| /linux/crypto/krb5/ |
| H A D | selftest_data.c | 48 .Ki.use = 0x00000002, 49 .Ki.key = "9FDA0E56AB2D85E1569A688696C26A6C", 58 .Ki.use = 0x00000002, 59 .Ki.key = "69B16514E3CD8E56B82010D5C73012B622C4D00FFC23ED1F", 70 .Ki.use = 0x00000002, 71 .Ki.key = "3E4FBDF30FB8259C425CB6C96F1F4635", 81 .Ki.use = 0x00000002, 82 .Ki.key = "FA624FA0E523993FA388AEFDC67E67EBCD8C08E8A0246B1D73B0D1DD9FC582B0", 98 .Ki = "9FDA0E56AB2D85E1569A688696C26A6C", 106 .Ki = "9FDA0E56AB2D85E1569A688696C26A6C", [all …]
|
| H A D | rfc3961_simplified.c | 439 struct krb5_buffer Ke, Ki; in authenc_derive_encrypt_keys() local 444 Ki.len = krb5->Ki_len; in authenc_derive_encrypt_keys() 445 setkey->len = RTA_LENGTH(sizeof(*param)) + Ke.len + Ki.len; in authenc_derive_encrypt_keys() 456 Ki.data = (void *)(param + 1); in authenc_derive_encrypt_keys() 457 Ke.data = Ki.data + Ki.len; in authenc_derive_encrypt_keys() 464 ret = krb5_derive_Ki(krb5, TK, usage, &Ki, gfp); in authenc_derive_encrypt_keys() 476 const struct krb5_buffer *Ki, in authenc_load_encrypt_keys() argument 483 setkey->len = RTA_LENGTH(sizeof(*param)) + Ke->len + Ki->len; in authenc_load_encrypt_keys() 493 memcpy((void *)(param + 1), Ki->data, Ki->len); in authenc_load_encrypt_keys() 494 memcpy((void *)(param + 1) + Ki->len, Ke->data, Ke->len); in authenc_load_encrypt_keys()
|
| H A D | internal.h | 42 struct krb5_buffer *Ki, 55 const struct krb5_buffer *Ki, 133 struct krb5_key_test_one Kc, Ke, Ki; member 139 const char *name, *plain, *conf, *K0, *Ke, *Ki, *ct; member 182 const struct krb5_buffer *Ki,
|
| H A D | selftest.c | 229 ret = krb5_test_key(krb5, &base_key, &test->Ki, TEST_KI); in krb5_test_one_key() 245 struct krb5_buffer K0 = {}, Ke = {}, Ki = {}, keys = {}; in krb5_test_one_enc() local 265 LOAD_BUF(&Ki, test->Ki); in krb5_test_one_enc() 267 ret = krb5->profile->load_encrypt_keys(krb5, &Ke, &Ki, &keys, GFP_KERNEL); in krb5_test_one_enc() 369 clear_buf(&Ki); in krb5_test_one_enc()
|
| /linux/crypto/ |
| H A D | streebog_generic.c | 902 static void streebog_round(int i, struct streebog_uint512 *Ki, in streebog_round() argument 905 streebog_xlps(Ki, &C[i], Ki); in streebog_round() 906 streebog_xlps(Ki, data, data); in streebog_round() 945 struct streebog_uint512 Ki, data; in streebog_g() local 951 Ki = data; in streebog_g() 952 streebog_xlps(&Ki, m, &data); in streebog_g() 955 streebog_round(i, &Ki, &data); in streebog_g() 957 streebog_xlps(&Ki, &C[11], &Ki); in streebog_g() 958 streebog_xor(&Ki, &data, &data); in streebog_g()
|
| /linux/net/sunrpc/auth_gss/ |
| H A D | gss_krb5_test.c | 1119 struct xdr_netobj Ke, Ki, checksum; in rfc6803_encrypt_case() local 1174 Ki.len = gk5e->Ki_length; in rfc6803_encrypt_case() 1175 Ki.data = kunit_kzalloc(test, Ki.len, GFP_KERNEL); in rfc6803_encrypt_case() 1176 KUNIT_ASSERT_NOT_ERR_OR_NULL(test, Ki.data); in rfc6803_encrypt_case() 1178 err = gk5e->derive_key(gk5e, param->base_key, &Ki, in rfc6803_encrypt_case() 1183 err = crypto_ahash_setkey(ahash_tfm, Ki.data, Ki.len); in rfc6803_encrypt_case() 1614 struct xdr_netobj Ke, Ki, checksum; in rfc8009_encrypt_case() local 1667 Ki.len = gk5e->Ki_length; in rfc8009_encrypt_case() 1668 Ki.data = kunit_kzalloc(test, Ki.len, GFP_KERNEL); in rfc8009_encrypt_case() 1669 KUNIT_ASSERT_NOT_ERR_OR_NULL(test, Ki.data); in rfc8009_encrypt_case() [all …]
|
| /linux/Documentation/crypto/ |
| H A D | krb5.rst | 14 - Kc, Ke And Ki Derivation. 92 and Ki keys. Kc is used for in checksum mode; Ke and Ki are used in 258 followed by a BE32 of the Ki key length, followed by the bytes from the Ke key 259 and then the Ki key.
|
| /linux/drivers/gpu/drm/radeon/ |
| H A D | smu7.h | 86 uint32_t Ki; member
|
| /linux/drivers/gpu/drm/amd/pm/powerplay/inc/ |
| H A D | smu7.h | 105 uint32_t Ki; member
|
| H A D | smu71.h | 122 uint32_t Ki; member
|
| H A D | smu73.h | 199 uint32_t Ki; member
|
| H A D | smu72.h | 208 uint32_t Ki; member
|
| H A D | smu75.h | 169 uint32_t Ki; member
|
| H A D | smu74.h | 235 uint32_t Ki; member
|