Home
last modified time | relevance | path

Searched refs:use (Results 1 – 5 of 5) sorted by relevance

/crypto/krb5/
A Dselftest_data.c44 .Kc.use = 0x00000002,
46 .Ke.use = 0x00000002,
48 .Ki.use = 0x00000002,
54 .Kc.use = 0x00000002,
56 .Ke.use = 0x00000002,
58 .Ki.use = 0x00000002,
66 .Kc.use = 0x00000002,
68 .Ke.use = 0x00000002,
70 .Ki.use = 0x00000002,
77 .Kc.use = 0x00000002,
[all …]
A DKconfig19 intended for network filesystems to use.
A Dselftest.c177 ret = krb5_derive_Kc(krb5, base_key, test->use, &result, GFP_KERNEL); in krb5_test_key()
180 ret = krb5_derive_Ke(krb5, base_key, test->use, &result, GFP_KERNEL); in krb5_test_key()
183 ret = krb5_derive_Ki(krb5, base_key, test->use, &result, GFP_KERNEL); in krb5_test_key()
A Dinternal.h126 u32 use; member
/crypto/
A DKconfig186 There are two main use cases for these tests:
264 This is mainly intended for use by people developing cryptographic
368 environments regardless of its use in feedback or non-feedback
386 performance too much. It is intended for use by the generic CCM
405 Anubis is a variable key length cipher which can use keys from
434 This is a variable key length cipher which can use keys from 32
436 designed for use on "large microprocessors".
550 as an authorized cryptographic algorithms for the use within China.
552 SMS4 was originally created for use in protecting wireless
876 Note that the use of ESSIV is not recommended for new deployments,
[all …]

Completed in 8 milliseconds