Lines Matching refs:hash
505 tristate "NHPoly1305 hash function (x86_64 SSE2 implementation)"
509 SSE2 optimized implementation of the hash function used by the
513 tristate "NHPoly1305 hash function (x86_64 AVX2 implementation)"
517 AVX2 optimized implementation of the hash function used by the
531 an ε-almost-∆-universal hash function, and an invocation of
550 dm-crypt. It uses the hash of the block encryption key as the
688 tristate "xxHash hash algorithm"
692 xxHash non-cryptographic hash algorithm. Extremely fast, working at
699 Implementation of cryptographic hash function BLAKE2b (or just BLAKE2),
701 between 1 to 64. The keyed hash is also implemented.
717 Implementation of cryptographic hash function BLAKE2s
719 between 1 to 32. The keyed hash is also implemented.
773 tristate "GHASH hash function"
777 GHASH is the hash function used in GCM (Galois/Counter Mode).
778 It is not a general-purpose cryptographic hash function.
862 RIPEMD-128 is a 128-bit cryptographic hash function. It should only
875 RIPEMD-160 is a 160-bit cryptographic hash function. It is intended
876 to be used as a secure replacement for the 128-bit hash functions
891 256 bit hash. It is intended for applications that require
892 longer hash-results, without needing a larger security level
903 320 bit hash. It is intended for applications that require
904 longer hash-results, without needing a larger security level
914 SHA-1 secure hash standard (FIPS 180-1/DFIPS 180-2).
922 SHA-1 secure hash standard (FIPS 180-1/DFIPS 180-2) implemented
933 SHA-256 secure hash standard (DFIPS 180-2) implemented
945 SHA-512 secure hash standard (DFIPS 180-2) implemented
956 SHA-1 secure hash standard (FIPS 180-1/DFIPS 180-2) implemented
965 SHA-1 secure hash standard (FIPS 180-1/DFIPS 180-2) implemented
973 SHA-1 secure hash standard (FIPS 180-1/DFIPS 180-2).
979 SHA-1 secure hash standard (DFIPS 180-4) implemented
987 SHA256 secure hash standard (DFIPS 180-2).
989 This version of SHA implements a 256 bit hash with 128 bits of
992 This code also includes SHA-224, a 224 bit hash with 112 bits
1001 SHA224 and SHA256 secure hash standard (DFIPS 180-2)
1010 SHA-256 secure hash standard (DFIPS 180-2) implemented
1019 SHA-256 secure hash standard (DFIPS 180-2) implemented
1026 SHA512 secure hash standard (DFIPS 180-2).
1028 This version of SHA implements a 512 bit hash with 256 bits of
1031 This code also includes SHA-384, a 384 bit hash with 192 bits
1040 SHA-512 secure hash standard (DFIPS 180-2) implemented
1049 SHA-512 secure hash standard (DFIPS 180-2) implemented
1056 SHA-3 secure hash standard (DFIPS 202). It's based on
1066 SM3 secure hash function as defined by OSCCA GM/T 0004-2012 SM3).
1071 https://datatracker.ietf.org/doc/html/draft-shen-sm3-hash
1079 This setting enables two hash algorithms with 256 and 512 bits output.
1089 Tiger hash algorithm 192, 160 and 128-bit hashes
1091 Tiger is a hash function optimized for 64-bit processors while
1102 Whirlpool hash algorithm 512, 384 and 256-bit hashes
1111 tristate "GHASH hash function (CLMUL-NI accelerated)"
1116 GHASH, the hash function used in GCM (Galois/Counter mode).
1900 tristate "User-space interface for hash algorithms"
1905 This option enables the user-spaces interface for hash
1963 - size and numbers of hash operations