29
29
#endif
30
30
31
31
static struct gss_api_mech gss_kerberos_mech ;
32
- static int gss_krb5_import_ctx_v2 (struct krb5_ctx * ctx , gfp_t gfp_mask );
33
32
34
33
static const struct gss_krb5_enctype supported_gss_krb5_enctypes [] = {
35
34
#if defined(CONFIG_RPCSEC_GSS_KRB5_ENCTYPES_AES_SHA1 )
@@ -43,7 +42,6 @@ static const struct gss_krb5_enctype supported_gss_krb5_enctypes[] = {
43
42
.encrypt_name = "cts(cbc(aes))" ,
44
43
.aux_cipher = "cbc(aes)" ,
45
44
.cksum_name = "hmac(sha1)" ,
46
- .import_ctx = gss_krb5_import_ctx_v2 ,
47
45
.derive_key = krb5_derive_key_v2 ,
48
46
.encrypt = gss_krb5_aes_encrypt ,
49
47
.decrypt = gss_krb5_aes_decrypt ,
@@ -73,7 +71,6 @@ static const struct gss_krb5_enctype supported_gss_krb5_enctypes[] = {
73
71
.encrypt_name = "cts(cbc(aes))" ,
74
72
.aux_cipher = "cbc(aes)" ,
75
73
.cksum_name = "hmac(sha1)" ,
76
- .import_ctx = gss_krb5_import_ctx_v2 ,
77
74
.derive_key = krb5_derive_key_v2 ,
78
75
.encrypt = gss_krb5_aes_encrypt ,
79
76
.decrypt = gss_krb5_aes_decrypt ,
@@ -113,7 +110,6 @@ static const struct gss_krb5_enctype supported_gss_krb5_enctypes[] = {
113
110
.Ke_length = BITS2OCTETS (128 ),
114
111
.Ki_length = BITS2OCTETS (128 ),
115
112
116
- .import_ctx = gss_krb5_import_ctx_v2 ,
117
113
.derive_key = krb5_kdf_feedback_cmac ,
118
114
.encrypt = gss_krb5_aes_encrypt ,
119
115
.decrypt = gss_krb5_aes_decrypt ,
@@ -140,7 +136,6 @@ static const struct gss_krb5_enctype supported_gss_krb5_enctypes[] = {
140
136
.Ke_length = BITS2OCTETS (256 ),
141
137
.Ki_length = BITS2OCTETS (256 ),
142
138
143
- .import_ctx = gss_krb5_import_ctx_v2 ,
144
139
.derive_key = krb5_kdf_feedback_cmac ,
145
140
.encrypt = gss_krb5_aes_encrypt ,
146
141
.decrypt = gss_krb5_aes_decrypt ,
@@ -170,7 +165,6 @@ static const struct gss_krb5_enctype supported_gss_krb5_enctypes[] = {
170
165
.Ke_length = BITS2OCTETS (128 ),
171
166
.Ki_length = BITS2OCTETS (128 ),
172
167
173
- .import_ctx = gss_krb5_import_ctx_v2 ,
174
168
.derive_key = krb5_kdf_hmac_sha2 ,
175
169
.encrypt = krb5_etm_encrypt ,
176
170
.decrypt = krb5_etm_decrypt ,
@@ -197,7 +191,6 @@ static const struct gss_krb5_enctype supported_gss_krb5_enctypes[] = {
197
191
.Ke_length = BITS2OCTETS (256 ),
198
192
.Ki_length = BITS2OCTETS (192 ),
199
193
200
- .import_ctx = gss_krb5_import_ctx_v2 ,
201
194
.derive_key = krb5_kdf_hmac_sha2 ,
202
195
.encrypt = krb5_etm_encrypt ,
203
196
.decrypt = krb5_etm_decrypt ,
@@ -431,9 +424,6 @@ gss_import_v2_context(const void *p, const void *end, struct krb5_ctx *ctx,
431
424
p = simple_get_bytes (p , end , & ctx -> enctype , sizeof (ctx -> enctype ));
432
425
if (IS_ERR (p ))
433
426
goto out_err ;
434
- /* Map ENCTYPE_DES3_CBC_SHA1 to ENCTYPE_DES3_CBC_RAW */
435
- if (ctx -> enctype == ENCTYPE_DES3_CBC_SHA1 )
436
- ctx -> enctype = ENCTYPE_DES3_CBC_RAW ;
437
427
ctx -> gk5e = gss_krb5_lookup_enctype (ctx -> enctype );
438
428
if (ctx -> gk5e == NULL ) {
439
429
dprintk ("gss_kerberos_mech: unsupported krb5 enctype %u\n" ,
@@ -460,7 +450,7 @@ gss_import_v2_context(const void *p, const void *end, struct krb5_ctx *ctx,
460
450
}
461
451
ctx -> mech_used .len = gss_kerberos_mech .gm_oid .len ;
462
452
463
- return ctx -> gk5e -> import_ctx (ctx , gfp_mask );
453
+ return gss_krb5_import_ctx_v2 (ctx , gfp_mask );
464
454
465
455
out_err :
466
456
return PTR_ERR (p );
0 commit comments