Home
last modified time | relevance | path

Searched refs:Ke (Results 1 – 8 of 8) sorted by relevance

/linux-6.15/crypto/krb5/
H A Dselftest_data.c46 .Ke.use = 0x00000002,
47 .Ke.key = "9B197DD1E8C5609D6E67C3E37C62C72E",
56 .Ke.use = 0x00000002,
68 .Ke.use = 0x00000002,
69 .Ke.key = "64DF83F85A532F17577D8C37035796AB",
79 .Ke.use = 0x00000002,
97 .Ke = "9B197DD1E8C5609D6E67C3E37C62C72E",
105 .Ke = "9B197DD1E8C5609D6E67C3E37C62C72E",
113 .Ke = "9B197DD1E8C5609D6E67C3E37C62C72E",
121 .Ke = "9B197DD1E8C5609D6E67C3E37C62C72E",
[all …]
H A Dinternal.h35 struct krb5_buffer *Ke,
54 const struct krb5_buffer *Ke,
133 struct krb5_key_test_one Kc, Ke, Ki; member
139 const char *name, *plain, *conf, *K0, *Ke, *Ki, *ct; member
181 const struct krb5_buffer *Ke,
H A Drfc3961_simplified.c438 struct krb5_buffer Ke, Ki; in authenc_derive_encrypt_keys() local
442 Ke.len = krb5->Ke_len; in authenc_derive_encrypt_keys()
444 setkey->len = RTA_LENGTH(sizeof(*param)) + Ke.len + Ki.len; in authenc_derive_encrypt_keys()
453 param->enckeylen = htonl(Ke.len); in authenc_derive_encrypt_keys()
456 Ke.data = Ki.data + Ki.len; in authenc_derive_encrypt_keys()
458 ret = krb5_derive_Ke(krb5, TK, usage, &Ke, gfp); in authenc_derive_encrypt_keys()
474 const struct krb5_buffer *Ke, in authenc_load_encrypt_keys() argument
482 setkey->len = RTA_LENGTH(sizeof(*param)) + Ke->len + Ki->len; in authenc_load_encrypt_keys()
491 param->enckeylen = htonl(Ke->len); in authenc_load_encrypt_keys()
493 memcpy((void *)(param + 1) + Ki->len, Ke->data, Ke->len); in authenc_load_encrypt_keys()
H A Dselftest.c224 ret = krb5_test_key(krb5, &base_key, &test->Ke, TEST_KE); in krb5_test_one_key()
243 struct krb5_buffer K0 = {}, Ke = {}, Ki = {}, keys = {}; in krb5_test_one_enc() local
262 LOAD_BUF(&Ke, test->Ke); in krb5_test_one_enc()
265 ret = krb5->profile->load_encrypt_keys(krb5, &Ke, &Ki, &keys, GFP_KERNEL); in krb5_test_one_enc()
368 clear_buf(&Ke); in krb5_test_one_enc()
/linux-6.15/net/sunrpc/auth_gss/
H A Dgss_krb5_test.c28 const struct xdr_netobj *Ke; member
543 err = crypto_sync_skcipher_setkey(cbc_tfm, param->Ke->data, param->Ke->len); in rfc3962_encrypt_case()
548 err = crypto_sync_skcipher_setkey(cts_tfm, param->Ke->data, param->Ke->len); in rfc3962_encrypt_case()
1141 Ke.data = kunit_kzalloc(test, Ke.len, GFP_KERNEL); in rfc6803_encrypt_case()
1149 err = crypto_sync_skcipher_setkey(cbc_tfm, Ke.data, Ke.len); in rfc6803_encrypt_case()
1154 err = crypto_sync_skcipher_setkey(cts_tfm, Ke.data, Ke.len); in rfc6803_encrypt_case()
1634 Ke.data = kunit_kzalloc(test, Ke.len, GFP_KERNEL); in rfc8009_encrypt_case()
1643 err = crypto_sync_skcipher_setkey(cbc_tfm, Ke.data, Ke.len); in rfc8009_encrypt_case()
1648 err = crypto_sync_skcipher_setkey(cts_tfm, Ke.data, Ke.len); in rfc8009_encrypt_case()
1800 err = crypto_sync_skcipher_setkey(cbc_tfm, param->Ke->data, param->Ke->len); in encrypt_selftest_case()
[all …]
/linux-6.15/Documentation/crypto/
H A Dkrb5.rst14 - Kc, Ke And Ki Derivation.
91 * ``Kc_len``, ``Ke_len`` and ``Ki_len`` are the sizes of the derived Kc, Ke
92 and Ki keys. Kc is used for in checksum mode; Ke and Ki are used in
257 format 1 is provided and that continues with a BE32 of the Ke key length
258 followed by a BE32 of the Ki key length, followed by the bytes from the Ke key
/linux-6.15/Documentation/RCU/
H A DRTFP.txt453 Ke Zhang"
/linux-6.15/
H A DMAINTAINERS20590 M: Ping-Ke Shih <[email protected]>
20597 M: Ping-Ke Shih <[email protected]>
20604 M: Ping-Ke Shih <[email protected]>