SUNRPC: Obscure Kerberos signing keys
authorChuck Lever <chuck.lever@oracle.com>
Sun, 15 Jan 2023 17:21:07 +0000 (12:21 -0500)
committerChuck Lever <chuck.lever@oracle.com>
Mon, 20 Feb 2023 14:20:35 +0000 (09:20 -0500)
commit2dbe0cac3cd6d747579b0b347145326eddfd4e5c
tree318337d99016ac4ec834e841712c9d26d9fc941a
parent9f0b49f933ab1ec5e7140a43eec72b0c5181cabf
SUNRPC: Obscure Kerberos signing keys

There's no need to keep the signing keys around if we instead allocate
and key an ahash and keep that. This not only enables the subkeys to
be destroyed immediately after deriving them, but it makes the
Kerberos signing code path more efficient.

Tested-by: Scott Mayhew <smayhew@redhat.com>
Reviewed-by: Simo Sorce <simo@redhat.com>
Signed-off-by: Chuck Lever <chuck.lever@oracle.com>
include/linux/sunrpc/gss_krb5.h
net/sunrpc/auth_gss/gss_krb5_crypto.c
net/sunrpc/auth_gss/gss_krb5_internal.h
net/sunrpc/auth_gss/gss_krb5_mech.c
net/sunrpc/auth_gss/gss_krb5_seal.c
net/sunrpc/auth_gss/gss_krb5_unseal.c