On Sun, Oct 19, 2025 at 05:50:24PM -0700, Eric Biggers wrote: > +The SHA-3 algorithm base, as specified in NIST FIPS-202[1], provides a number > +of specific variants all based on the same basic algorithm (the Keccak sponge > +function and permutation). The differences between them are: the "rate" (how > +much of the common state buffer gets updated with new data between invocations Use reST footnotes, like: ---- >8 ---- diff --git a/Documentation/crypto/sha3.rst b/Documentation/crypto/sha3.rst index c27da98c89b7f8..ae1fd3e01e34c2 100644 --- a/Documentation/crypto/sha3.rst +++ b/Documentation/crypto/sha3.rst @@ -18,7 +18,7 @@ SHA-3 Algorithm collection Overview ======== -The SHA-3 algorithm base, as specified in NIST FIPS-202[1], provides a number +The SHA-3 algorithm base, as specified in NIST FIPS-202 [1]_, provides a number of specific variants all based on the same basic algorithm (the Keccak sponge function and permutation). The differences between them are: the "rate" (how much of the common state buffer gets updated with new data between invocations @@ -136,7 +136,7 @@ should use the much more comprehensive KUnit test suite instead. References ========== -[1] https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.202.pdf +.. [1] https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.202.pdf > +If selectable algorithms are required then the crypto_hash API may be used > +instead as this binds each algorithm to a specific C type. What is crypto_hash API then? I can't find any of its documentation beside being mentioned here. -- An old man doll... just what I always wanted! - Clara