| /linux-6.15/crypto/krb5/ |
| H A D | selftest_data.c | 46 .Ke.use = 0x00000002, 47 .Ke.key = "9B197DD1E8C5609D6E67C3E37C62C72E", 56 .Ke.use = 0x00000002, 68 .Ke.use = 0x00000002, 69 .Ke.key = "64DF83F85A532F17577D8C37035796AB", 79 .Ke.use = 0x00000002, 97 .Ke = "9B197DD1E8C5609D6E67C3E37C62C72E", 105 .Ke = "9B197DD1E8C5609D6E67C3E37C62C72E", 113 .Ke = "9B197DD1E8C5609D6E67C3E37C62C72E", 121 .Ke = "9B197DD1E8C5609D6E67C3E37C62C72E", [all …]
|
| H A D | internal.h | 35 struct krb5_buffer *Ke, 54 const struct krb5_buffer *Ke, 133 struct krb5_key_test_one Kc, Ke, Ki; member 139 const char *name, *plain, *conf, *K0, *Ke, *Ki, *ct; member 181 const struct krb5_buffer *Ke,
|
| H A D | rfc3961_simplified.c | 438 struct krb5_buffer Ke, Ki; in authenc_derive_encrypt_keys() local 442 Ke.len = krb5->Ke_len; in authenc_derive_encrypt_keys() 444 setkey->len = RTA_LENGTH(sizeof(*param)) + Ke.len + Ki.len; in authenc_derive_encrypt_keys() 453 param->enckeylen = htonl(Ke.len); in authenc_derive_encrypt_keys() 456 Ke.data = Ki.data + Ki.len; in authenc_derive_encrypt_keys() 458 ret = krb5_derive_Ke(krb5, TK, usage, &Ke, gfp); in authenc_derive_encrypt_keys() 474 const struct krb5_buffer *Ke, in authenc_load_encrypt_keys() argument 482 setkey->len = RTA_LENGTH(sizeof(*param)) + Ke->len + Ki->len; in authenc_load_encrypt_keys() 491 param->enckeylen = htonl(Ke->len); in authenc_load_encrypt_keys() 493 memcpy((void *)(param + 1) + Ki->len, Ke->data, Ke->len); in authenc_load_encrypt_keys()
|
| H A D | selftest.c | 224 ret = krb5_test_key(krb5, &base_key, &test->Ke, TEST_KE); in krb5_test_one_key() 243 struct krb5_buffer K0 = {}, Ke = {}, Ki = {}, keys = {}; in krb5_test_one_enc() local 262 LOAD_BUF(&Ke, test->Ke); in krb5_test_one_enc() 265 ret = krb5->profile->load_encrypt_keys(krb5, &Ke, &Ki, &keys, GFP_KERNEL); in krb5_test_one_enc() 368 clear_buf(&Ke); in krb5_test_one_enc()
|
| /linux-6.15/net/sunrpc/auth_gss/ |
| H A D | gss_krb5_test.c | 28 const struct xdr_netobj *Ke; member 543 err = crypto_sync_skcipher_setkey(cbc_tfm, param->Ke->data, param->Ke->len); in rfc3962_encrypt_case() 548 err = crypto_sync_skcipher_setkey(cts_tfm, param->Ke->data, param->Ke->len); in rfc3962_encrypt_case() 1141 Ke.data = kunit_kzalloc(test, Ke.len, GFP_KERNEL); in rfc6803_encrypt_case() 1149 err = crypto_sync_skcipher_setkey(cbc_tfm, Ke.data, Ke.len); in rfc6803_encrypt_case() 1154 err = crypto_sync_skcipher_setkey(cts_tfm, Ke.data, Ke.len); in rfc6803_encrypt_case() 1634 Ke.data = kunit_kzalloc(test, Ke.len, GFP_KERNEL); in rfc8009_encrypt_case() 1643 err = crypto_sync_skcipher_setkey(cbc_tfm, Ke.data, Ke.len); in rfc8009_encrypt_case() 1648 err = crypto_sync_skcipher_setkey(cts_tfm, Ke.data, Ke.len); in rfc8009_encrypt_case() 1800 err = crypto_sync_skcipher_setkey(cbc_tfm, param->Ke->data, param->Ke->len); in encrypt_selftest_case() [all …]
|
| /linux-6.15/Documentation/crypto/ |
| H A D | krb5.rst | 14 - Kc, Ke And Ki Derivation. 91 * ``Kc_len``, ``Ke_len`` and ``Ki_len`` are the sizes of the derived Kc, Ke 92 and Ki keys. Kc is used for in checksum mode; Ke and Ki are used in 257 format 1 is provided and that continues with a BE32 of the Ke key length 258 followed by a BE32 of the Ki key length, followed by the bytes from the Ke key
|
| /linux-6.15/Documentation/RCU/ |
| H A D | RTFP.txt | 453 Ke Zhang"
|
| /linux-6.15/ |
| H A D | MAINTAINERS | 20590 M: Ping-Ke Shih <[email protected]> 20597 M: Ping-Ke Shih <[email protected]> 20604 M: Ping-Ke Shih <[email protected]>
|