Searched refs:FIPS (Results 1 – 13 of 13) sorted by relevance
12 Block cipher: DES (FIPS 46-2) cipher algorithm13 Block cipher: Triple DES EDE (FIPS 46-3) cipher algorithm35 SHA-1 secure hash algorithm (FIPS 180)45 SHA-224 and SHA-256 secure hash algorithms (FIPS 180)55 SHA-384 and SHA-512 secure hash algorithms (FIPS 180)64 Block ciphers: AES cipher algorithms (FIPS-197)
10 SHA-384 and SHA-512 secure hash algorithms (FIPS 180)21 SHA-1 secure hash algorithm (FIPS 180)32 SHA-224 and SHA-256 secure hash algorithms (FIPS 180)43 SHA3-224 and SHA3-256 secure hash algorithms (FIPS 202)54 SHA3-384 and SHA3-512 secure hash algorithms (FIPS 202)77 Block cipher: AES cipher algorithms (FIPS 197)100 Block ciphers: DES (FIPS 46-2) cipher algorithm101 Block ciphers: Triple DES EDE (FIPS 46-3) cipher algorithm
46 SHA-1 secure hash algorithm (FIPS 180)55 SHA-224 and SHA-256 secure hash algorithms (FIPS 180)65 SHA-224 and SHA-256 secure hash algorithms (FIPS 180)74 SHA-384 and SHA-512 secure hash algorithms (FIPS 180)84 SHA-384 and SHA-512 secure hash algorithms (FIPS 180)95 SHA-3 secure hash algorithms (FIPS 202)136 Block ciphers: AES cipher algorithms (FIPS-197)150 Block ciphers: AES cipher algorithms (FIPS-197)161 Length-preserving ciphers: AES cipher algorithms (FIPS-197)178 Length-preserving ciphers: AES cipher algorithms (FIPS-197)[all …]
94 SHA-1 secure hash algorithm (FIPS 180)105 SHA-1 secure hash algorithm (FIPS 180)116 SHA-1 secure hash algorithm (FIPS 180)126 SHA-224 and SHA-256 secure hash algorithms (FIPS 180)136 SHA-224 and SHA-256 secure hash algorithms (FIPS 180)146 SHA-384 and SHA-512 secure hash algorithms (FIPS 180)156 Block ciphers: AES cipher algorithms (FIPS-197)177 Length-preserving ciphers: AES cipher algorithms (FIPS-197)205 Length-preserving ciphers: AES cipher algorithms (FIPS-197)
32 SHA-1 secure hash algorithm (FIPS 180)42 SHA-224 and SHA-256 secure hash algorithms (FIPS 180)52 SHA-384 and SHA-512 secure hash algorithms (FIPS 180)
31 SHA-1 secure hash algorithm (FIPS 180)39 SHA-1 secure hash algorithm (FIPS 180)50 SHA-224 and SHA-256 secure hash algorithms (FIPS 180)60 Block ciphers: AES cipher algorithms (FIPS-197)86 AEAD cipher: AES cipher algorithms (FIPS-197)
46 SHA-224 and SHA-256 secure hash algorithm (FIPS 180)57 SHA-384 and SHA-512 secure hash algorithm (FIPS 180)
27 bool "FIPS 200 compliance"32 required if you want the system to operate in a FIPS 20037 string "FIPS Module Name"45 bool "Use Custom FIPS Module Version"50 string "FIPS Module Version"307 using curves P-192, P-256, and P-384 (FIPS 186)315 ECDSA (Elliptic Curve Digital Signature Algorithm) (FIPS 186,352 AES cipher algorithms (Rijndael)(FIPS-197, ISO/IEC 18033-3)370 AES cipher algorithms (Rijndael)(FIPS-197, ISO/IEC 18033-3)991 SHA-1 secure hash algorithm (FIPS 180, ISO/IEC 10118-3)[all …]
10 The BA431 hardware random number generator is an IP that is FIPS-140-2/3
80 tristate "Run FIPS selftests on the X.509+PKCS7 signature verification"84 for FIPS.
129 Block cipher: Triple DES EDE (FIPS 46-3) cipher algorithm442 SHA-1 secure hash algorithm (FIPS 180)456 SHA-224 and SHA-256 secure hash algorithms (FIPS 180)470 SHA-384 and SHA-512 secure hash algorithms (FIPS 180)
114 u8 FIPS; member
63 - 33us per encryption (options: 64k tables, FIPS standard bit ordering)65 - 48us per encryption (options: 2k tables, FIPS standard bit ordering)377 Fips|Core determines whether a completely standard FIPS initial379 and stored in a nonstandard bit order (FIPS w/o IP/FP).