Lines Matching refs:used
55 used if you don't need to meet these requirements.
194 These are 'Null' algorithms, used by IPsec, which do nothing.
458 The first 128, 192 or 256 bits in the key are used for AES and the
459 rest is used to tie each cipher block to its logical position.
509 SSE2 optimized implementation of the hash function used by the
517 AVX2 optimized implementation of the hash function used by the
549 generation method that is used in some cases by fscrypt and/or
560 that the keys are presented in the same format used by the authenc
742 transforms to be used if they are available.
777 GHASH is the hash function used in GCM (Galois/Counter Mode).
788 It is used for the ChaCha20-Poly1305 AEAD, specified in RFC7539 for use
800 It is used for the ChaCha20-Poly1305 AEAD, specified in RFC7539 for use
851 Michael MIC is used for message integrity protection in TKIP
853 should not be used for other purposes because of the weakness
863 be used as a secure replacement for RIPEMD. For other use cases,
864 RIPEMD-160 should be used.
876 to be used as a secure replacement for the 128-bit hash functions
1116 GHASH, the hash function used in GCM (Galois/Counter mode).
1227 This module should only be used for low power (router) devices
1472 FCrypt algorithm used by RxRPC.
1894 the kernel crypto API and can be used by any caller.