Security Policy: Difference between revisions

no edit summary
No edit summary
Line 283: Line 283:
* For the FIPS Approved mode of operation, look up the alternative function <code>"FC_GetFunctionList"</code>.
* For the FIPS Approved mode of operation, look up the alternative function <code>"FC_GetFunctionList"</code>.
|}
|}
==Cryptoalgorithms Supported==
* RC2-ECB Encrypt/Decrypt
* RC2-CBC Encrypt/Decrypt
* RC4 Encrypt/Decrypt
* DES-ECB Encrypt/Decrypt
* DES-CBC Encrypt/Decrypt
* triple DES-ECB Encrypt/Decrypt
* triple DES-CBC Encrypt/Decrypt
* AES-128,-192,-256-ECB Encrypt/Decrypt
* AES-128,-192,-256-CBC Encrypt/Decrypt
* MD2 Hash
* MD5 Hash
* SHA-1 Hash
* SHA-256 Hash
* SHA-384 Hash
* SHA-512 Hash
* HMAC-SHA-1,-SHA256,-SHA-384,-SHA-512 Hash
* RSA Encrypt/Decrypt
* RSA-SHA-1,-SHA-256,-SHA-384,-SHA-512 Signature
* RSA-SHA-1,-SHA-256,-SHA-384,-SHA-512 Signature Verification
* DSA Signature
* DSA Signature Verification
* ECDSA Signature
* ECDSA Signature Verification
* PRNG


==Non-NIST-Recommended Elliptic Curves==
==Non-NIST-Recommended Elliptic Curves==
198

edits