Searched refs:SHA512 (Results 1 – 15 of 15) sorted by relevance
39 SHA51295 SHA512
27 #define SHA512 \ macro
167 # They are then added to their respective SHA512 constants at274 # Purpose: Updates the SHA512 digest stored at "state" with the message277 # of SHA512 message blocks.278 # "blocks" is the message length in SHA512 blocks384 # K[t] used in SHA512 hashing
162 # They are then added to their respective SHA512 constants at275 # Purpose: Updates the SHA512 digest stored at "state" with the message278 # of SHA512 message blocks.279 # "blocks" is the message length in SHA512 blocks.386 # K[t] used in SHA512 hashing
566 # Purpose: Updates the SHA512 digest stored at "state" with the message569 # of SHA512 message blocks.570 # "blocks" is the message length in SHA512 blocks696 # K[t] used in SHA512 hashing
120 module_cpu_feature_match(SHA512, sha512_ce_mod_init);
30 // SHA256-hw SHA256(*) SHA51258 // and Mongoose. [For reference, NEON version of SHA512 is bound to1089 .asciz "SHA512 block transform for ARMv8, CRYPTOGAMS by <appro@openssl.org>"
30 // SHA256-hw SHA256(*) SHA51258 // and Mongoose. [For reference, NEON version of SHA512 is bound to
76 #define KERNEL_HWCAP_SHA512 __khwcap_feature(SHA512)
157 tristate "SHA384 and SHA512 digest algorithm"162 SHA512 secure hash standard.542 Some Atmel processors have SHA1/SHA224/SHA256/SHA384/SHA512545 SHA1/SHA224/SHA256/SHA384/SHA512 algorithms.837 SHA384 and SHA512 hash algorithms for both basic hash and HMAC.
194 - Jean-Luc Cooke (SHA256, SHA384, SHA512)
920 tristate "SHA512 digest algorithm (SSSE3/AVX/AVX2)"1003 tristate "SHA384 and SHA512 digest algorithms"1006 SHA512 secure hash standard (DFIPS 180-2).1015 tristate "SHA384 and SHA512 digest algorithms (OCTEON)"1024 tristate "SHA384 and SHA512 digest algorithm (SPARC64)"
106 bool "SHA512"
18 @ SHA512 block procedure for ARMv4. September 2007.1865 .asciz "SHA512 block transform for ARMv4/NEON, CRYPTOGAMS by <appro@openssl.org>"
224 For v2 encryption policies, the KDF is HKDF-SHA512. The master key is232 HKDF-SHA512 is preferred to the original AES-128-ECB based KDF because