi.umich.edu&gt;
Signed-off-by: Steve Dickson &lt;steved@redhat.com&gt;
Signed-off-by: Trond Myklebust &lt;Trond.Myklebust@netapp.com&gt;
</content>
</entry>
<entry>
<title>gss_krb5: Use confounder length in wrap code</title>
<updated>2010-05-14T19:09:20Z</updated>
<author>
<name>Kevin Coffman</name>
<email>kwc@citi.umich.edu</email>
</author>
<published>2010-03-17T17:03:05Z</published>
<link rel='alternate' type='text/html' href='https://universe.0xinfinity.dev/distro/kernel/commit/?id=5af46547ec451918f3ba51efe59b317d33adf701'/>
<id>urn:sha1:5af46547ec451918f3ba51efe59b317d33adf701</id>
<content type='text'>
All encryption types use a confounder at the beginning of the
wrap token.  In all encryption types except arcfour-hmac, the
confounder is the same as the blocksize.  arcfour-hmac has a
blocksize of one, but uses an eight byte confounder.

Add an entry to the crypto framework definitions for the
confounder length and change the wrap/unwrap code to use
the confounder length rather than assuming it is always
the blocksize.

Signed-off-by: Kevin Coffman &lt;kwc@citi.umich.edu&gt;
Signed-off-by: Steve Dickson &lt;steved@redhat.com&gt;
Signed-off-by: Trond Myklebust &lt;Trond.Myklebust@netapp.com&gt;
</content>
</entry>
<entry>
<title>gssd_krb5: More arcfour-hmac support</title>
<updated>2010-05-14T19:09:20Z</updated>
<author>
<name>Kevin Coffman</name>
<email>kwc@citi.umich.edu</email>
</author>
<published>2010-03-17T17:03:04Z</published>
<link rel='alternate' type='text/html' href='https://universe.0xinfinity.dev/distro/kernel/commit/?id=1dbd9029f3024d058da1cf6c6658c28aac2e4e1c'/>
<id>urn:sha1:1dbd9029f3024d058da1cf6c6658c28aac2e4e1c</id>
<content type='text'>
For the arcfour-hmac support, the make_seq_num and get_seq_num
functions need access to the kerberos context structure.
This will be used in a later patch.

Signed-off-by: Kevin Coffman &lt;kwc@citi.umich.edu&gt;
Signed-off-by: Steve Dickson &lt;steved@redhat.com&gt;
Signed-off-by: Trond Myklebust &lt;Trond.Myklebust@netapp.com&gt;
</content>
</entry>
<entry>
<title>gss_krb5: Save the raw session key in the context</title>
<updated>2010-05-14T19:09:19Z</updated>
<author>
<name>Kevin Coffman</name>
<email>kwc@citi.umich.edu</email>
</author>
<published>2010-03-17T17:03:03Z</published>
<link rel='alternate' type='text/html' href='https://universe.0xinfinity.dev/distro/kernel/commit/?id=fc263a917afad3bda7b823a6edc803a40e7f6015'/>
<id>urn:sha1:fc263a917afad3bda7b823a6edc803a40e7f6015</id>
<content type='text'>
This is needed for deriving arcfour-hmac keys "on the fly"
using the sequence number or checksu

Signed-off-by: Kevin Coffman &lt;kwc@citi.umich.edu&gt;
Signed-off-by: Steve Dickson &lt;steved@redhat.com&gt;
Signed-off-by: Trond Myklebust &lt;Trond.Myklebust@netapp.com&gt;
</content>
</entry>
<entry>
<title>gssd_krb5: arcfour-hmac support</title>
<updated>2010-05-14T19:09:19Z</updated>
<author>
<name>Kevin Coffman</name>
<email>kwc@citi.umich.edu</email>
</author>
<published>2010-03-17T17:03:02Z</published>
<link rel='alternate' type='text/html' href='https://universe.0xinfinity.dev/distro/kernel/commit/?id=8b23707612cffdba694dcd18aa8a018918aa86dc'/>
<id>urn:sha1:8b23707612cffdba694dcd18aa8a018918aa86dc</id>
<content type='text'>
For arcfour-hmac support, the make_checksum function needs a usage
field to correctly calculate the checksum differently for MIC and
WRAP tokens.

