Lines Matching refs:used
35 I<nid_key> and I<nid_cert> are the encryption algorithms that should be used
42 I<ctx> and property query I<propq> to be used to select algorithm implementations.
55 can all be set to zero and sensible defaults will be used.
60 MAC algorithm HMAC with SHA2-256. The MAC key derivation algorithm used
69 if set to B<KEY_SIG> the key can be used for signing only, if set to B<KEY_EX>
70 it can be used for signing and encryption. This option was useful for old
72 had restrictions on the permissible sizes of keys which could be used for
76 used for the corresponding B<friendlyName> in the PKCS12 structure instead.
78 used for the corresponding B<localKeyID> in the PKCS12 structure instead of the
82 I<keyid> then this will be used for the corresponding B<friendlyName> or
90 should be used.