Searched refs:ECC (Results 1 – 25 of 54) sorted by relevance
123
21 ECC = 4 variable35 'ECC' : ECC,
48 Linux/ECC Use the Intel ECC compiler on Linux201 Linux/ECC)
595 ECC ...............................................................................................…784 ECC ...............................................................................................…815 Table 8 — Definition of (UINT16) {ECC} TPM_ECC_CURVE Constants <IN/OUT, S> ........................…938 Table 103 — Definition of {ECC} TPML_ECC_CURVE Structure <OUT> ....................................…988 Table 140 — Definition of {ECC} Types for ECC_SIG_SCHEMES..........................................…989 Table 141 — Definition of {ECC} TPMS_SCHEME_ECDAA Structure .......................................…993 Table 145 — Definition of {ECC} TPMS_SCHEME_ECDH Structure ........................................…995 Table 147 — Definition of {ECC} TPMS_SCHEME_KDF1_SP800_56a Structure ..............................…1024 Table 162 — Definition of {ECC} TPM2B_ECC_PARAMETER Structure .....................................…1025 Table 163 — Definition of {ECC} TPMS_ECC_POINT Structure ..........................................…[all …]
592 _COMMENT Handle of a loaded ECC key public area. Auth Index: None617 _COMMENT handle of a loaded ECC key Auth Index: 1 Auth Role: USER653 _COMMENT ECC parameters for the selected curve661 _COMMENT TPM_CC_ZGen_2Phase handle of an unrestricted decryption key ECC The private key referenced…1206 _COMMENT ECC point K ≔ [ds](x2, y2)1209 _COMMENT ECC point L ≔ [r](x2, y2)1212 _COMMENT ECC point E ≔ [r]P1
3572 b) tpmKey references an ECC key and encryptedSalt3577 When ECC is used, the point multiply process produces a value (Z) that is used in a KDF to4245 5) If the key is an ECC key and the scheme required by the curveID is not the same as scheme in4247 6) If the key is an ECC key and the KDF required by the curveID is not the same as kdf in the pubic4252 ECC decryption key. Since there is no use for this capability, the reference implementation4513 parameters for an RSA key; unsupported name algorithm for an ECC4750 For an ECC key, the public point shall be f(x) where x is the private key.5147 For an ECC object, the TPM will verify that the public key is on the curve of the key before the pu…5851 secret is invalid (when keyHandle is an ECC key)5855 secret is invalid (when keyHandle is an ECC key)[all …]
3572 b) tpmKey references an ECC key and encryptedSalt3577 When ECC is used, the point multiply process produces a value (Z) that is used in a KDF to4247 5) If the key is an ECC key and the scheme required by the curveID is not the same as scheme in4249 6) If the key is an ECC key and the KDF required by the curveID is not the same as kdf in the pubic4254 ECC decryption key. Since there is no use for this capability, the reference implementation4515 parameters for an RSA key; unsupported name algorithm for an ECC4752 For an ECC key, the public point shall be f(x) where x is the private key.5149 For an ECC object, the TPM will verify that the public key is on the curve of the key before the pu…5853 secret is invalid (when keyHandle is an ECC key)5857 secret is invalid (when keyHandle is an ECC key)[all …]
133 "COMODO ECC Certification Authority",163 "AffirmTrust Premium ECC",273 "GlobalSign ECC Root CA - R4",275 "GlobalSign ECC Root CA - R5",279 "USERTrust ECC Certification Authority",305 "CA WoSign ECC Root"
523 EnumCustomCopy ECC; member
950 1ECC=004F 0323962 1ED8=1ECC 03021879 2F819>4ECC
841 1ECC>1ECD5247 2F819>4ECC
192 ** Bug-fix release. IA-64 unwinder can now be built with Intel compiler (ECC).
2310 b) tpmKey references an ECC key and encryptedSalt2314 …NOTE 3 When ECC is used, the point multiply process produces a value (Z) that is used in…2690 5) If the key is an ECC key and the scheme required by the curveID is not the same as scheme in2692 …6) If the key is an ECC key and the KDF required by the curveID is not the same as kdf in the pubic2696 … ECC decryption key. Since there is no use for this capability, the reference implementation2835 parameters for an RSA key; unsupported name algorithm for an ECC2971 EXAMPLE 3 For an ECC key, the public point shall be f(x) where x is the private key.3179 NOTE 6 For an ECC object, the TPM will verify that the public key is on the curve of the k…3558 TPM_RC_ECC_POINT secret is invalid (when keyHandle is an ECC key)3559 TPM_RC_INSUFFICIENT secret is invalid (when keyHandle is an ECC key)[all …]
668 …10.2.6 ECC Functions .............................................................................…767 …B.3.5.1. ECC-related Structures ..............................................................…6173 generate r value (for an ECC key)7160 313 // Special checks for an ECC key17594 … for RSA and ECC keys18770 373 // number of loaded ECC curves20790 10.2.6 ECC Functions20828 This macro returns the size of the ECC key in bytes. It uses CryptEccGetKeySizeInBits().20837 … This function returns a pointer to an ECC curve parameter. The parameter is selected by a single20907 This function will validate that an ECC point is on the curve of given curveID.[all …]
1593 COMODO ECC Certification Authority2100 AffirmTrust Premium ECC
1788 COMODO ECC Certification Authority2977 AffirmTrust Premium ECC
1008 1ECC; 1ECD; MAP
975 1ECC; 1ECD; MAP
1007 1ECC; 1ECD; MAP
998 1ECC; 1ECD; MAP
204 仌 > bīng; #4ECC4192 廌 > jiàn; #5ECC8170 滌 > dí; #6ECC12126 绌 > zhúo; #7ECC16127 軌 > gŭi; #8ECC20124 黌 > héng; #9ECC