Searched refs:Kc (Results 1 – 7 of 7) sorted by relevance
| /linux-6.15/crypto/krb5/ |
| H A D | selftest_data.c | 44 .Kc.use = 0x00000002, 45 .Kc.key = "B31A018A48F54776F403E9A396325DC3", 54 .Kc.use = 0x00000002, 55 .Kc.key = "EF5718BE86CC84963D8BBB5031E9F5C4BA41F28FAF69E73D", 66 .Kc.use = 0x00000002, 67 .Kc.key = "D155775A209D05F02B38D42A389E5A56", 77 .Kc.use = 0x00000002, 78 .Kc.key = "E467F9A9552BC7D3155A6220AF9C19220EEED4FF78B0D1E6A1544991461A9E50", 251 .Kc = "B31A018A48F54776F403E9A396325DC3", 257 .Kc = "EF5718BE86CC84963D8BBB5031E9F5C4BA41F28FAF69E73D",
|
| H A D | internal.h | 28 struct krb5_buffer *Kc, 68 const struct krb5_buffer *Kc, 133 struct krb5_key_test_one Kc, Ke, Ki; member 145 const char *name, *plain, *K0, *Kc, *mic; member 155 const struct krb5_buffer *Kc, 191 const struct krb5_buffer *Kc,
|
| H A D | selftest.c | 221 ret = krb5_test_key(krb5, &base_key, &test->Kc, TEST_KC); in krb5_test_one_key() 383 struct krb5_buffer K0 = {}, Kc = {}, keys = {}, plain = {}, mic = {}; in krb5_test_one_mic() local 397 LOAD_BUF(&Kc, test->Kc); in krb5_test_one_mic() 399 ret = krb5->profile->load_checksum_key(krb5, &Kc, &keys, GFP_KERNEL); in krb5_test_one_mic() 403 ci = krb5_prepare_checksum(krb5, &Kc, GFP_KERNEL); in krb5_test_one_mic() 483 clear_buf(&Kc); in krb5_test_one_mic()
|
| H A D | krb5_api.c | 236 const struct krb5_buffer *Kc, in krb5_prepare_checksum() argument 250 ret = crypto_shash_setkey(ci, Kc->data, Kc->len); in krb5_prepare_checksum()
|
| H A D | rfc3961_simplified.c | 525 const struct krb5_buffer *Kc, in rfc3961_load_checksum_key() argument 530 setkey->data = kmemdup(Kc->data, Kc->len, GFP_KERNEL); in rfc3961_load_checksum_key()
|
| /linux-6.15/net/sunrpc/auth_gss/ |
| H A D | gss_krb5_test.c | 80 struct xdr_netobj Kc, checksum; in checksum_case() local 89 Kc.len = gk5e->Kc_length; in checksum_case() 90 Kc.data = kunit_kzalloc(test, Kc.len, GFP_KERNEL); in checksum_case() 91 KUNIT_ASSERT_NOT_ERR_OR_NULL(test, Kc.data); in checksum_case() 92 err = gk5e->derive_key(gk5e, param->base_key, &Kc, in checksum_case() 98 err = crypto_ahash_setkey(tfm, Kc.data, Kc.len); in checksum_case()
|
| /linux-6.15/Documentation/crypto/ |
| H A D | krb5.rst | 14 - Kc, Ke And Ki Derivation. 91 * ``Kc_len``, ``Ke_len`` and ``Ki_len`` are the sizes of the derived Kc, Ke 92 and Ki keys. Kc is used for in checksum mode; Ke and Ki are used in
|