Home
last modified time | relevance | path

Searched refs:Ki (Results 1 – 14 of 14) sorted by relevance

/linux/crypto/krb5/
H A Dselftest_data.c48 .Ki.use = 0x00000002,
49 .Ki.key = "9FDA0E56AB2D85E1569A688696C26A6C",
58 .Ki.use = 0x00000002,
59 .Ki.key = "69B16514E3CD8E56B82010D5C73012B622C4D00FFC23ED1F",
70 .Ki.use = 0x00000002,
71 .Ki.key = "3E4FBDF30FB8259C425CB6C96F1F4635",
81 .Ki.use = 0x00000002,
82 .Ki.key = "FA624FA0E523993FA388AEFDC67E67EBCD8C08E8A0246B1D73B0D1DD9FC582B0",
98 .Ki = "9FDA0E56AB2D85E1569A688696C26A6C",
106 .Ki = "9FDA0E56AB2D85E1569A688696C26A6C",
[all …]
H A Drfc3961_simplified.c439 struct krb5_buffer Ke, Ki; in authenc_derive_encrypt_keys() local
444 Ki.len = krb5->Ki_len; in authenc_derive_encrypt_keys()
445 setkey->len = RTA_LENGTH(sizeof(*param)) + Ke.len + Ki.len; in authenc_derive_encrypt_keys()
456 Ki.data = (void *)(param + 1); in authenc_derive_encrypt_keys()
457 Ke.data = Ki.data + Ki.len; in authenc_derive_encrypt_keys()
464 ret = krb5_derive_Ki(krb5, TK, usage, &Ki, gfp); in authenc_derive_encrypt_keys()
476 const struct krb5_buffer *Ki, in authenc_load_encrypt_keys() argument
483 setkey->len = RTA_LENGTH(sizeof(*param)) + Ke->len + Ki->len; in authenc_load_encrypt_keys()
493 memcpy((void *)(param + 1), Ki->data, Ki->len); in authenc_load_encrypt_keys()
494 memcpy((void *)(param + 1) + Ki->len, Ke->data, Ke->len); in authenc_load_encrypt_keys()
H A Dinternal.h42 struct krb5_buffer *Ki,
55 const struct krb5_buffer *Ki,
133 struct krb5_key_test_one Kc, Ke, Ki; member
139 const char *name, *plain, *conf, *K0, *Ke, *Ki, *ct; member
182 const struct krb5_buffer *Ki,
H A Dselftest.c229 ret = krb5_test_key(krb5, &base_key, &test->Ki, TEST_KI); in krb5_test_one_key()
245 struct krb5_buffer K0 = {}, Ke = {}, Ki = {}, keys = {}; in krb5_test_one_enc() local
265 LOAD_BUF(&Ki, test->Ki); in krb5_test_one_enc()
267 ret = krb5->profile->load_encrypt_keys(krb5, &Ke, &Ki, &keys, GFP_KERNEL); in krb5_test_one_enc()
369 clear_buf(&Ki); in krb5_test_one_enc()
/linux/crypto/
H A Dstreebog_generic.c902 static void streebog_round(int i, struct streebog_uint512 *Ki, in streebog_round() argument
905 streebog_xlps(Ki, &C[i], Ki); in streebog_round()
906 streebog_xlps(Ki, data, data); in streebog_round()
945 struct streebog_uint512 Ki, data; in streebog_g() local
951 Ki = data; in streebog_g()
952 streebog_xlps(&Ki, m, &data); in streebog_g()
955 streebog_round(i, &Ki, &data); in streebog_g()
957 streebog_xlps(&Ki, &C[11], &Ki); in streebog_g()
958 streebog_xor(&Ki, &data, &data); in streebog_g()
/linux/net/sunrpc/auth_gss/
H A Dgss_krb5_test.c1119 struct xdr_netobj Ke, Ki, checksum; in rfc6803_encrypt_case() local
1174 Ki.len = gk5e->Ki_length; in rfc6803_encrypt_case()
1175 Ki.data = kunit_kzalloc(test, Ki.len, GFP_KERNEL); in rfc6803_encrypt_case()
1176 KUNIT_ASSERT_NOT_ERR_OR_NULL(test, Ki.data); in rfc6803_encrypt_case()
1178 err = gk5e->derive_key(gk5e, param->base_key, &Ki, in rfc6803_encrypt_case()
1183 err = crypto_ahash_setkey(ahash_tfm, Ki.data, Ki.len); in rfc6803_encrypt_case()
1614 struct xdr_netobj Ke, Ki, checksum; in rfc8009_encrypt_case() local
1667 Ki.len = gk5e->Ki_length; in rfc8009_encrypt_case()
1668 Ki.data = kunit_kzalloc(test, Ki.len, GFP_KERNEL); in rfc8009_encrypt_case()
1669 KUNIT_ASSERT_NOT_ERR_OR_NULL(test, Ki.data); in rfc8009_encrypt_case()
[all …]
/linux/Documentation/crypto/
H A Dkrb5.rst14 - Kc, Ke And Ki Derivation.
92 and Ki keys. Kc is used for in checksum mode; Ke and Ki are used in
258 followed by a BE32 of the Ki key length, followed by the bytes from the Ke key
259 and then the Ki key.
/linux/drivers/gpu/drm/radeon/
H A Dsmu7.h86 uint32_t Ki; member
/linux/drivers/gpu/drm/amd/pm/powerplay/inc/
H A Dsmu7.h105 uint32_t Ki; member
H A Dsmu71.h122 uint32_t Ki; member
H A Dsmu73.h199 uint32_t Ki; member
H A Dsmu72.h208 uint32_t Ki; member
H A Dsmu75.h169 uint32_t Ki; member
H A Dsmu74.h235 uint32_t Ki; member