Searched refs:SHA512 (Results 1 – 11 of 11) sorted by relevance
38 SHA51294 SHA512
26 #define SHA512 \ macro
168 # They are then added to their respective SHA512 constants at275 # Purpose: Updates the SHA512 digest stored at D with the message stored in M.276 # The size of the message pointed to by M must be an integer multiple of SHA512278 # L is the message length in SHA512 blocks381 # K[t] used in SHA512 hashing
162 # They are then added to their respective SHA512 constants at273 # Purpose: Updates the SHA512 digest stored at D with the message stored in M.274 # The size of the message pointed to by M must be an integer multiple of SHA512276 # L is the message length in SHA512 blocks.380 # K[t] used in SHA512 hashing
566 # Purpose: Updates the SHA512 digest stored at D with the message stored in M.567 # The size of the message pointed to by M must be an integer multiple of SHA512569 # L is the message length in SHA512 blocks690 # K[t] used in SHA512 hashing
100 tristate "SHA384 and SHA512 digest algorithm"105 SHA512 secure hash standard.384 Some Atmel processors have SHA1/SHA224/SHA256/SHA384/SHA512387 SHA1/SHA224/SHA256/SHA384/SHA512 algorithms.
82 [HASH_ALGO_SHA512] = _(SHA512),
57 tristate "SHA384 and SHA512 digest algorithm (ARM NEON)"
94 bool "SHA512"
547 tristate "SHA512 digest algorithm (SSSE3/AVX/AVX2)"645 tristate "SHA384 and SHA512 digest algorithms"648 SHA512 secure hash standard (DFIPS 180-2).657 tristate "SHA384 and SHA512 digest algorithms (OCTEON)"666 tristate "SHA384 and SHA512 digest algorithm (SPARC64)"
179 Jean-Luc Cooke (SHA256, SHA384, SHA512)