File tree Expand file tree Collapse file tree 1 file changed +6
-6
lines changed Expand file tree Collapse file tree 1 file changed +6
-6
lines changed Original file line number Diff line number Diff line change 2
2
//!
3
3
//! There are 6 standard algorithms specified in the SHA-2 standard:
4
4
//!
5
- //! * `Sha224`, which is the 32-bit `Sha256` algorithm with the result truncated
5
+ //! * `Sha224`, which is the 8 x 32-bit `Sha256` algorithm with the result truncated
6
6
//! to 224 bits.
7
- //! * `Sha256`, which is the 32-bit `Sha256` algorithm.
8
- //! * `Sha384`, which is the 64-bit `Sha512` algorithm with the result truncated
7
+ //! * `Sha256`, which is the 8 x 32-bit `Sha256` algorithm.
8
+ //! * `Sha384`, which is the 8 x 64-bit `Sha512` algorithm with the result truncated
9
9
//! to 384 bits.
10
- //! * `Sha512`, which is the 64-bit `Sha512` algorithm.
11
- //! * `Sha512Trunc224`, which is the 64-bit `Sha512` algorithm with the result
10
+ //! * `Sha512`, which is the 8 x 64-bit `Sha512` algorithm.
11
+ //! * `Sha512Trunc224`, which is the 8 x 64-bit `Sha512` algorithm with the result
12
12
//! truncated to 224 bits.
13
- //! * `Sha512Trunc256`, which is the 64-bit `Sha512` algorithm with the result
13
+ //! * `Sha512Trunc256`, which is the 8 x 64-bit `Sha512` algorithm with the result
14
14
//! truncated to 256 bits.
15
15
//!
16
16
//! Algorithmically, there are only 2 core algorithms: `Sha256` and `Sha512`.
You can’t perform that action at this time.
0 commit comments