Lines Matching full:algorithm
11 Curve25519 algorithm
34 Some algorithm implementations are supported only in 64-bit builds,
44 Block cipher: Blowfish cipher algorithm
94 Length-preserving ciphers: CAST5 (CAST-128) cipher algorithm
112 Length-preserving ciphers: CAST6 (CAST-256) cipher algorithm
127 Block cipher: Triple DES EDE (FIPS 46-3) cipher algorithm
142 Length-preserving ciphers: Serpent cipher algorithm
158 Length-preserving ciphers: Serpent cipher algorithm
175 Length-preserving ciphers: Serpent cipher algorithm
188 Length-preserving ciphers: Serpent cipher algorithm
246 Block cipher: Twofish cipher algorithm
257 Block cipher: Twofish cipher algorithm
268 Length-preserving cipher: Twofish cipher algorithm
286 Length-preserving cipher: Twofish cipher algorithm
371 AEGIS-128 AEAD algorithm
425 Poly1305 authenticator algorithm (RFC7539)
437 SHA-1 secure hash algorithm (FIPS 180)
500 CRC32c CRC algorithm with the iSCSI polynomial (RFC 3385 and RFC 3720)
512 CRC32 CRC algorithm (IEEE 802.3)
522 CRC16 CRC algorithm used for the T10 (SCSI) Data Integrity Field (DIF)