Searched refs:bits (Results 1 – 8 of 8) sorted by relevance
1245 NX_CRYPTO_KEEP UINT _nx_crypto_drbg(UINT bits, UCHAR *result) in _nx_crypto_drbg() argument1251 bytes = (bits + 7) >> 3; in _nx_crypto_drbg()1269 bits = bits & 7; in _nx_crypto_drbg()1270 if (bits) in _nx_crypto_drbg()1272 mask = (UINT)((1 << bits) - 1); in _nx_crypto_drbg()
1788 NX_CRYPTO_KEEP UINT _nx_crypto_huge_number_rbg(UINT bits, UCHAR *result) in _nx_crypto_huge_number_rbg() argument1795 while (bits >= 32) in _nx_crypto_huge_number_rbg()1804 bits -= 32; in _nx_crypto_huge_number_rbg()1808 if (bits == 0) in _nx_crypto_huge_number_rbg()1819 temp = (bits + 7) >> 3; in _nx_crypto_huge_number_rbg()1843 bits = bits & 7; in _nx_crypto_huge_number_rbg()1844 if (bits) in _nx_crypto_huge_number_rbg()1846 mask = (UINT)((1 << bits) - 1); in _nx_crypto_huge_number_rbg()
3153 UINT bits = curve -> nx_crypto_ec_bits + 64; in _nx_crypto_ec_key_pair_generation_extra() local3154 UINT buffer_size = (bits + 7) >> 3; in _nx_crypto_ec_key_pair_generation_extra()3162 status = NX_CRYPTO_RBG(bits, (UCHAR *)scratch); in _nx_crypto_ec_key_pair_generation_extra()3352 UINT bits, in _nx_crypto_ec_precomputation() argument3382 fixed_points -> nx_crypto_ec_fixed_points_bits = bits; in _nx_crypto_ec_precomputation()3383 fixed_points -> nx_crypto_ec_fixed_points_d = (bits + window_width - 1) / window_width; in _nx_crypto_ec_precomputation()
197 UINT _nx_crypto_drbg(UINT bits, UCHAR *result);
109 UINT _nx_crypto_drbg(UINT bits, UCHAR *result);
173 UINT _nx_crypto_huge_number_rbg(UINT bits, UCHAR *result);
560 UINT bits,
1583 …_tcp_socket_state_ack_check.c Corrected the processing procedure for SYN/ACK bits.4066 nx_crypto_ecjpake.c Generated key pair using extra bits.4071 … nx_crypto_rsa.h Modified to support RSA 4096 bits by default.