/mbedtls-3.6.0/library/ |
D | aesce.c | 130 int rounds) in aesce_encrypt_block() argument 133 if (rounds == 10) { in aesce_encrypt_block() 136 if (rounds == 12) { in aesce_encrypt_block() 192 int rounds) in aesce_decrypt_block() argument 195 if (rounds == 10) { in aesce_decrypt_block() 198 if (rounds == 12) { in aesce_decrypt_block()
|
D | hmac_drbg.c | 48 unsigned char rounds = (additional != NULL && add_len != 0) ? 2 : 1; in mbedtls_hmac_drbg_update() local 53 for (sep[0] = 0; sep[0] < rounds; sep[0]++) { in mbedtls_hmac_drbg_update() 66 if (rounds == 2) { in mbedtls_hmac_drbg_update()
|
D | bignum.c | 2366 static int mpi_miller_rabin(const mbedtls_mpi *X, size_t rounds, in mpi_miller_rabin() argument 2390 for (i = 0; i < rounds; i++) { in mpi_miller_rabin() 2458 int mbedtls_mpi_is_prime_ext(const mbedtls_mpi *X, int rounds, in mbedtls_mpi_is_prime_ext() argument 2488 return mpi_miller_rabin(&XX, rounds, f_rng, p_rng); in mbedtls_mpi_is_prime_ext() 2511 int rounds; in mbedtls_mpi_gen_prime() local 2530 rounds = ((nbits >= 1300) ? 2 : (nbits >= 850) ? 3 : in mbedtls_mpi_gen_prime() 2538 rounds = ((nbits >= 1450) ? 4 : (nbits >= 1150) ? 5 : in mbedtls_mpi_gen_prime() 2558 ret = mbedtls_mpi_is_prime_ext(X, rounds, f_rng, p_rng); in mbedtls_mpi_gen_prime() 2590 (ret = mpi_miller_rabin(X, rounds, f_rng, p_rng)) in mbedtls_mpi_gen_prime() 2592 (ret = mpi_miller_rabin(&Y, rounds, f_rng, p_rng)) in mbedtls_mpi_gen_prime()
|
/mbedtls-3.6.0/tests/suites/ |
D | test_suite_mps.data | 7 MPS Reader: Single step, multiple rounds, pausing disabled 10 MPS Reader: Single step, multiple rounds, pausing enabled but unused 19 MPS Reader: Multiple steps, multiple rounds, pausing disabled 22 MPS Reader: Multiple steps, multiple rounds, pausing enabled but unused
|
D | test_suite_random.function | 53 /* The two rounds must generate different random data. */ 96 /* The two rounds must generate different random data. */ 124 /* The two rounds must generate different random data. */ 148 /* The two rounds must generate different random data. */
|
D | test_suite_psa_crypto_pake.data | 109 PSA PAKE: check rounds w/o forced errors 113 PSA PAKE: check rounds w/o forced errors, TLS12_PRF 117 PSA PAKE: check rounds, key is destroyed after being passed to set_password_key 121 PSA PAKE: check rounds w/o forced errors, client input first
|
D | test_suite_bignum.function | 1068 int chunk_len, int rounds) 1080 res = mbedtls_mpi_is_prime_ext(&X, rounds - 1, 1089 res = mbedtls_mpi_is_prime_ext(&X, rounds,
|
D | test_suite_psa_crypto_driver_wrappers.data | 861 PSA PAKE: ecjpake rounds transparent driver: in-driver success 865 PSA PAKE: ecjpake rounds transparent driver: fallback success
|
D | test_suite_mps.function | 75 /* This test exercises multiple rounds of the basic use of the MPS reader:
|
/mbedtls-3.6.0/include/mbedtls/ |
D | bignum.h | 1032 int mbedtls_mpi_is_prime_ext(const mbedtls_mpi *X, int rounds,
|
/mbedtls-3.6.0/ |
D | CONTRIBUTING.md | 27 …erged and published. Contributions may need some modifications, so a few rounds of review and fixi…
|
D | ChangeLog | 1931 * Remove the zeroization of a pointer variable in AES rounds. It was valid 2784 * Fix mbedtls_mpi_is_prime() to use more rounds of probabilistic testing. The 2785 previous settings for the number of rounds made it practical for an 2790 For example, the number of rounds was enough to securely generate RSA key 2835 Miller-Rabin rounds.
|
/mbedtls-3.6.0/docs/architecture/ |
D | tls13-support.md | 201 work to reduce review rounds and the number of comments in each round. They
|
/mbedtls-3.6.0/docs/ |
D | 3.0-migration-guide.md | 165 number of Miller-Rabin rounds.
|
/mbedtls-3.6.0/docs/proposed/ |
D | psa-driver-interface.md | 859 3. If the second round does not collect enough entropy, the core makes more similar rounds, until t…
|