Searched refs:FIPS (Results 1 – 11 of 11) sorted by relevance
22 SHA-384 and SHA-512 secure hash algorithms (FIPS 180)33 SHA-1 secure hash algorithm (FIPS 180)44 SHA-224 and SHA-256 secure hash algorithms (FIPS 180)55 SHA3-224 and SHA3-256 secure hash algorithms (FIPS 202)66 SHA3-384 and SHA3-512 secure hash algorithms (FIPS 202)89 Block cipher: AES cipher algorithms (FIPS 197)112 Block ciphers: DES (FIPS 46-2) cipher algorithm113 Block ciphers: Triple DES EDE (FIPS 46-3) cipher algorithm
12 Block cipher: DES (FIPS 46-2) cipher algorithm13 Block cipher: Triple DES EDE (FIPS 46-3) cipher algorithm45 SHA-1 secure hash algorithm (FIPS 180)55 SHA-224 and SHA-256 secure hash algorithms (FIPS 180)65 SHA-384 and SHA-512 secure hash algorithms (FIPS 180)74 Block ciphers: AES cipher algorithms (FIPS-197)
45 SHA-1 secure hash algorithm (FIPS 180)54 SHA-224 and SHA-256 secure hash algorithms (FIPS 180)64 SHA-224 and SHA-256 secure hash algorithms (FIPS 180)73 SHA-384 and SHA-512 secure hash algorithms (FIPS 180)83 SHA-384 and SHA-512 secure hash algorithms (FIPS 180)94 SHA-3 secure hash algorithms (FIPS 202)124 Block ciphers: AES cipher algorithms (FIPS-197)138 Block ciphers: AES cipher algorithms (FIPS-197)149 Length-preserving ciphers: AES cipher algorithms (FIPS-197)166 Length-preserving ciphers: AES cipher algorithms (FIPS-197)[all …]
89 SHA-1 secure hash algorithm (FIPS 180)100 SHA-1 secure hash algorithm (FIPS 180)111 SHA-1 secure hash algorithm (FIPS 180)121 SHA-224 and SHA-256 secure hash algorithms (FIPS 180)131 SHA-224 and SHA-256 secure hash algorithms (FIPS 180)141 SHA-384 and SHA-512 secure hash algorithms (FIPS 180)151 Block ciphers: AES cipher algorithms (FIPS-197)173 Length-preserving ciphers: AES cipher algorithms (FIPS-197)194 Length-preserving ciphers: AES cipher algorithms (FIPS-197)
51 SHA-1 secure hash algorithm (FIPS 180)59 SHA-1 secure hash algorithm (FIPS 180)70 SHA-224 and SHA-256 secure hash algorithms (FIPS 180)80 Block ciphers: AES cipher algorithms (FIPS-197)
39 SHA-1 secure hash algorithm (FIPS 180)49 SHA-224 and SHA-256 secure hash algorithms (FIPS 180)59 SHA-384 and SHA-512 secure hash algorithms (FIPS 180)
27 bool "FIPS 200 compliance"32 required if you want the system to operate in a FIPS 20037 string "FIPS Module Name"41 This option sets the FIPS Module name reported by the Crypto API via45 bool "Use Custom FIPS Module Version"50 string "FIPS Module Version"54 This option provides the ability to override the FIPS Module Version.282 using curves P-192, P-256, and P-384 (FIPS 186)290 ECDSA (Elliptic Curve Digital Signature Algorithm) (FIPS 186,344 AES cipher algorithms (Rijndael)(FIPS-197, ISO/IEC 18033-3)[all …]
79 bool "Run FIPS selftests on the X.509+PKCS7 signature verification"83 for FIPS.
122 Block cipher: Triple DES EDE (FIPS 46-3) cipher algorithm394 SHA-1 secure hash algorithm (FIPS 180)408 SHA-224 and SHA-256 secure hash algorithms (FIPS 180)422 SHA-384 and SHA-512 secure hash algorithms (FIPS 180)
114 u8 FIPS; member
63 - 33us per encryption (options: 64k tables, FIPS standard bit ordering)65 - 48us per encryption (options: 2k tables, FIPS standard bit ordering)377 Fips|Core determines whether a completely standard FIPS initial379 and stored in a nonstandard bit order (FIPS w/o IP/FP).