Home
last modified time | relevance | path

Searched refs:rounds (Results 1 – 15 of 15) sorted by relevance

/mbedtls-3.5.0/library/
Daesce.c94 int rounds) in aesce_encrypt_block() argument
96 for (int i = 0; i < rounds - 1; i++) { in aesce_encrypt_block()
106 block = vaeseq_u8(block, vld1q_u8(keys + (rounds -1) * 16)); in aesce_encrypt_block()
111 block = veorq_u8(block, vld1q_u8(keys + rounds * 16)); in aesce_encrypt_block()
118 int rounds) in aesce_decrypt_block() argument
121 for (int i = 0; i < rounds - 1; i++) { in aesce_decrypt_block()
141 block = vaesdq_u8(block, vld1q_u8(keys + (rounds - 1) * 16)); in aesce_decrypt_block()
144 block = veorq_u8(block, vld1q_u8(keys + rounds * 16)); in aesce_decrypt_block()
Dhmac_drbg.c60 unsigned char rounds = (additional != NULL && add_len != 0) ? 2 : 1; in mbedtls_hmac_drbg_update() local
65 for (sep[0] = 0; sep[0] < rounds; sep[0]++) { in mbedtls_hmac_drbg_update()
78 if (rounds == 2) { in mbedtls_hmac_drbg_update()
Dbignum.c2266 static int mpi_miller_rabin(const mbedtls_mpi *X, size_t rounds, in mpi_miller_rabin() argument
2290 for (i = 0; i < rounds; i++) { in mpi_miller_rabin()
2358 int mbedtls_mpi_is_prime_ext(const mbedtls_mpi *X, int rounds, in mbedtls_mpi_is_prime_ext() argument
2388 return mpi_miller_rabin(&XX, rounds, f_rng, p_rng); in mbedtls_mpi_is_prime_ext()
2411 int rounds; in mbedtls_mpi_gen_prime() local
2430 rounds = ((nbits >= 1300) ? 2 : (nbits >= 850) ? 3 : in mbedtls_mpi_gen_prime()
2438 rounds = ((nbits >= 1450) ? 4 : (nbits >= 1150) ? 5 : in mbedtls_mpi_gen_prime()
2458 ret = mbedtls_mpi_is_prime_ext(X, rounds, f_rng, p_rng); in mbedtls_mpi_gen_prime()
2490 (ret = mpi_miller_rabin(X, rounds, f_rng, p_rng)) in mbedtls_mpi_gen_prime()
2492 (ret = mpi_miller_rabin(&Y, rounds, f_rng, p_rng)) in mbedtls_mpi_gen_prime()
/mbedtls-3.5.0/tests/suites/
Dtest_suite_mps.data7 MPS Reader: Single step, multiple rounds, pausing disabled
10 MPS Reader: Single step, multiple rounds, pausing enabled but unused
19 MPS Reader: Multiple steps, multiple rounds, pausing disabled
22 MPS Reader: Multiple steps, multiple rounds, pausing enabled but unused
Dtest_suite_random.function51 /* The two rounds must generate different random data. */
91 /* The two rounds must generate different random data. */
118 /* The two rounds must generate different random data. */
142 /* The two rounds must generate different random data. */
Dtest_suite_psa_crypto_pake.data105 PSA PAKE: check rounds w/o forced errors
109 PSA PAKE: check rounds w/o forced errors, TLS12_PRF
113 PSA PAKE: check rounds, key is destroyed after being passed to set_password_key
117 PSA PAKE: check rounds w/o forced errors, client input first
Dtest_suite_bignum.function1101 int chunk_len, int rounds)
1113 res = mbedtls_mpi_is_prime_ext(&X, rounds - 1,
1122 res = mbedtls_mpi_is_prime_ext(&X, rounds,
Dtest_suite_psa_crypto_driver_wrappers.data861 PSA PAKE: ecjpake rounds transparent driver: in-driver success
865 PSA PAKE: ecjpake rounds transparent driver: fallback success
Dtest_suite_mps.function75 /* This test exercises multiple rounds of the basic use of the MPS reader:
/mbedtls-3.5.0/include/mbedtls/
Dbignum.h1019 int mbedtls_mpi_is_prime_ext(const mbedtls_mpi *X, int rounds,
/mbedtls-3.5.0/
DCONTRIBUTING.md27 …erged and published. Contributions may need some modifications, so a few rounds of review and fixi…
DChangeLog1610 * Remove the zeroization of a pointer variable in AES rounds. It was valid
2463 * Fix mbedtls_mpi_is_prime() to use more rounds of probabilistic testing. The
2464 previous settings for the number of rounds made it practical for an
2469 For example, the number of rounds was enough to securely generate RSA key
2514 Miller-Rabin rounds.
/mbedtls-3.5.0/docs/architecture/
Dtls13-support.md207 work to reduce review rounds and the number of comments in each round. They
/mbedtls-3.5.0/docs/
D3.0-migration-guide.md165 number of Miller-Rabin rounds.
/mbedtls-3.5.0/docs/proposed/
Dpsa-driver-interface.md595 3. If the second round does not collect enough entropy, the core makes more similar rounds, until t…