index
:
linux.git
arm64-uaccess
link_path_walk
linus
master
mmu_gather-race-fix
proc-cmdline
runtime-constants
tty-splice
vsnprintf
word-at-a-time
x86-rep-insns
x86-uaccess-cleanup
Linux kernel mainline tree
Linus Torvalds
summary
refs
log
tree
commit
diff
stats
log msg
author
committer
range
path:
root
/
net
/
sunrpc
/
auth_gss
/
gss_krb5_seal.c
Commit message (
Expand
)
Author
Age
Files
Lines
*
SUNRPC: remove RC4-HMAC-MD5 support from KerberosV
Ard Biesheuvel
2020-09-11
1
-1
/
+0
*
sunrpc: convert to time64_t for expiry
Arnd Bergmann
2019-12-18
1
-4
/
+4
*
SUNRPC: Use atomic(64)_t for seq_send(64)
Paul Burton
2018-11-01
1
-26
/
+2
*
SUNRPC: Fix a compile warning for cmpxchg64()
Trond Myklebust
2018-10-18
1
-0
/
+1
*
SUNRPC: use cmpxchg64() in gss_seq_send64_fetch_and_inc()
Arnd Bergmann
2018-10-05
1
-1
/
+1
*
SUNRPC: Replace krb5_seq_lock with a lockless scheme
Trond Myklebust
2018-09-30
1
-11
/
+26
*
sunrpc: whitespace fixes
Stephen Hemminger
2018-07-31
1
-1
/
+0
*
sunrpc: Fix unaligned access on sparc64
James Ettle
2018-03-19
1
-1
/
+4
*
sunrpc: eliminate RPC_DEBUG
Jeff Layton
2014-11-24
1
-1
/
+1
*
sunrpc: clean up sparse endianness warnings in gss_krb5_seal.c
Jeff Layton
2014-08-03
1
-11
/
+17
*
SUNRPC: Fix a few sparse warnings
Trond Myklebust
2012-03-11
1
-1
/
+1
*
gss_krb5: Add support for rc4-hmac encryption
Kevin Coffman
2010-05-14
1
-0
/
+1
*
gssd_krb5: More arcfour-hmac support
Kevin Coffman
2010-05-14
1
-3
/
+2
*
gssd_krb5: arcfour-hmac support
Kevin Coffman
2010-05-14
1
-4
/
+9
*
gss_krb5: add support for new token formats in rfc4121
Kevin Coffman
2010-05-14
1
-0
/
+69
*
gss_krb5: add support for triple-des encryption
Kevin Coffman
2010-05-14
1
-0
/
+1
*
gss_krb5: add ability to have a keyed checksum (hmac)
Kevin Coffman
2010-05-14
1
-6
/
+7
*
gss_krb5: introduce encryption type framework
Kevin Coffman
2010-05-14
1
-19
/
+30
*
gss_krb5: split up functions in preparation of adding new enctypes
Kevin Coffman
2010-05-14
1
-3
/
+17
*
include cleanup: Update gfp.h and slab.h includes to prepare for breaking imp...
Tejun Heo
2010-03-30
1
-1
/
+0
*
gss_krb5: create a define for token header size and clean up ptr location
Kevin Coffman
2008-06-23
1
-13
/
+13
*
sunrpc: make token header values less confusing
Kevin Coffman
2008-04-23
1
-2
/
+2
*
gss_krb5: consistently use unsigned for seqnum
Kevin Coffman
2008-04-23
1
-1
/
+1
*
Remove define for KRB5_CKSUM_LENGTH, which will become enctype-dependent
Kevin Coffman
2008-04-23
1
-2
/
+1
*
sunrpc: return error if unsupported enctype or cksumtype is encountered
Kevin Coffman
2007-11-17
1
-0
/
+1
*
cleanup asm/scatterlist.h includes
Adrian Bunk
2007-11-02
1
-1
/
+0
*
SUNRPC: fix print format for tk_pid in auth_gss support
Chuck Lever
2007-02-03
1
-1
/
+1
*
rpcgss: krb5: miscellaneous cleanup
J. Bruce Fields
2006-12-06
1
-5
/
+5
*
rpcgss: krb5: sanity check sealalg value in the downcall
J. Bruce Fields
2006-12-06
1
-6
/
+0
*
rpcgss: krb5: clean up some goto's, etc.
J. Bruce Fields
2006-12-06
1
-6
/
+4
*
rpcgss: simplify make_checksum
J. Bruce Fields
2006-12-06
1
-1
/
+1
*
rpcgss: krb5: kill checksum_type, miscellaneous small cleanup
J. Bruce Fields
2006-12-06
1
-3
/
+1
*
gss: krb5: remove signalg and sealalg
J. Bruce Fields
2006-12-06
1
-24
/
+10
*
rpc: gss: eliminate print_hexl()'s
J. Bruce Fields
2006-12-06
1
-3
/
+0
*
[SUNRPC]: trivial endianness annotations
Alexey Dobriyan
2006-09-28
1
-1
/
+1
*
[PATCH] spin/rwlock init cleanups
Ingo Molnar
2006-06-27
1
-1
/
+1
*
SUNRPC,RPCSEC_GSS: fix krb5 sequence numbers.
J. Bruce Fields
2006-03-20
1
-3
/
+8
*
SUNRPC,RPCSEC_GSS: remove unnecessary kmalloc of a checksum
J. Bruce Fields
2006-03-20
1
-4
/
+2
*
[NET]: kfree cleanup
Jesper Juhl
2005-11-08
1
-1
/
+1
*
RPCSEC_GSS: krb5 cleanup
J. Bruce Fields
2005-10-18
1
-2
/
+3
*
RPCSEC_GSS remove all qop parameters
J. Bruce Fields
2005-10-18
1
-4
/
+1
*
RPCSEC_GSS: Add support for privacy to krb5 rpcsec_gss mechanism.
J. Bruce Fields
2005-10-18
1
-2
/
+2
*
RPCSEC_GSS: krb5 pre-privacy cleanup
J. Bruce Fields
2005-10-18
1
-32
/
+6
*
Linux-2.6.12-rc2
v2.6.12-rc2
Linus Torvalds
2005-04-16
1
-0
/
+176