HomeSort by relevance Sort by last modified time
    Searched refs:FIPS (Results 1 - 25 of 30) sorted by null

1 2

  /prebuilts/go/darwin-x86/src/crypto/dsa/
dsa.go 5 // Package dsa implements the Digital Signature Algorithm, as defined in FIPS 186-3.
33 // FIPS is quite strict about the format of DSA keys, but other code may be
39 // in a set of DSA parameters. See FIPS 186-3, section 4.2.
50 // pick the largest recommended number from table C.1 of FIPS 186-3.
56 // This function doesn't follow FIPS 186-3 exactly in that it doesn't
191 // Note that FIPS 186-3 section 4.6 specifies that the hash should be truncated
195 // FIPS 186-3, section 4.6
246 // Note that FIPS 186-3 section 4.6 specifies that the hash should be truncated
250 // FIPS 186-3, section 4.7
  /prebuilts/go/linux-x86/src/crypto/dsa/
dsa.go 5 // Package dsa implements the Digital Signature Algorithm, as defined in FIPS 186-3.
33 // FIPS is quite strict about the format of DSA keys, but other code may be
39 // in a set of DSA parameters. See FIPS 186-3, section 4.2.
50 // pick the largest recommended number from table C.1 of FIPS 186-3.
56 // This function doesn't follow FIPS 186-3 exactly in that it doesn't
191 // Note that FIPS 186-3 section 4.6 specifies that the hash should be truncated
195 // FIPS 186-3, section 4.6
246 // Note that FIPS 186-3 section 4.6 specifies that the hash should be truncated
250 // FIPS 186-3, section 4.7
  /external/vboot_reference/firmware/include/
tss_constants.h 77 TSS_BOOL FIPS;
  /prebuilts/go/darwin-x86/src/crypto/aes/
aes_test.go 74 // the cut and paste from the FIPS PDF worked.
124 // Test vectors are from FIPS 197:
125 // http://www.csrc.nist.gov/publications/fips/fips197/fips-197.pdf
127 // Appendix A of FIPS 197: Key expansion examples
131 dec []uint32 // decryption expansion; not in FIPS 197, computed from C implementation.
215 // Test key expansion against FIPS 197 examples.
245 // Appendix B, C of FIPS 197: Cipher examples, Example vectors.
283 // Test encryptBlock against FIPS 197 examples.
301 // Test decryptBlock against FIPS 197 examples
    [all...]
block.go 32 // See FIPS 197 for specification, and see Daemen and Rijmen's Rijndael submission
34 // http://www.csrc.nist.gov/publications/fips/fips197/fips-197.pdf
140 // Key expansion algorithm. See FIPS-197, Figure 11.
const.go 11 // http://www.csrc.nist.gov/publications/fips/fips197/fips-197.pdf
40 // FIPS-197 Figure 7. S-box substitution values in hexadecimal format.
60 // FIPS-197 Figure 14. Inverse S-box substitution values in hexadecimal format.
  /prebuilts/go/linux-x86/src/crypto/aes/
aes_test.go 74 // the cut and paste from the FIPS PDF worked.
124 // Test vectors are from FIPS 197:
125 // http://www.csrc.nist.gov/publications/fips/fips197/fips-197.pdf
127 // Appendix A of FIPS 197: Key expansion examples
131 dec []uint32 // decryption expansion; not in FIPS 197, computed from C implementation.
215 // Test key expansion against FIPS 197 examples.
245 // Appendix B, C of FIPS 197: Cipher examples, Example vectors.
283 // Test encryptBlock against FIPS 197 examples.
301 // Test decryptBlock against FIPS 197 examples
    [all...]
block.go 32 // See FIPS 197 for specification, and see Daemen and Rijmen's Rijndael submission
34 // http://www.csrc.nist.gov/publications/fips/fips197/fips-197.pdf
140 // Key expansion algorithm. See FIPS-197, Figure 11.
  /prebuilts/go/darwin-x86/src/crypto/elliptic/
elliptic.go 341 // See FIPS 186-3, section D.2.4
352 // See FIPS 186-3, section D.2.5
362 // P256 returns a Curve which implements P-256 (see FIPS 186-3, section D.2.3)
368 // P384 returns a Curve which implements P-384 (see FIPS 186-3, section D.2.4)
374 // P521 returns a Curve which implements P-521 (see FIPS 186-3, section D.2.5)
p224.go 7 // This is a constant-time, 32-bit implementation of P224. See FIPS 186-3,
24 // See FIPS 186-3, section D.2.2
38 // P224 returns a Curve which implements P-224 (see FIPS 186-3, section D.2.2)
500 // group with a = -3 defined in FIPS 186-3, section D.2.2.
  /prebuilts/go/linux-x86/src/crypto/elliptic/
elliptic.go 341 // See FIPS 186-3, section D.2.4
352 // See FIPS 186-3, section D.2.5
362 // P256 returns a Curve which implements P-256 (see FIPS 186-3, section D.2.3)
368 // P384 returns a Curve which implements P-384 (see FIPS 186-3, section D.2.4)
374 // P521 returns a Curve which implements P-521 (see FIPS 186-3, section D.2.5)
p224.go 7 // This is a constant-time, 32-bit implementation of P224. See FIPS 186-3,
24 // See FIPS 186-3, section D.2.2
38 // P224 returns a Curve which implements P-224 (see FIPS 186-3, section D.2.2)
500 // group with a = -3 defined in FIPS 186-3, section D.2.2.
  /prebuilts/go/darwin-x86/src/crypto/hmac/
hmac.go 29 // FIPS 198:
30 // http://csrc.nist.gov/publications/fips/fips198/fips-198a.pdf
  /prebuilts/go/darwin-x86/src/crypto/sha256/
sha256.go 6 // in FIPS 180-4.
sha256_test.go 5 // SHA256 hash algorithm. See FIPS 180-2.
  /prebuilts/go/linux-x86/src/crypto/hmac/
hmac.go 29 // FIPS 198:
30 // http://csrc.nist.gov/publications/fips/fips198/fips-198a.pdf
  /prebuilts/go/linux-x86/src/crypto/sha256/
sha256.go 6 // in FIPS 180-4.
sha256_test.go 5 // SHA256 hash algorithm. See FIPS 180-2.
  /prebuilts/go/darwin-x86/src/crypto/ecdsa/
ecdsa.go 6 // defined in FIPS 186-3.
14 // [NSA]: Suite B implementer's guide to FIPS 186-3,
  /prebuilts/go/linux-x86/src/crypto/ecdsa/
ecdsa.go 6 // defined in FIPS 186-3.
14 // [NSA]: Suite B implementer's guide to FIPS 186-3,
  /prebuilts/go/darwin-x86/src/crypto/sha512/
sha512.go 6 // hash algorithms as defined in FIPS 180-4.
sha512_test.go 5 // SHA512 hash algorithm. See FIPS 180-4.
  /prebuilts/go/linux-x86/src/crypto/sha512/
sha512.go 6 // hash algorithms as defined in FIPS 180-4.
sha512_test.go 5 // SHA512 hash algorithm. See FIPS 180-4.
  /external/vboot_reference/utility/
tpmc.c 295 P(FIPS);

Completed in 430 milliseconds

1 2