Searched refs:FIPS (Results 1 – 13 of 13) sorted by relevance
12 Block cipher: DES (FIPS 46-2) cipher algorithm13 Block cipher: Triple DES EDE (FIPS 46-3) cipher algorithm45 SHA-1 secure hash algorithm (FIPS 180)55 SHA-224 and SHA-256 secure hash algorithms (FIPS 180)65 SHA-384 and SHA-512 secure hash algorithms (FIPS 180)74 Block ciphers: AES cipher algorithms (FIPS-197)
22 SHA-384 and SHA-512 secure hash algorithms (FIPS 180)33 SHA-1 secure hash algorithm (FIPS 180)44 SHA-224 and SHA-256 secure hash algorithms (FIPS 180)55 SHA3-224 and SHA3-256 secure hash algorithms (FIPS 202)66 SHA3-384 and SHA3-512 secure hash algorithms (FIPS 202)89 Block cipher: AES cipher algorithms (FIPS 197)112 Block ciphers: DES (FIPS 46-2) cipher algorithm113 Block ciphers: Triple DES EDE (FIPS 46-3) cipher algorithm
45 SHA-1 secure hash algorithm (FIPS 180)54 SHA-224 and SHA-256 secure hash algorithms (FIPS 180)64 SHA-224 and SHA-256 secure hash algorithms (FIPS 180)73 SHA-384 and SHA-512 secure hash algorithms (FIPS 180)83 SHA-384 and SHA-512 secure hash algorithms (FIPS 180)94 SHA-3 secure hash algorithms (FIPS 202)135 Block ciphers: AES cipher algorithms (FIPS-197)149 Block ciphers: AES cipher algorithms (FIPS-197)160 Length-preserving ciphers: AES cipher algorithms (FIPS-197)177 Length-preserving ciphers: AES cipher algorithms (FIPS-197)[all …]
91 SHA-1 secure hash algorithm (FIPS 180)102 SHA-1 secure hash algorithm (FIPS 180)113 SHA-1 secure hash algorithm (FIPS 180)123 SHA-224 and SHA-256 secure hash algorithms (FIPS 180)133 SHA-224 and SHA-256 secure hash algorithms (FIPS 180)143 SHA-384 and SHA-512 secure hash algorithms (FIPS 180)153 Block ciphers: AES cipher algorithms (FIPS-197)174 Length-preserving ciphers: AES cipher algorithms (FIPS-197)202 Length-preserving ciphers: AES cipher algorithms (FIPS-197)
39 SHA-1 secure hash algorithm (FIPS 180)49 SHA-224 and SHA-256 secure hash algorithms (FIPS 180)59 SHA-384 and SHA-512 secure hash algorithms (FIPS 180)
62 SHA-1 secure hash algorithm (FIPS 180)70 SHA-1 secure hash algorithm (FIPS 180)81 SHA-224 and SHA-256 secure hash algorithms (FIPS 180)91 Block ciphers: AES cipher algorithms (FIPS-197)117 AEAD cipher: AES cipher algorithms (FIPS-197)
47 SHA-224 and SHA-256 secure hash algorithm (FIPS 180)58 SHA-384 and SHA-512 secure hash algorithm (FIPS 180)
27 bool "FIPS 200 compliance"32 required if you want the system to operate in a FIPS 20037 string "FIPS Module Name"45 bool "Use Custom FIPS Module Version"50 string "FIPS Module Version"288 using curves P-192, P-256, and P-384 (FIPS 186)296 ECDSA (Elliptic Curve Digital Signature Algorithm) (FIPS 186,332 AES cipher algorithms (Rijndael)(FIPS-197, ISO/IEC 18033-3)350 AES cipher algorithms (Rijndael)(FIPS-197, ISO/IEC 18033-3)977 SHA-1 secure hash algorithm (FIPS 180, ISO/IEC 10118-3)[all …]
10 The BA431 hardware random number generator is an IP that is FIPS-140-2/3
80 tristate "Run FIPS selftests on the X.509+PKCS7 signature verification"84 for FIPS.
127 Block cipher: Triple DES EDE (FIPS 46-3) cipher algorithm437 SHA-1 secure hash algorithm (FIPS 180)451 SHA-224 and SHA-256 secure hash algorithms (FIPS 180)465 SHA-384 and SHA-512 secure hash algorithms (FIPS 180)
114 u8 FIPS; member
63 - 33us per encryption (options: 64k tables, FIPS standard bit ordering)65 - 48us per encryption (options: 2k tables, FIPS standard bit ordering)377 Fips|Core determines whether a completely standard FIPS initial379 and stored in a nonstandard bit order (FIPS w/o IP/FP).
Completed in 21 milliseconds