[ SYSTEM ]: Linux srv.persadacompanies.com 4.18.0-553.56.1.el8_10.x86_64 #1 SMP Tue Jun 10 05:00:59 EDT 2025 x86_64
[ SERVER ]: Apache | PHP: 8.4.20
[ USER ]: persadamedika | IP: 45.64.1.108
GEFORCE FILE MANAGER
/
usr
/
src
/
kernels
/
4.18.0-553.63.1.el8_10.x86_64
/
include
/
linux
/
sunrpc
/
UPLOAD:
NAME
SIZE
QUICK PERMS
ACTIONS
📄 addr.h
5,063 B
SET
[ EDIT ]
|
[ DEL ]
📄 auth.h
6,105 B
SET
[ EDIT ]
|
[ DEL ]
📄 auth_gss.h
2,369 B
SET
[ EDIT ]
|
[ DEL ]
📄 bc_xprt.h
2,847 B
SET
[ EDIT ]
|
[ DEL ]
📄 cache.h
9,144 B
SET
[ EDIT ]
|
[ DEL ]
📄 clnt.h
8,595 B
SET
[ EDIT ]
|
[ DEL ]
📄 debug.h
2,829 B
SET
[ EDIT ]
|
[ DEL ]
📄 gss_api.h
4,560 B
SET
[ EDIT ]
|
[ DEL ]
📄 gss_asn1.h
3,188 B
SET
[ EDIT ]
|
[ DEL ]
📄 gss_err.h
6,025 B
SET
[ EDIT ]
|
[ DEL ]
📄 gss_krb5.h
11,426 B
SET
[ EDIT ]
|
[ DEL ]
📄 gss_krb5_enctypes.h
1,253 B
SET
[ EDIT ]
|
[ DEL ]
📄 metrics.h
3,771 B
SET
[ EDIT ]
|
[ DEL ]
📄 msg_prot.h
6,222 B
SET
[ EDIT ]
|
[ DEL ]
📄 rpc_pipe_fs.h
3,947 B
SET
[ EDIT ]
|
[ DEL ]
📄 rpc_rdma.h
6,219 B
SET
[ EDIT ]
|
[ DEL ]
📄 rpc_rdma_cid.h
622 B
SET
[ EDIT ]
|
[ DEL ]
📄 sched.h
9,884 B
SET
[ EDIT ]
|
[ DEL ]
📄 stats.h
2,055 B
SET
[ EDIT ]
|
[ DEL ]
📄 svc.h
19,936 B
SET
[ EDIT ]
|
[ DEL ]
📄 svc_rdma.h
7,976 B
SET
[ EDIT ]
|
[ DEL ]
📄 svc_rdma_pcl.h
3,208 B
SET
[ EDIT ]
|
[ DEL ]
📄 svc_xprt.h
7,236 B
SET
[ EDIT ]
|
[ DEL ]
📄 svcauth.h
6,296 B
SET
[ EDIT ]
|
[ DEL ]
📄 svcauth_gss.h
782 B
SET
[ EDIT ]
|
[ DEL ]
📄 svcsock.h
2,126 B
SET
[ EDIT ]
|
[ DEL ]
📄 timer.h
1,172 B
SET
[ EDIT ]
|
[ DEL ]
📄 types.h
497 B
SET
[ EDIT ]
|
[ DEL ]
📄 xdr.h
21,306 B
SET
[ EDIT ]
|
[ DEL ]
📄 xprt.h
16,717 B
SET
[ EDIT ]
|
[ DEL ]
📄 xprtmultipath.h
2,295 B
SET
[ EDIT ]
|
[ DEL ]
📄 xprtrdma.h
3,023 B
SET
[ EDIT ]
|
[ DEL ]
📄 xprtsock.h
1,770 B
SET
[ EDIT ]
|
[ DEL ]
DELETE SELECTED
[ CLOSE ]
EDIT: auth_gss.h
/* SPDX-License-Identifier: GPL-2.0 */ /* * linux/include/linux/sunrpc/auth_gss.h * * Declarations for RPCSEC_GSS * * Dug Song <dugsong@monkey.org> * Andy Adamson <andros@umich.edu> * Bruce Fields <bfields@umich.edu> * Copyright (c) 2000 The Regents of the University of Michigan */ #ifndef _LINUX_SUNRPC_AUTH_GSS_H #define _LINUX_SUNRPC_AUTH_GSS_H #include <linux/refcount.h> #include <linux/sunrpc/auth.h> #include <linux/sunrpc/svc.h> #include <linux/sunrpc/gss_api.h> #define RPC_GSS_VERSION 1 #define MAXSEQ 0x80000000 /* maximum legal sequence number, from rfc 2203 */ enum rpc_gss_proc { RPC_GSS_PROC_DATA = 0, RPC_GSS_PROC_INIT = 1, RPC_GSS_PROC_CONTINUE_INIT = 2, RPC_GSS_PROC_DESTROY = 3 }; enum rpc_gss_svc { RPC_GSS_SVC_NONE = 1, RPC_GSS_SVC_INTEGRITY = 2, RPC_GSS_SVC_PRIVACY = 3 }; /* on-the-wire gss cred: */ struct rpc_gss_wire_cred { u32 gc_v; /* version */ u32 gc_proc; /* control procedure */ u32 gc_seq; /* sequence number */ u32 gc_svc; /* service */ struct xdr_netobj gc_ctx; /* context handle */ }; /* on-the-wire gss verifier: */ struct rpc_gss_wire_verf { u32 gv_flavor; struct xdr_netobj gv_verf; }; /* return from gss NULL PROC init sec context */ struct rpc_gss_init_res { struct xdr_netobj gr_ctx; /* context handle */ u32 gr_major; /* major status */ u32 gr_minor; /* minor status */ u32 gr_win; /* sequence window */ struct xdr_netobj gr_token; /* token */ }; /* The gss_cl_ctx struct holds all the information the rpcsec_gss client * code needs to know about a single security context. In particular, * gc_gss_ctx is the context handle that is used to do gss-api calls, while * gc_wire_ctx is the context handle that is used to identify the context on * the wire when communicating with a server. */ struct gss_cl_ctx { refcount_t count; enum rpc_gss_proc gc_proc; u32 gc_seq; u32 gc_seq_xmit; spinlock_t gc_seq_lock; struct gss_ctx *gc_gss_ctx; struct xdr_netobj gc_wire_ctx; struct xdr_netobj gc_acceptor; u32 gc_win; unsigned long gc_expiry; struct rcu_head gc_rcu; }; struct gss_upcall_msg; struct gss_cred { struct rpc_cred gc_base; enum rpc_gss_svc gc_service; struct gss_cl_ctx __rcu *gc_ctx; struct gss_upcall_msg *gc_upcall; const char *gc_principal; unsigned long gc_upcall_timestamp; }; #endif /* _LINUX_SUNRPC_AUTH_GSS_H */