| /crypto/krb5/ |
| A D | selftest_data.c | 164 .usage = 0, 172 .usage = 1, 180 .usage = 2, 188 .usage = 3, 196 .usage = 4, 204 .usage = 0, 212 .usage = 1, 220 .usage = 2, 228 .usage = 3, 236 .usage = 4, [all …]
|
| A D | internal.h | 48 unsigned int usage, 62 unsigned int usage, 138 u32 usage; member 144 u32 usage; member 162 u32 usage, struct krb5_buffer *key, gfp_t gfp); 164 u32 usage, struct krb5_buffer *key, gfp_t gfp); 166 u32 usage, struct krb5_buffer *key, gfp_t gfp); 177 unsigned int usage, 187 unsigned int usage,
|
| A D | krb5_kdf.c | 87 u32 usage, struct krb5_buffer *key, gfp_t gfp) in krb5_derive_Kc() argument 92 *(__be32 *)buf = cpu_to_be32(usage); in krb5_derive_Kc() 111 u32 usage, struct krb5_buffer *key, gfp_t gfp) in krb5_derive_Ke() argument 116 *(__be32 *)buf = cpu_to_be32(usage); in krb5_derive_Ke() 135 u32 usage, struct krb5_buffer *key, gfp_t gfp) in krb5_derive_Ki() argument 140 *(__be32 *)buf = cpu_to_be32(usage); in krb5_derive_Ki()
|
| A D | krb5_api.c | 208 u32 usage, gfp_t gfp) in crypto_krb5_prepare_encryption() argument 214 ret = krb5->profile->derive_encrypt_keys(krb5, TK, usage, &keys, gfp); in crypto_krb5_prepare_encryption() 276 u32 usage, gfp_t gfp) in crypto_krb5_prepare_checksum() argument 282 ret = krb5->profile->derive_checksum_key(krb5, TK, usage, &keys, gfp); in crypto_krb5_prepare_checksum()
|
| A D | rfc3961_simplified.c | 434 unsigned int usage, in authenc_derive_encrypt_keys() argument 459 ret = krb5_derive_Ke(krb5, TK, usage, &Ke, gfp); in authenc_derive_encrypt_keys() 464 ret = krb5_derive_Ki(krb5, TK, usage, &Ki, gfp); in authenc_derive_encrypt_keys() 504 unsigned int usage, in rfc3961_derive_checksum_key() argument 515 ret = krb5_derive_Kc(krb5, TK, usage, setkey, gfp); in rfc3961_derive_checksum_key()
|
| A D | selftest.c | 293 ci = crypto_krb5_prepare_encryption(krb5, &K0, test->usage, GFP_KERNEL); in krb5_test_one_enc() 396 ci = crypto_krb5_prepare_checksum(krb5, &K0, test->usage, GFP_KERNEL); in krb5_test_one_mic()
|
| /crypto/asymmetric_keys/ |
| A D | pkcs7_key_type.c | 21 module_param_named(usage, pkcs7_usage, uint, S_IWUSR | S_IRUGO); 53 enum key_being_used_for usage = pkcs7_usage; in pkcs7_preparse() local 55 if (usage >= NR__KEY_BEING_USED_FOR) { in pkcs7_preparse() 56 pr_err("Invalid usage type %d\n", usage); in pkcs7_preparse() 62 VERIFY_USE_SECONDARY_KEYRING, usage, in pkcs7_preparse()
|
| A D | pkcs7_verify.c | 395 enum key_being_used_for usage) in pkcs7_verify() argument 403 switch (usage) { in pkcs7_verify()
|
| A D | verify_pefile.c | 422 enum key_being_used_for usage) in verify_pefile_signature() argument 440 trusted_keys, usage, in verify_pefile_signature()
|