Signed-off-by: Kevin Coffman &lt;kwc@citi.umich.edu&gt;
Signed-off-by: Steve Dickson &lt;steved@redhat.com&gt;
Signed-off-by: Trond Myklebust &lt;Trond.Myklebust@netapp.com&gt;
</content>
</entry>
<entry>
<title>gss_krb5: add remaining pieces to enable AES encryption support</title>
<updated>2010-05-14T19:09:19Z</updated>
<author>
<name>Kevin Coffman</name>
<email>kwc@citi.umich.edu</email>
</author>
<published>2010-03-17T17:03:00Z</published>
<link rel='alternate' type='text/html' href='https://universe.0xinfinity.dev/distro/kernel/commit/?id=934a95aa1c9c6ad77838800b79c306e982437605'/>
<id>urn:sha1:934a95aa1c9c6ad77838800b79c306e982437605</id>
<content type='text'>
Add the remaining pieces to enable support for Kerberos AES
encryption types.

Signed-off-by: Kevin Coffman &lt;kwc@citi.umich.edu&gt;
Signed-off-by: Steve Dickson &lt;steved@redhat.com&gt;
Signed-off-by: Trond Myklebust &lt;Trond.Myklebust@netapp.com&gt;
</content>
</entry>
<entry>
<title>gss_krb5: add support for new token formats in rfc4121</title>
<updated>2010-05-14T19:09:18Z</updated>
<author>
<name>Kevin Coffman</name>
<email>kwc@citi.umich.edu</email>
</author>
<published>2010-03-17T17:02:59Z</published>
<link rel='alternate' type='text/html' href='https://universe.0xinfinity.dev/distro/kernel/commit/?id=de9c17eb4a912c9028f7b470eb80815144883b26'/>
<id>urn:sha1:de9c17eb4a912c9028f7b470eb80815144883b26</id>
<content type='text'>
This is a step toward support for AES encryption types which are
required to use the new token formats defined in rfc4121.

Signed-off-by: Kevin Coffman &lt;kwc@citi.umich.edu&gt;
[SteveD: Fixed a typo in gss_verify_mic_v2()]
Signed-off-by: Steve Dickson &lt;steved@redhat.com&gt;
[Trond: Got rid of the TEST_ROTATE/TEST_EXTRA_COUNT crap]
Signed-off-by: Trond Myklebust &lt;Trond.Myklebust@netapp.com&gt;
</content>
</entry>
<entry>
<title>gss_krb5: add support for triple-des encryption</title>
<updated>2010-05-14T19:09:17Z</updated>
<author>
<name>Kevin Coffman</name>
<email>kwc@citi.umich.edu</email>
</author>
<published>2010-03-17T17:02:55Z</published>
<link rel='alternate' type='text/html' href='https://universe.0xinfinity.dev/distro/kernel/commit/?id=958142e97e04d6c266ae093739bbbbd03afcd497'/>
<id>urn:sha1:958142e97e04d6c266ae093739bbbbd03afcd497</id>
<content type='text'>
Add the final pieces to support the triple-des encryption type.

Signed-off-by: Kevin Coffman &lt;kwc@citi.umich.edu&gt;
Signed-off-by: Steve Dickson &lt;steved@redhat.com&gt;
Signed-off-by: Trond Myklebust &lt;Trond.Myklebust@netapp.com&gt;
</content>
</entry>
<entry>
<title>gss_krb5: handle new context format from gssd</title>
<updated>2010-05-14T19:09:17Z</updated>
<author>
<name>Kevin Coffman</name>
<email>kwc@citi.umich.edu</email>
</author>
<published>2010-03-17T17:02:54Z</published>
<link rel='alternate' type='text/html' href='https://universe.0xinfinity.dev/distro/kernel/commit/?id=47d84807762966c3611c38adecec6ea703ddda7a'/>
<id>urn:sha1:47d84807762966c3611c38adecec6ea703ddda7a</id>
<content type='text'>
For encryption types other than DES, gssd sends down context information
in a new format.  This new format includes the information needed to
support the new Kerberos GSS-API tokens defined in rfc4121.

Signed-off-by: Kevin Coffman &lt;kwc@citi.umich.edu&gt;
Signed-off-by: Steve Dickson &lt;steved@redhat.com&gt;
Signed-off-by: Trond Myklebust &lt;Trond.Myklebust@netapp.com&gt;
</content>
</entry>
</feed>
