1 | """Hashing algorithms |
---|
2 | |
---|
3 | Hash functions take arbitrary strings as input, and produce an output |
---|
4 | of fixed size that is dependent on the input; it should never be |
---|
5 | possible to derive the input data given only the hash function's |
---|
6 | output. Hash functions can be used simply as a checksum, or, in |
---|
7 | association with a public-key algorithm, can be used to implement |
---|
8 | digital signatures. |
---|
9 | |
---|
10 | The hashing modules here all support the interface described in PEP |
---|
11 | 247, "API for Cryptographic Hash Functions". |
---|
12 | |
---|
13 | Submodules: |
---|
14 | Crypto.Hash.HMAC RFC 2104: Keyed-Hashing for Message Authentication |
---|
15 | Crypto.Hash.MD2 |
---|
16 | Crypto.Hash.MD4 |
---|
17 | Crypto.Hash.MD5 |
---|
18 | Crypto.Hash.RIPEMD |
---|
19 | Crypto.Hash.SHA |
---|
20 | """ |
---|
21 | |
---|
22 | __all__ = ['HMAC', 'MD2', 'MD4', 'MD5', 'RIPEMD', 'SHA', 'SHA256'] |
---|
23 | __revision__ = "$Id: __init__.py,v 1.6 2003/12/19 14:24:25 akuchling Exp $" |
---|
24 | |
---|