Home
last modified time | relevance | path

Searched refs:Ke (Results 1 – 8 of 8) sorted by relevance

/linux/crypto/krb5/
H A Dselftest_data.c46 .Ke.use = 0x00000002,
47 .Ke.key = "9B197DD1E8C5609D6E67C3E37C62C72E",
56 .Ke.use = 0x00000002,
57 .Ke.key = "56AB22BEE63D82D7BC5227F6773F8EA7A5EB1C825160C38312980C442E5C7E49",
68 .Ke.use = 0x00000002,
69 .Ke.key = "64DF83F85A532F17577D8C37035796AB",
79 .Ke.use = 0x00000002,
80 .Ke.key = "412AEFC362A7285FC3966C6A5181E7605AE675235B6D549FBFC9AB6630A4C604",
97 .Ke = "9B197DD1E8C5609D6E67C3E37C62C72E",
105 .Ke = "9B197DD1E8C5609D6E67C3E37C62C72E",
[all …]
H A Drfc3961_simplified.c439 struct krb5_buffer Ke, Ki; in authenc_derive_encrypt_keys() local
443 Ke.len = krb5->Ke_len; in authenc_derive_encrypt_keys()
445 setkey->len = RTA_LENGTH(sizeof(*param)) + Ke.len + Ki.len; in authenc_derive_encrypt_keys()
454 param->enckeylen = htonl(Ke.len); in authenc_derive_encrypt_keys()
457 Ke.data = Ki.data + Ki.len; in authenc_derive_encrypt_keys()
459 ret = krb5_derive_Ke(krb5, TK, usage, &Ke, gfp); in authenc_derive_encrypt_keys()
475 const struct krb5_buffer *Ke, in authenc_load_encrypt_keys() argument
483 setkey->len = RTA_LENGTH(sizeof(*param)) + Ke->len + Ki->len; in authenc_load_encrypt_keys()
492 param->enckeylen = htonl(Ke->len); in authenc_load_encrypt_keys()
494 memcpy((void *)(param + 1) + Ki->len, Ke->data, Ke->len); in authenc_load_encrypt_keys()
H A Dinternal.h35 struct krb5_buffer *Ke,
54 const struct krb5_buffer *Ke,
133 struct krb5_key_test_one Kc, Ke, Ki; member
139 const char *name, *plain, *conf, *K0, *Ke, *Ki, *ct; member
181 const struct krb5_buffer *Ke,
H A Dselftest.c226 ret = krb5_test_key(krb5, &base_key, &test->Ke, TEST_KE); in krb5_test_one_key()
245 struct krb5_buffer K0 = {}, Ke = {}, Ki = {}, keys = {}; in krb5_test_one_enc() local
264 LOAD_BUF(&Ke, test->Ke); in krb5_test_one_enc()
267 ret = krb5->profile->load_encrypt_keys(krb5, &Ke, &Ki, &keys, GFP_KERNEL); in krb5_test_one_enc()
370 clear_buf(&Ke); in krb5_test_one_enc()
/linux/net/sunrpc/auth_gss/
H A Dgss_krb5_test.c28 const struct xdr_netobj *Ke; member
471 .Ke = &rfc3962_encryption_key,
479 .Ke = &rfc3962_encryption_key,
487 .Ke = &rfc3962_encryption_key,
495 .Ke = &rfc3962_encryption_key,
503 .Ke = &rfc3962_encryption_key,
511 .Ke = &rfc3962_encryption_key,
543 err = crypto_sync_skcipher_setkey(cbc_tfm, param->Ke->data, param->Ke->len); in rfc3962_encrypt_case()
548 err = crypto_sync_skcipher_setkey(cts_tfm, param->Ke->data, param->Ke->len); in rfc3962_encrypt_case()
1119 struct xdr_netobj Ke, Ki, checksum; in rfc6803_encrypt_case() local
[all …]
/linux/Documentation/crypto/
H A Dkrb5.rst14 - Kc, Ke And Ki Derivation.
91 * ``Kc_len``, ``Ke_len`` and ``Ki_len`` are the sizes of the derived Kc, Ke
92 and Ki keys. Kc is used for in checksum mode; Ke and Ki are used in
257 format 1 is provided and that continues with a BE32 of the Ke key length
258 followed by a BE32 of the Ki key length, followed by the bytes from the Ke key
/linux/Documentation/RCU/
H A DRTFP.txt453 Ke Zhang"
/linux/
H A DMAINTAINERS22248 M: Ping-Ke Shih <pkshih@realtek.com>
22255 M: Ping-Ke Shih <pkshih@realtek.com>
22262 M: Ping-Ke Shih <pkshih@realtek.com>