#define KG_EMPTY_CCACHE (39756044L)
#define KG_NO_CTYPES (39756045L)
-/* per Kerberos v5 protocol spec crypto types from the wire.
- * these get mapped to linux kernel crypto routines.
+/* per Kerberos v5 protocol spec crypto types from the wire.
+ * these get mapped to linux kernel crypto routines.
*/
#define ENCTYPE_NULL 0x0000
#define ENCTYPE_DES_CBC_CRC 0x0001 /* DES cbc mode with CRC-32 */
#define ENCTYPE_DES3_CBC_SHA1 0x0010
#define ENCTYPE_AES128_CTS_HMAC_SHA1_96 0x0011
#define ENCTYPE_AES256_CTS_HMAC_SHA1_96 0x0012
+#define ENCTYPE_AES128_CTS_HMAC_SHA256_128 0x0013
+#define ENCTYPE_AES256_CTS_HMAC_SHA384_192 0x0014
#define ENCTYPE_ARCFOUR_HMAC 0x0017
#define ENCTYPE_ARCFOUR_HMAC_EXP 0x0018
#define ENCTYPE_UNKNOWN 0x01ff
.ke_conf_size = 16,
.ke_hash_hmac = 1,
},
+ [ENCTYPE_AES128_CTS_HMAC_SHA256_128] = { /* aes128-cts-hmac-sha2 */
+ .ke_dispname = "aes128-cts-hmac-sha256-128",
+ .ke_enc_name = "cbc(aes)",
+ .ke_hash_name = "sha256",
+ .ke_hash_size = 16,
+ .ke_conf_size = 16,
+ .ke_hash_hmac = 1,
+ },
[ENCTYPE_AES256_CTS_HMAC_SHA1_96] = { /* aes256-cts */
.ke_dispname = "aes256-cts-hmac-sha1-96",
.ke_enc_name = "cbc(aes)",
.ke_conf_size = 16,
.ke_hash_hmac = 1,
},
+ [ENCTYPE_AES256_CTS_HMAC_SHA384_192] = { /* aes256-cts-hmac-sha2 */
+ .ke_dispname = "aes256-cts-hmac-sha384-192",
+ .ke_enc_name = "cbc(aes)",
+ .ke_hash_name = "sha384",
+ .ke_hash_size = 24,
+ .ke_conf_size = 16,
+ .ke_hash_hmac = 1,
+ },
[ENCTYPE_ARCFOUR_HMAC] = { /* arcfour-hmac-md5 */
.ke_dispname = "arcfour-hmac-md5",
.ke_enc_name = "ecb(arc4)",
break;
#endif
case ENCTYPE_AES128_CTS_HMAC_SHA1_96:
+ case ENCTYPE_AES128_CTS_HMAC_SHA256_128:
keylength = 16;
#ifdef HAVE_KRB5
enc = &krb5int_enc_aes128;
#endif
break;
case ENCTYPE_AES256_CTS_HMAC_SHA1_96:
+ case ENCTYPE_AES256_CTS_HMAC_SHA384_192:
keylength = 32;
#ifdef HAVE_KRB5
enc = &krb5int_enc_aes256;