• Home
  • Raw
  • Download

Lines Matching refs:hash

452 	tristate "NHPoly1305 hash function (x86_64 SSE2 implementation)"
456 SSE2 optimized implementation of the hash function used by the
460 tristate "NHPoly1305 hash function (x86_64 AVX2 implementation)"
464 AVX2 optimized implementation of the hash function used by the
478 an ε-almost-∆-universal hash function, and an invocation of
497 dm-crypt. It uses the hash of the block encryption key as the
635 tristate "xxHash hash algorithm"
639 xxHash non-cryptographic hash algorithm. Extremely fast, working at
679 tristate "GHASH hash function"
683 GHASH is the hash function used in GCM (Galois/Counter Mode).
684 It is not a general-purpose cryptographic hash function.
761 RIPEMD-128 is a 128-bit cryptographic hash function. It should only
774 RIPEMD-160 is a 160-bit cryptographic hash function. It is intended
775 to be used as a secure replacement for the 128-bit hash functions
790 256 bit hash. It is intended for applications that require
791 longer hash-results, without needing a larger security level
802 320 bit hash. It is intended for applications that require
803 longer hash-results, without needing a larger security level
813 SHA-1 secure hash standard (FIPS 180-1/DFIPS 180-2).
821 SHA-1 secure hash standard (FIPS 180-1/DFIPS 180-2) implemented
832 SHA-256 secure hash standard (DFIPS 180-2) implemented
844 SHA-512 secure hash standard (DFIPS 180-2) implemented
855 SHA-1 secure hash standard (FIPS 180-1/DFIPS 180-2) implemented
864 SHA-1 secure hash standard (FIPS 180-1/DFIPS 180-2) implemented
872 SHA-1 secure hash standard (FIPS 180-1/DFIPS 180-2).
878 SHA-1 secure hash standard (DFIPS 180-4) implemented
889 SHA256 secure hash standard (DFIPS 180-2).
891 This version of SHA implements a 256 bit hash with 128 bits of
894 This code also includes SHA-224, a 224 bit hash with 112 bits
903 SHA224 and SHA256 secure hash standard (DFIPS 180-2)
912 SHA-256 secure hash standard (DFIPS 180-2) implemented
921 SHA-256 secure hash standard (DFIPS 180-2) implemented
928 SHA512 secure hash standard (DFIPS 180-2).
930 This version of SHA implements a 512 bit hash with 256 bits of
933 This code also includes SHA-384, a 384 bit hash with 192 bits
942 SHA-512 secure hash standard (DFIPS 180-2) implemented
951 SHA-512 secure hash standard (DFIPS 180-2) implemented
958 SHA-3 secure hash standard (DFIPS 202). It's based on
968 SM3 secure hash function as defined by OSCCA GM/T 0004-2012 SM3).
973 https://datatracker.ietf.org/doc/html/draft-shen-sm3-hash
981 This setting enables two hash algorithms with 256 and 512 bits output.
991 Tiger hash algorithm 192, 160 and 128-bit hashes
993 Tiger is a hash function optimized for 64-bit processors while
1004 Whirlpool hash algorithm 512, 384 and 256-bit hashes
1013 tristate "GHASH hash function (CLMUL-NI accelerated)"
1018 GHASH, the hash function used in GCM (Galois/Counter mode).
1796 tristate "User-space interface for hash algorithms"
1801 This option enables the user-spaces interface for hash
1841 - size and numbers of hash operations