HomeSort by relevance Sort by last modified time
    Searched refs:FIPS (Results 1 - 25 of 36) sorted by null

1 2

  /prebuilts/go/darwin-x86/src/crypto/dsa/
dsa.go 5 // Package dsa implements the Digital Signature Algorithm, as defined in FIPS 186-3.
35 // FIPS is quite strict about the format of DSA keys, but other code may be
41 // in a set of DSA parameters. See FIPS 186-3, section 4.2.
52 // pick the largest recommended number from table C.1 of FIPS 186-3.
58 // This function doesn't follow FIPS 186-3 exactly in that it doesn't
191 // Note that FIPS 186-3 section 4.6 specifies that the hash should be truncated
198 // FIPS 186-3, section 4.6
260 // Note that FIPS 186-3 section 4.6 specifies that the hash should be truncated
264 // FIPS 186-3, section 4.7
  /prebuilts/go/linux-x86/src/crypto/dsa/
dsa.go 5 // Package dsa implements the Digital Signature Algorithm, as defined in FIPS 186-3.
35 // FIPS is quite strict about the format of DSA keys, but other code may be
41 // in a set of DSA parameters. See FIPS 186-3, section 4.2.
52 // pick the largest recommended number from table C.1 of FIPS 186-3.
58 // This function doesn't follow FIPS 186-3 exactly in that it doesn't
191 // Note that FIPS 186-3 section 4.6 specifies that the hash should be truncated
198 // FIPS 186-3, section 4.6
260 // Note that FIPS 186-3 section 4.6 specifies that the hash should be truncated
264 // FIPS 186-3, section 4.7
  /external/vboot_reference/firmware/include/
tss_constants.h 77 TSS_BOOL FIPS;
  /prebuilts/go/darwin-x86/src/crypto/aes/
aes_test.go 74 // the cut and paste from the FIPS PDF worked.
124 // Test vectors are from FIPS 197:
125 // http://www.csrc.nist.gov/publications/fips/fips197/fips-197.pdf
127 // Appendix A of FIPS 197: Key expansion examples
131 dec []uint32 // decryption expansion; not in FIPS 197, computed from C implementation.
215 // Test key expansion against FIPS 197 examples.
245 // Appendix B, C of FIPS 197: Cipher examples, Example vectors.
283 // Test Cipher Encrypt method against FIPS 197 examples.
302 // Test Cipher Decrypt against FIPS 197 examples
    [all...]
block.go 32 // See FIPS 197 for specification, and see Daemen and Rijmen's Rijndael submission
34 // http://www.csrc.nist.gov/publications/fips/fips197/fips-197.pdf
140 // Key expansion algorithm. See FIPS-197, Figure 11.
  /prebuilts/go/linux-x86/src/crypto/aes/
aes_test.go 74 // the cut and paste from the FIPS PDF worked.
124 // Test vectors are from FIPS 197:
125 // http://www.csrc.nist.gov/publications/fips/fips197/fips-197.pdf
127 // Appendix A of FIPS 197: Key expansion examples
131 dec []uint32 // decryption expansion; not in FIPS 197, computed from C implementation.
215 // Test key expansion against FIPS 197 examples.
245 // Appendix B, C of FIPS 197: Cipher examples, Example vectors.
283 // Test Cipher Encrypt method against FIPS 197 examples.
302 // Test Cipher Decrypt against FIPS 197 examples
    [all...]
block.go 32 // See FIPS 197 for specification, and see Daemen and Rijmen's Rijndael submission
34 // http://www.csrc.nist.gov/publications/fips/fips197/fips-197.pdf
140 // Key expansion algorithm. See FIPS-197, Figure 11.
  /prebuilts/go/darwin-x86/src/crypto/hmac/
hmac.go 29 // FIPS 198-1:
30 // http://csrc.nist.gov/publications/fips/fips198-1/FIPS-198-1_final.pdf
  /prebuilts/go/linux-x86/src/crypto/hmac/
hmac.go 29 // FIPS 198-1:
30 // http://csrc.nist.gov/publications/fips/fips198-1/FIPS-198-1_final.pdf
  /prebuilts/go/darwin-x86/src/crypto/elliptic/
elliptic.go 348 // See FIPS 186-3, section D.2.4
359 // See FIPS 186-3, section D.2.5
369 // P256 returns a Curve which implements P-256 (see FIPS 186-3, section D.2.3)
377 // P384 returns a Curve which implements P-384 (see FIPS 186-3, section D.2.4)
385 // P521 returns a Curve which implements P-521 (see FIPS 186-3, section D.2.5)
p224.go 7 // This is a constant-time, 32-bit implementation of P224. See FIPS 186-3,
24 // See FIPS 186-3, section D.2.2
38 // P224 returns a Curve which implements P-224 (see FIPS 186-3, section D.2.2).
502 // group with a = -3 defined in FIPS 186-3, section D.2.2.
  /prebuilts/go/linux-x86/src/crypto/elliptic/
elliptic.go 348 // See FIPS 186-3, section D.2.4
359 // See FIPS 186-3, section D.2.5
369 // P256 returns a Curve which implements P-256 (see FIPS 186-3, section D.2.3)
377 // P384 returns a Curve which implements P-384 (see FIPS 186-3, section D.2.4)
385 // P521 returns a Curve which implements P-521 (see FIPS 186-3, section D.2.5)
p224.go 7 // This is a constant-time, 32-bit implementation of P224. See FIPS 186-3,
24 // See FIPS 186-3, section D.2.2
38 // P224 returns a Curve which implements P-224 (see FIPS 186-3, section D.2.2).
502 // group with a = -3 defined in FIPS 186-3, section D.2.2.
  /prebuilts/go/darwin-x86/src/crypto/sha256/
sha256.go 6 // in FIPS 180-4.
sha256_test.go 5 // SHA256 hash algorithm. See FIPS 180-2.
  /prebuilts/go/linux-x86/src/crypto/sha256/
sha256.go 6 // in FIPS 180-4.
sha256_test.go 5 // SHA256 hash algorithm. See FIPS 180-2.
  /prebuilts/go/darwin-x86/src/crypto/ecdsa/
ecdsa.go 6 // defined in FIPS 186-3.
14 // [NSA]: Suite B implementer's guide to FIPS 186-3,
  /prebuilts/go/linux-x86/src/crypto/ecdsa/
ecdsa.go 6 // defined in FIPS 186-3.
14 // [NSA]: Suite B implementer's guide to FIPS 186-3,
  /prebuilts/go/darwin-x86/src/crypto/sha512/
sha512.go 6 // hash algorithms as defined in FIPS 180-4.
sha512_test.go 5 // SHA512 hash algorithm. See FIPS 180-4.
  /prebuilts/go/linux-x86/src/crypto/sha512/
sha512.go 6 // hash algorithms as defined in FIPS 180-4.
sha512_test.go 5 // SHA512 hash algorithm. See FIPS 180-4.
  /external/vboot_reference/utility/
tpmc.c 295 P(FIPS);
  /prebuilts/go/darwin-x86/src/math/big/
prime.go 19 // and FIPS 186-4 Appendix F for further discussion of the error probabilities.

Completed in 3304 milliseconds

1 2