Lines Matching refs:compliant
492 cipher descriptors may require to be called for resource management purposes. To be compliant, all functions which call a cipher
594 For a plugin to be compliant it must provide at least each function listed before the accelerators begin. Accelerators are optional,
3278 PK\_PRIVATE type.} in the form of a RSAPrivateKey (PKCS \#1 compliant). The second type, is a public RSA key which only includes the modulus and public exponent.
3279 It takes the form of a RSAPublicKey (PKCS \#1 compliant).
3850 ECC--DH Encryption is performed by producing a random key, hashing it, and XOR'ing the digest against the plaintext. It is not strictly ANSI X9.63 compliant
3941 The signature code is an implementation of X9.62 EC--DSA, and the output is compliant for GF(p) curves.