SUNRPC: Remove unused krb5_decrypt
authorDr. David Alan Gilbert <linux@treblig.org>
Sun, 12 Jan 2025 16:20:15 +0000 (16:20 +0000)
committerChuck Lever <chuck.lever@oracle.com>
Mon, 10 Mar 2025 13:10:54 +0000 (09:10 -0400)
The last use of krb5_decrypt() was removed in 2023 by
commit 2a9893f796a3 ("SUNRPC:
Remove net/sunrpc/auth_gss/gss_krb5_seqnum.c")

Remove it.

Signed-off-by: Dr. David Alan Gilbert <linux@treblig.org>
Signed-off-by: Chuck Lever <chuck.lever@oracle.com>
net/sunrpc/auth_gss/gss_krb5_crypto.c
net/sunrpc/auth_gss/gss_krb5_internal.h

index 9a27201638e28680cb3e2f176f09516b4196d1bd..7e09b15c5538abfa68a66cebd1b25b4ad766b79f 100644 (file)
@@ -138,60 +138,6 @@ out:
        return ret;
 }
 
-/**
- * krb5_decrypt - simple decryption of an RPCSEC GSS payload
- * @tfm: initialized cipher transform
- * @iv: pointer to an IV
- * @in: ciphertext to decrypt
- * @out: OUT: plaintext
- * @length: length of input and output buffers, in bytes
- *
- * @iv may be NULL to force the use of an all-zero IV.
- * The buffer containing the IV must be as large as the
- * cipher's ivsize.
- *
- * Return values:
- *   %0: @in successfully decrypted into @out
- *   negative errno: @in not decrypted
- */
-u32
-krb5_decrypt(
-     struct crypto_sync_skcipher *tfm,
-     void * iv,
-     void * in,
-     void * out,
-     int length)
-{
-       u32 ret = -EINVAL;
-       struct scatterlist sg[1];
-       u8 local_iv[GSS_KRB5_MAX_BLOCKSIZE] = {0};
-       SYNC_SKCIPHER_REQUEST_ON_STACK(req, tfm);
-
-       if (length % crypto_sync_skcipher_blocksize(tfm) != 0)
-               goto out;
-
-       if (crypto_sync_skcipher_ivsize(tfm) > GSS_KRB5_MAX_BLOCKSIZE) {
-               dprintk("RPC:       gss_k5decrypt: tfm iv size too large %d\n",
-                       crypto_sync_skcipher_ivsize(tfm));
-               goto out;
-       }
-       if (iv)
-               memcpy(local_iv, iv, crypto_sync_skcipher_ivsize(tfm));
-
-       memcpy(out, in, length);
-       sg_init_one(sg, out, length);
-
-       skcipher_request_set_sync_tfm(req, tfm);
-       skcipher_request_set_callback(req, 0, NULL, NULL);
-       skcipher_request_set_crypt(req, sg, sg, length, local_iv);
-
-       ret = crypto_skcipher_decrypt(req);
-       skcipher_request_zero(req);
-out:
-       dprintk("RPC:       gss_k5decrypt returns %d\n",ret);
-       return ret;
-}
-
 static int
 checksummer(struct scatterlist *sg, void *data)
 {
index a47e9ec228a5e776730bfca9beddd74b95dca5a9..0bda0078d7d83eec4ec4f166142c44cf1fb19a3f 100644 (file)
@@ -166,9 +166,6 @@ u32 gss_krb5_checksum(struct crypto_ahash *tfm, char *header, int hdrlen,
 u32 krb5_encrypt(struct crypto_sync_skcipher *key, void *iv, void *in,
                 void *out, int length);
 
-u32 krb5_decrypt(struct crypto_sync_skcipher *key, void *iv, void *in,
-                void *out, int length);
-
 int xdr_extend_head(struct xdr_buf *buf, unsigned int base,
                    unsigned int shiftlen);