Searched refs:Symmetric (Results 1 – 14 of 14) sorted by relevance
72 if(sym == Symmetric) header += " symmetric"; in putMarketHeader()79 if(sym == Symmetric) header += " symmetric"; in putMarketHeader()126 if(substr[4].compare("symmetric") == 0) sym = Symmetric; in getMarketHeader()
185 Symmetric=0x20 enumerator
538 pardisoInit(Base::ScalarIsComplex ? ( bool(Options&Symmetric) ? 6 : -4 ) : -2);544 pardisoInit(Base::ScalarIsComplex ? ( bool(Options&Symmetric) ? 6 : -4 ) : -2);
383 Concrete Security Treatment of Symmetric Encryption:
2651 Concrete Treatment of Symmetric Encryption: Analysis of DES
64 # == Symmetric Approximate Minimum Degree (AMD)
620 \subsection QuickRef_SelfadjointMatrix Symmetric/selfadjoint views
356 TPMI_ALG_SYM (Symmetric Algorithms) ...............................................................…491 11.1 Symmetric ....................................................................................…790 Symmetric .........................................................................................…1095 Table 220 — Defines for Symmetric Algorithm Constants .............................................…9972 9.24 TPMI_ALG_SYM (Symmetric Algorithms)12407 11.1 Symmetric15128 The method of generating the key and IV is described in “Protected Storage” subclause “Symmetric17344 Symmetric17347 Table 220 — Defines for Symmetric Algorithm Constants
356 TPMI_ALG_SYM (Symmetric Algorithms) ...............................................................…491 11.1 Symmetric ....................................................................................…790 Symmetric .........................................................................................…1095 Table 220 — Defines for Symmetric Algorithm Constants .............................................…9985 9.24 TPMI_ALG_SYM (Symmetric Algorithms)12432 11.1 Symmetric15106 The method of generating the key and IV is described in “Protected Storage” subclause “Symmetric17310 Symmetric17313 Table 220 — Defines for Symmetric Algorithm Constants
265 Symmetric Primitives ..............................................................................…665 Table 55 — Symmetric Chaining Process .............................................................…9960 Symmetric Primitives9984 Table 55 — Symmetric Chaining Process15927 Symmetric “signing” is done with an HMAC.
265 Symmetric Primitives ..............................................................................…665 Table 55 — Symmetric Chaining Process .............................................................…9949 Symmetric Primitives9973 Table 55 — Symmetric Chaining Process15916 Symmetric “signing” is done with an HMAC.
686 …10.2.7 Symmetric Functions .......................................................................…7923 916 TPMT_SYM_DEF_OBJECT *symDef, // IN: Symmetric key definition. If…8071 1038 TPMT_SYM_DEF_OBJECT *symDef, // IN: Symmetric key definition. I…21447 10.2.7 Symmetric Functions21474 1405 // Symmetric key size in byte21515 1440 // Symmetric key size in bytes22911 2532 // Symmetric object common checks24714 From TCG Algorithm Registry: Table 17 - Defines for AES Symmetric Cipher Algorithm Constants24723 From TCG Algorithm Registry: Table 18 - Defines for SM4 Symmetric Cipher Algorithm Constants24732 … From TCG Algorithm Registry: Table 19 - Defines for CAMELLIA Symmetric Cipher Algorithm Constants
140 15 Symmetric Primitives .........................................................................…347 Table 55 — Symmetric Chaining Process .............................................................…5760 15 Symmetric Primitives5780 Table 55 — Symmetric Chaining Process8881 NOTE 1 Symmetric “signing” is done with the TPM HMAC commands.
1940 Symmetric to the client's upload stream, server will send data after