OpenGrok
Home
Sort by relevance
Sort by last modified time
Full Search
Definition
Symbol
File Path
History
|
|
Help
Searched
refs:FIPS
(Results
1 - 25
of
30
) sorted by null
1
2
/prebuilts/go/darwin-x86/src/crypto/dsa/
dsa.go
5
// Package dsa implements the Digital Signature Algorithm, as defined in
FIPS
186-3.
33
//
FIPS
is quite strict about the format of DSA keys, but other code may be
39
// in a set of DSA parameters. See
FIPS
186-3, section 4.2.
50
// pick the largest recommended number from table C.1 of
FIPS
186-3.
56
// This function doesn't follow
FIPS
186-3 exactly in that it doesn't
191
// Note that
FIPS
186-3 section 4.6 specifies that the hash should be truncated
195
//
FIPS
186-3, section 4.6
246
// Note that
FIPS
186-3 section 4.6 specifies that the hash should be truncated
250
//
FIPS
186-3, section 4.7
/prebuilts/go/linux-x86/src/crypto/dsa/
dsa.go
5
// Package dsa implements the Digital Signature Algorithm, as defined in
FIPS
186-3.
33
//
FIPS
is quite strict about the format of DSA keys, but other code may be
39
// in a set of DSA parameters. See
FIPS
186-3, section 4.2.
50
// pick the largest recommended number from table C.1 of
FIPS
186-3.
56
// This function doesn't follow
FIPS
186-3 exactly in that it doesn't
191
// Note that
FIPS
186-3 section 4.6 specifies that the hash should be truncated
195
//
FIPS
186-3, section 4.6
246
// Note that
FIPS
186-3 section 4.6 specifies that the hash should be truncated
250
//
FIPS
186-3, section 4.7
/external/vboot_reference/firmware/include/
tss_constants.h
77
TSS_BOOL
FIPS
;
/prebuilts/go/darwin-x86/src/crypto/aes/
aes_test.go
74
// the cut and paste from the
FIPS
PDF worked.
124
// Test vectors are from
FIPS
197:
125
// http://www.csrc.nist.gov/publications/
fips
/fips197/
fips
-197.pdf
127
// Appendix A of
FIPS
197: Key expansion examples
131
dec []uint32 // decryption expansion; not in
FIPS
197, computed from C implementation.
215
// Test key expansion against
FIPS
197 examples.
245
// Appendix B, C of
FIPS
197: Cipher examples, Example vectors.
283
// Test encryptBlock against
FIPS
197 examples.
301
// Test decryptBlock against
FIPS
197 examples
[
all
...]
block.go
32
// See
FIPS
197 for specification, and see Daemen and Rijmen's Rijndael submission
34
// http://www.csrc.nist.gov/publications/
fips
/fips197/
fips
-197.pdf
140
// Key expansion algorithm. See
FIPS
-197, Figure 11.
const.go
11
// http://www.csrc.nist.gov/publications/
fips
/fips197/
fips
-197.pdf
40
//
FIPS
-197 Figure 7. S-box substitution values in hexadecimal format.
60
//
FIPS
-197 Figure 14. Inverse S-box substitution values in hexadecimal format.
/prebuilts/go/linux-x86/src/crypto/aes/
aes_test.go
74
// the cut and paste from the
FIPS
PDF worked.
124
// Test vectors are from
FIPS
197:
125
// http://www.csrc.nist.gov/publications/
fips
/fips197/
fips
-197.pdf
127
// Appendix A of
FIPS
197: Key expansion examples
131
dec []uint32 // decryption expansion; not in
FIPS
197, computed from C implementation.
215
// Test key expansion against
FIPS
197 examples.
245
// Appendix B, C of
FIPS
197: Cipher examples, Example vectors.
283
// Test encryptBlock against
FIPS
197 examples.
301
// Test decryptBlock against
FIPS
197 examples
[
all
...]
block.go
32
// See
FIPS
197 for specification, and see Daemen and Rijmen's Rijndael submission
34
// http://www.csrc.nist.gov/publications/
fips
/fips197/
fips
-197.pdf
140
// Key expansion algorithm. See
FIPS
-197, Figure 11.
/prebuilts/go/darwin-x86/src/crypto/elliptic/
elliptic.go
341
// See
FIPS
186-3, section D.2.4
352
// See
FIPS
186-3, section D.2.5
362
// P256 returns a Curve which implements P-256 (see
FIPS
186-3, section D.2.3)
368
// P384 returns a Curve which implements P-384 (see
FIPS
186-3, section D.2.4)
374
// P521 returns a Curve which implements P-521 (see
FIPS
186-3, section D.2.5)
p224.go
7
// This is a constant-time, 32-bit implementation of P224. See
FIPS
186-3,
24
// See
FIPS
186-3, section D.2.2
38
// P224 returns a Curve which implements P-224 (see
FIPS
186-3, section D.2.2)
500
// group with a = -3 defined in
FIPS
186-3, section D.2.2.
/prebuilts/go/linux-x86/src/crypto/elliptic/
elliptic.go
341
// See
FIPS
186-3, section D.2.4
352
// See
FIPS
186-3, section D.2.5
362
// P256 returns a Curve which implements P-256 (see
FIPS
186-3, section D.2.3)
368
// P384 returns a Curve which implements P-384 (see
FIPS
186-3, section D.2.4)
374
// P521 returns a Curve which implements P-521 (see
FIPS
186-3, section D.2.5)
p224.go
7
// This is a constant-time, 32-bit implementation of P224. See
FIPS
186-3,
24
// See
FIPS
186-3, section D.2.2
38
// P224 returns a Curve which implements P-224 (see
FIPS
186-3, section D.2.2)
500
// group with a = -3 defined in
FIPS
186-3, section D.2.2.
/prebuilts/go/darwin-x86/src/crypto/hmac/
hmac.go
29
//
FIPS
198:
30
// http://csrc.nist.gov/publications/
fips
/fips198/
fips
-198a.pdf
/prebuilts/go/darwin-x86/src/crypto/sha256/
sha256.go
6
// in
FIPS
180-4.
sha256_test.go
5
// SHA256 hash algorithm. See
FIPS
180-2.
/prebuilts/go/linux-x86/src/crypto/hmac/
hmac.go
29
//
FIPS
198:
30
// http://csrc.nist.gov/publications/
fips
/fips198/
fips
-198a.pdf
/prebuilts/go/linux-x86/src/crypto/sha256/
sha256.go
6
// in
FIPS
180-4.
sha256_test.go
5
// SHA256 hash algorithm. See
FIPS
180-2.
/prebuilts/go/darwin-x86/src/crypto/ecdsa/
ecdsa.go
6
// defined in
FIPS
186-3.
14
// [NSA]: Suite B implementer's guide to
FIPS
186-3,
/prebuilts/go/linux-x86/src/crypto/ecdsa/
ecdsa.go
6
// defined in
FIPS
186-3.
14
// [NSA]: Suite B implementer's guide to
FIPS
186-3,
/prebuilts/go/darwin-x86/src/crypto/sha512/
sha512.go
6
// hash algorithms as defined in
FIPS
180-4.
sha512_test.go
5
// SHA512 hash algorithm. See
FIPS
180-4.
/prebuilts/go/linux-x86/src/crypto/sha512/
sha512.go
6
// hash algorithms as defined in
FIPS
180-4.
sha512_test.go
5
// SHA512 hash algorithm. See
FIPS
180-4.
/external/vboot_reference/utility/
tpmc.c
295
P(
FIPS
);
Completed in 430 milliseconds
1
2