| 1 | """Hashing algorithms |
|---|
| 2 | |
|---|
| 3 | Hash functions take arbitrary strings as input, and produce an output |
|---|
| 4 | of fixed size that is dependent on the input; it should never be |
|---|
| 5 | possible to derive the input data given only the hash function's |
|---|
| 6 | output. Hash functions can be used simply as a checksum, or, in |
|---|
| 7 | association with a public-key algorithm, can be used to implement |
|---|
| 8 | digital signatures. |
|---|
| 9 | |
|---|
| 10 | The hashing modules here all support the interface described in PEP |
|---|
| 11 | 247, "API for Cryptographic Hash Functions". |
|---|
| 12 | |
|---|
| 13 | Submodules: |
|---|
| 14 | Crypto.Hash.HMAC RFC 2104: Keyed-Hashing for Message Authentication |
|---|
| 15 | Crypto.Hash.MD2 |
|---|
| 16 | Crypto.Hash.MD4 |
|---|
| 17 | Crypto.Hash.MD5 |
|---|
| 18 | Crypto.Hash.RIPEMD |
|---|
| 19 | Crypto.Hash.SHA |
|---|
| 20 | """ |
|---|
| 21 | |
|---|
| 22 | __all__ = ['HMAC', 'MD2', 'MD4', 'MD5', 'RIPEMD', 'SHA', 'SHA256'] |
|---|
| 23 | __revision__ = "$Id: __init__.py,v 1.6 2003/12/19 14:24:25 akuchling Exp $" |
|---|
| 24 | |
|---|