[3] | 1 | """Hashing algorithms |
---|
| 2 | |
---|
| 3 | Hash functions take arbitrary strings as input, and produce an output |
---|
| 4 | of fixed size that is dependent on the input; it should never be |
---|
| 5 | possible to derive the input data given only the hash function's |
---|
| 6 | output. Hash functions can be used simply as a checksum, or, in |
---|
| 7 | association with a public-key algorithm, can be used to implement |
---|
| 8 | digital signatures. |
---|
| 9 | |
---|
| 10 | The hashing modules here all support the interface described in PEP |
---|
| 11 | 247, "API for Cryptographic Hash Functions". |
---|
| 12 | |
---|
| 13 | Submodules: |
---|
| 14 | Crypto.Hash.HMAC RFC 2104: Keyed-Hashing for Message Authentication |
---|
| 15 | Crypto.Hash.MD2 |
---|
| 16 | Crypto.Hash.MD4 |
---|
| 17 | Crypto.Hash.MD5 |
---|
| 18 | Crypto.Hash.RIPEMD |
---|
| 19 | Crypto.Hash.SHA |
---|
| 20 | """ |
---|
| 21 | |
---|
| 22 | __all__ = ['HMAC', 'MD2', 'MD4', 'MD5', 'RIPEMD', 'SHA', 'SHA256'] |
---|
| 23 | __revision__ = "$Id: __init__.py,v 1.6 2003/12/19 14:24:25 akuchling Exp $" |
---|
| 24 | |
---|