Searched refs:FIPS (Results 1 – 12 of 12) sorted by relevance
22 SHA-384 and SHA-512 secure hash algorithms (FIPS 180)33 SHA-1 secure hash algorithm (FIPS 180)44 SHA-224 and SHA-256 secure hash algorithms (FIPS 180)55 SHA3-224 and SHA3-256 secure hash algorithms (FIPS 202)66 SHA3-384 and SHA3-512 secure hash algorithms (FIPS 202)89 Block cipher: AES cipher algorithms (FIPS 197)112 Block ciphers: DES (FIPS 46-2) cipher algorithm113 Block ciphers: Triple DES EDE (FIPS 46-3) cipher algorithm
12 Block cipher: DES (FIPS 46-2) cipher algorithm13 Block cipher: Triple DES EDE (FIPS 46-3) cipher algorithm45 SHA-1 secure hash algorithm (FIPS 180)55 SHA-224 and SHA-256 secure hash algorithms (FIPS 180)65 SHA-384 and SHA-512 secure hash algorithms (FIPS 180)74 Block ciphers: AES cipher algorithms (FIPS-197)
45 SHA-1 secure hash algorithm (FIPS 180)54 SHA-224 and SHA-256 secure hash algorithms (FIPS 180)64 SHA-224 and SHA-256 secure hash algorithms (FIPS 180)73 SHA-384 and SHA-512 secure hash algorithms (FIPS 180)83 SHA-384 and SHA-512 secure hash algorithms (FIPS 180)94 SHA-3 secure hash algorithms (FIPS 202)135 Block ciphers: AES cipher algorithms (FIPS-197)149 Block ciphers: AES cipher algorithms (FIPS-197)160 Length-preserving ciphers: AES cipher algorithms (FIPS-197)177 Length-preserving ciphers: AES cipher algorithms (FIPS-197)[all …]
91 SHA-1 secure hash algorithm (FIPS 180)102 SHA-1 secure hash algorithm (FIPS 180)113 SHA-1 secure hash algorithm (FIPS 180)123 SHA-224 and SHA-256 secure hash algorithms (FIPS 180)133 SHA-224 and SHA-256 secure hash algorithms (FIPS 180)143 SHA-384 and SHA-512 secure hash algorithms (FIPS 180)153 Block ciphers: AES cipher algorithms (FIPS-197)175 Length-preserving ciphers: AES cipher algorithms (FIPS-197)196 Length-preserving ciphers: AES cipher algorithms (FIPS-197)
51 SHA-1 secure hash algorithm (FIPS 180)59 SHA-1 secure hash algorithm (FIPS 180)70 SHA-224 and SHA-256 secure hash algorithms (FIPS 180)80 Block ciphers: AES cipher algorithms (FIPS-197)
39 SHA-1 secure hash algorithm (FIPS 180)49 SHA-224 and SHA-256 secure hash algorithms (FIPS 180)59 SHA-384 and SHA-512 secure hash algorithms (FIPS 180)
27 bool "FIPS 200 compliance"32 required if you want the system to operate in a FIPS 20037 string "FIPS Module Name"45 bool "Use Custom FIPS Module Version"50 string "FIPS Module Version"279 using curves P-192, P-256, and P-384 (FIPS 186)287 ECDSA (Elliptic Curve Digital Signature Algorithm) (FIPS 186,341 AES cipher algorithms (Rijndael)(FIPS-197, ISO/IEC 18033-3)359 AES cipher algorithms (Rijndael)(FIPS-197, ISO/IEC 18033-3)1009 SHA-1 secure hash algorithm (FIPS 180, ISO/IEC 10118-3)[all …]
79 bool "Run FIPS selftests on the X.509+PKCS7 signature verification"83 for FIPS.
10 The BA431 hardware random number generator is an IP that is FIPS-140-2/3
122 Block cipher: Triple DES EDE (FIPS 46-3) cipher algorithm432 SHA-1 secure hash algorithm (FIPS 180)446 SHA-224 and SHA-256 secure hash algorithms (FIPS 180)460 SHA-384 and SHA-512 secure hash algorithms (FIPS 180)
114 u8 FIPS; member
63 - 33us per encryption (options: 64k tables, FIPS standard bit ordering)65 - 48us per encryption (options: 2k tables, FIPS standard bit ordering)377 Fips|Core determines whether a completely standard FIPS initial379 and stored in a nonstandard bit order (FIPS w/o IP/FP).
Completed in 12 milliseconds