Home
last modified time | relevance | path

Searched refs:rounds (Results 1 – 15 of 15) sorted by relevance

/mbedtls-3.6.0/library/
Daesce.c130 int rounds) in aesce_encrypt_block() argument
133 if (rounds == 10) { in aesce_encrypt_block()
136 if (rounds == 12) { in aesce_encrypt_block()
192 int rounds) in aesce_decrypt_block() argument
195 if (rounds == 10) { in aesce_decrypt_block()
198 if (rounds == 12) { in aesce_decrypt_block()
Dhmac_drbg.c48 unsigned char rounds = (additional != NULL && add_len != 0) ? 2 : 1; in mbedtls_hmac_drbg_update() local
53 for (sep[0] = 0; sep[0] < rounds; sep[0]++) { in mbedtls_hmac_drbg_update()
66 if (rounds == 2) { in mbedtls_hmac_drbg_update()
Dbignum.c2366 static int mpi_miller_rabin(const mbedtls_mpi *X, size_t rounds, in mpi_miller_rabin() argument
2390 for (i = 0; i < rounds; i++) { in mpi_miller_rabin()
2458 int mbedtls_mpi_is_prime_ext(const mbedtls_mpi *X, int rounds, in mbedtls_mpi_is_prime_ext() argument
2488 return mpi_miller_rabin(&XX, rounds, f_rng, p_rng); in mbedtls_mpi_is_prime_ext()
2511 int rounds; in mbedtls_mpi_gen_prime() local
2530 rounds = ((nbits >= 1300) ? 2 : (nbits >= 850) ? 3 : in mbedtls_mpi_gen_prime()
2538 rounds = ((nbits >= 1450) ? 4 : (nbits >= 1150) ? 5 : in mbedtls_mpi_gen_prime()
2558 ret = mbedtls_mpi_is_prime_ext(X, rounds, f_rng, p_rng); in mbedtls_mpi_gen_prime()
2590 (ret = mpi_miller_rabin(X, rounds, f_rng, p_rng)) in mbedtls_mpi_gen_prime()
2592 (ret = mpi_miller_rabin(&Y, rounds, f_rng, p_rng)) in mbedtls_mpi_gen_prime()
/mbedtls-3.6.0/tests/suites/
Dtest_suite_mps.data7 MPS Reader: Single step, multiple rounds, pausing disabled
10 MPS Reader: Single step, multiple rounds, pausing enabled but unused
19 MPS Reader: Multiple steps, multiple rounds, pausing disabled
22 MPS Reader: Multiple steps, multiple rounds, pausing enabled but unused
Dtest_suite_random.function53 /* The two rounds must generate different random data. */
96 /* The two rounds must generate different random data. */
124 /* The two rounds must generate different random data. */
148 /* The two rounds must generate different random data. */
Dtest_suite_psa_crypto_pake.data109 PSA PAKE: check rounds w/o forced errors
113 PSA PAKE: check rounds w/o forced errors, TLS12_PRF
117 PSA PAKE: check rounds, key is destroyed after being passed to set_password_key
121 PSA PAKE: check rounds w/o forced errors, client input first
Dtest_suite_bignum.function1068 int chunk_len, int rounds)
1080 res = mbedtls_mpi_is_prime_ext(&X, rounds - 1,
1089 res = mbedtls_mpi_is_prime_ext(&X, rounds,
Dtest_suite_psa_crypto_driver_wrappers.data861 PSA PAKE: ecjpake rounds transparent driver: in-driver success
865 PSA PAKE: ecjpake rounds transparent driver: fallback success
Dtest_suite_mps.function75 /* This test exercises multiple rounds of the basic use of the MPS reader:
/mbedtls-3.6.0/include/mbedtls/
Dbignum.h1032 int mbedtls_mpi_is_prime_ext(const mbedtls_mpi *X, int rounds,
/mbedtls-3.6.0/
DCONTRIBUTING.md27 …erged and published. Contributions may need some modifications, so a few rounds of review and fixi…
DChangeLog1931 * Remove the zeroization of a pointer variable in AES rounds. It was valid
2784 * Fix mbedtls_mpi_is_prime() to use more rounds of probabilistic testing. The
2785 previous settings for the number of rounds made it practical for an
2790 For example, the number of rounds was enough to securely generate RSA key
2835 Miller-Rabin rounds.
/mbedtls-3.6.0/docs/architecture/
Dtls13-support.md201 work to reduce review rounds and the number of comments in each round. They
/mbedtls-3.6.0/docs/
D3.0-migration-guide.md165 number of Miller-Rabin rounds.
/mbedtls-3.6.0/docs/proposed/
Dpsa-driver-interface.md859 3. If the second round does not collect enough entropy, the core makes more similar rounds, until t…