Lines Matching full:also
47 contains various crypto algorithms that are also built into vmlinux.
49 these algorithms with its implementations. It also runs self-tests on
611 See also:
701 between 1 to 64. The keyed hash is also implemented.
719 between 1 to 32. The keyed hash is also implemented.
992 This code also includes SHA-224, a 224 bit hash with 112 bits
1031 This code also includes SHA-384, a 384 bit hash with 192 bits
1095 See also:
1107 See also:
1133 suited for restricted-space environments, in which it also
1157 block. Interrupts are also disabled to avoid races where cachelines
1180 suited for restricted-space environments, in which it also
1208 suited for restricted-space environments, in which it also
1245 See also:
1273 See also:
1282 See also:
1297 See also:
1312 See also:
1329 See also:
1349 See also:
1365 See also:
1382 See also:
1485 See also:
1509 This is the portable C implementation of ChaCha20. See also:
1515 while provably retaining ChaCha20's security. See also:
1550 See also:
1560 of 8 bits. Also includes the 'Tnepres' algorithm, a reversed
1563 See also:
1582 See also:
1601 See also:
1621 See also:
1637 See also:
1661 See also: <https://eprint.iacr.org/2008/329.pdf>
1695 See also:
1717 See also:
1733 See also:
1754 See also:
1777 See also: