Searched refs:FIPS (Results 1 – 12 of 12) sorted by relevance
22 SHA-384 and SHA-512 secure hash algorithms (FIPS 180)33 SHA-1 secure hash algorithm (FIPS 180)44 SHA-224 and SHA-256 secure hash algorithms (FIPS 180)55 SHA3-224 and SHA3-256 secure hash algorithms (FIPS 202)66 SHA3-384 and SHA3-512 secure hash algorithms (FIPS 202)89 Block cipher: AES cipher algorithms (FIPS 197)112 Block ciphers: DES (FIPS 46-2) cipher algorithm113 Block ciphers: Triple DES EDE (FIPS 46-3) cipher algorithm
12 Block cipher: DES (FIPS 46-2) cipher algorithm13 Block cipher: Triple DES EDE (FIPS 46-3) cipher algorithm45 SHA-1 secure hash algorithm (FIPS 180)55 SHA-224 and SHA-256 secure hash algorithms (FIPS 180)65 SHA-384 and SHA-512 secure hash algorithms (FIPS 180)74 Block ciphers: AES cipher algorithms (FIPS-197)
45 SHA-1 secure hash algorithm (FIPS 180)54 SHA-224 and SHA-256 secure hash algorithms (FIPS 180)64 SHA-224 and SHA-256 secure hash algorithms (FIPS 180)73 SHA-384 and SHA-512 secure hash algorithms (FIPS 180)83 SHA-384 and SHA-512 secure hash algorithms (FIPS 180)94 SHA-3 secure hash algorithms (FIPS 202)135 Block ciphers: AES cipher algorithms (FIPS-197)149 Block ciphers: AES cipher algorithms (FIPS-197)160 Length-preserving ciphers: AES cipher algorithms (FIPS-197)177 Length-preserving ciphers: AES cipher algorithms (FIPS-197)[all …]
91 SHA-1 secure hash algorithm (FIPS 180)102 SHA-1 secure hash algorithm (FIPS 180)113 SHA-1 secure hash algorithm (FIPS 180)123 SHA-224 and SHA-256 secure hash algorithms (FIPS 180)133 SHA-224 and SHA-256 secure hash algorithms (FIPS 180)143 SHA-384 and SHA-512 secure hash algorithms (FIPS 180)153 Block ciphers: AES cipher algorithms (FIPS-197)175 Length-preserving ciphers: AES cipher algorithms (FIPS-197)196 Length-preserving ciphers: AES cipher algorithms (FIPS-197)
51 SHA-1 secure hash algorithm (FIPS 180)59 SHA-1 secure hash algorithm (FIPS 180)70 SHA-224 and SHA-256 secure hash algorithms (FIPS 180)80 Block ciphers: AES cipher algorithms (FIPS-197)105 AEAD cipher: AES cipher algorithms (FIPS-197)
39 SHA-1 secure hash algorithm (FIPS 180)49 SHA-224 and SHA-256 secure hash algorithms (FIPS 180)59 SHA-384 and SHA-512 secure hash algorithms (FIPS 180)
27 bool "FIPS 200 compliance"32 required if you want the system to operate in a FIPS 20037 string "FIPS Module Name"41 This option sets the FIPS Module name reported by the Crypto API via45 bool "Use Custom FIPS Module Version"50 string "FIPS Module Version"54 This option provides the ability to override the FIPS Module Version.287 using curves P-192, P-256, and P-384 (FIPS 186)295 ECDSA (Elliptic Curve Digital Signature Algorithm) (FIPS 186,349 AES cipher algorithms (Rijndael)(FIPS-197, ISO/IEC 18033-3)[all …]
79 tristate "Run FIPS selftests on the X.509+PKCS7 signature verification"83 for FIPS.
10 The BA431 hardware random number generator is an IP that is FIPS-140-2/3
122 Block cipher: Triple DES EDE (FIPS 46-3) cipher algorithm432 SHA-1 secure hash algorithm (FIPS 180)446 SHA-224 and SHA-256 secure hash algorithms (FIPS 180)460 SHA-384 and SHA-512 secure hash algorithms (FIPS 180)
114 u8 FIPS; member
63 - 33us per encryption (options: 64k tables, FIPS standard bit ordering)65 - 48us per encryption (options: 2k tables, FIPS standard bit ordering)377 Fips|Core determines whether a completely standard FIPS initial379 and stored in a nonstandard bit order (FIPS w/o IP/FP).