K0
u32 K0, K1, K2, K3;
K0 = T4[(kappa[N - 1] >> 24) ];
K0 = T4[(kappa[i] >> 24) ] ^
(T5[(K0 >> 24) ] & 0xff000000U) ^
(T5[(K0 >> 16) & 0xff] & 0x00ff0000U) ^
(T5[(K0 >> 8) & 0xff] & 0x0000ff00U) ^
(T5[(K0 ) & 0xff] & 0x000000ffU);
ctx->E[r][0] = K0;
const char *name, *plain, *conf, *K0, *Ke, *Ki, *ct;
const char *name, *plain, *K0, *Kc, *mic;
struct krb5_buffer K0 = {}, Ke = {}, Ki = {}, keys = {};
if (test->K0) {
LOAD_BUF(&K0, test->K0);
if (test->K0)
ci = crypto_krb5_prepare_encryption(krb5, &K0, test->usage, GFP_KERNEL);
clear_buf(&K0);
struct krb5_buffer K0 = {}, Kc = {}, keys = {}, plain = {}, mic = {};
if (test->K0) {
LOAD_BUF(&K0, test->K0);
ci = crypto_krb5_prepare_checksum(krb5, &K0, test->usage, GFP_KERNEL);
clear_buf(&K0);
.K0 = "1DC46A8D763F4F93742BCBA3387576C3",
.K0 = "5027BC231D0F3A9D23333F1CA6FDBE7C",
.K0 = "A1BB61E805F9BA6DDE8FDBDDC05CDEA0",
.K0 = "2CA27A5FAF5532244506434E1CEF6676",
.K0 = "7824F8C16F83FF354C6BF7515B973F43",
.K0 = "B61C86CC4E5D2757545AD423399FB7031ECAB913CBB900BD7A3C6DD8BF92015B",
.K0 = "1B97FE0A190E2021EB30753E1B6E1E77B0754B1D684610355864104963463833",
.K0 = "32164C5B434D1D1538E4CFD9BE8040FE8C4AC7ACC4B93D3314D2133668147A05",
.K0 = "B038B132CD8E06612267FAB7170066D88AECCBA0B744BFC60DC89BCA182D0715",
.K0 = "CCFCD349BF4C6677E86E4B02B8EAB924A546AC731CF9BF6989B996E7D6BFBBA7",
.K0 = "1DC46A8D763F4F93742BCBA3387576C3",
.K0 = "5027BC231D0F3A9D23333F1CA6FDBE7C",
.K0 = "B61C86CC4E5D2757545AD423399FB7031ECAB913CBB900BD7A3C6DD8BF92015B",
.K0 = "32164C5B434D1D1538E4CFD9BE8040FE8C4AC7ACC4B93D3314D2133668147A05",
pmicdata->L = pmicdata->K0;
pmicdata->K0 = get_unaligned_le32(key);
u32 K0, K1; /* Key */
char K0[32], *desc;
if (WARN_ON_ONCE(krb5->key_len > sizeof(K0)))
get_random_bytes(K0, krb5->key_len);
K0, krb5->key_len,
void *appdata, *K0, *encbase;
K0 = xdr;
get_random_bytes(K0, conn_krb5->key_len); /* appdata.callbackKey.data */
memcpy(xdr, K0, conn_krb5->key_len); /* token.K0.key.data */