/mbedtls-latest/programs/pkey/ |
D | dh_genprime.c | 54 int nbits = DFL_BITS; in main() local 76 nbits = atoi(q); in main() 77 if (nbits < 0 || nbits > MBEDTLS_MPI_MAX_BITS) { in main() 108 if ((ret = mbedtls_mpi_gen_prime(&P, nbits, 1, in main()
|
/mbedtls-latest/library/ |
D | bignum.c | 2182 int mbedtls_mpi_gen_prime(mbedtls_mpi *X, size_t nbits, int flags, in mbedtls_mpi_gen_prime() argument 2199 if (nbits < 3 || nbits > MBEDTLS_MPI_MAX_BITS) { in mbedtls_mpi_gen_prime() 2205 n = BITS_TO_LIMBS(nbits); in mbedtls_mpi_gen_prime() 2211 rounds = ((nbits >= 1300) ? 2 : (nbits >= 850) ? 3 : in mbedtls_mpi_gen_prime() 2212 (nbits >= 650) ? 4 : (nbits >= 350) ? 8 : in mbedtls_mpi_gen_prime() 2213 (nbits >= 250) ? 12 : (nbits >= 150) ? 18 : 27); in mbedtls_mpi_gen_prime() 2219 rounds = ((nbits >= 1450) ? 4 : (nbits >= 1150) ? 5 : in mbedtls_mpi_gen_prime() 2220 (nbits >= 1000) ? 6 : (nbits >= 850) ? 7 : in mbedtls_mpi_gen_prime() 2221 (nbits >= 750) ? 8 : (nbits >= 500) ? 13 : in mbedtls_mpi_gen_prime() 2222 (nbits >= 250) ? 28 : (nbits >= 150) ? 40 : 51); in mbedtls_mpi_gen_prime() [all …]
|
D | ecp.c | 521 grp->nbits = 0; in mbedtls_ecp_group_init() 2244 w = grp->nbits >= 384 ? 5 : 4; in ecp_pick_window_size() 2269 if (w >= grp->nbits) { in ecp_pick_window_size() 2314 d = (grp->nbits + w - 1) / w; in ecp_mul_comb() 2580 i = grp->nbits + 1; /* one past the (zero-based) required msb for private keys */ in ecp_mul_mxz() 3009 if (mbedtls_mpi_size(&pt->X) > (grp->nbits + 7) / 8) { in ecp_check_pubkey_mx() 3059 mbedtls_mpi_bitlen(d) - 1 != grp->nbits) { /* mbedtls_mpi_bitlen is one-based! */ in mbedtls_ecp_check_privkey() 3064 if (grp->nbits == 254 && mbedtls_mpi_get_bit(d, 2) != 0) { in mbedtls_ecp_check_privkey() 3144 return mbedtls_ecp_gen_privkey_mx(grp->nbits, d, f_rng, p_rng); in mbedtls_ecp_gen_privkey() 3341 size_t len = (key->grp.nbits + 7) / 8; in mbedtls_ecp_write_key_ext() [all …]
|
D | ecdsa.c | 207 size_t n_size = (grp->nbits + 7) / 8; in derive_mpi() 211 if (use_size * 8 > grp->nbits) { in derive_mpi() 212 MBEDTLS_MPI_CHK(mbedtls_mpi_shift_r(x, use_size * 8 - grp->nbits)); in derive_mpi() 409 size_t grp_len = (grp->nbits + 7) / 8; in mbedtls_ecdsa_sign_det_restartable()
|
D | rsa.c | 1047 unsigned int nbits, int exponent) in mbedtls_rsa_gen_key() argument 1058 if (nbits > 1024) { in mbedtls_rsa_gen_key() 1066 if (exponent < 3 || nbits % 2 != 0) { in mbedtls_rsa_gen_key() 1071 if (nbits < MBEDTLS_RSA_GEN_KEY_MIN_BITS) { in mbedtls_rsa_gen_key() 1085 MBEDTLS_MPI_CHK(mbedtls_mpi_gen_prime(&ctx->P, nbits >> 1, in mbedtls_rsa_gen_key() 1088 MBEDTLS_MPI_CHK(mbedtls_mpi_gen_prime(&ctx->Q, nbits >> 1, in mbedtls_rsa_gen_key() 1093 if (mbedtls_mpi_bitlen(&H) <= ((nbits >= 200) ? ((nbits >> 1) - 99) : 0)) { in mbedtls_rsa_gen_key() 1118 … if (mbedtls_mpi_bitlen(&ctx->D) <= ((nbits + 1) / 2)) { // (FIPS 186-4 §B.3.1 criterion 3(a)) in mbedtls_rsa_gen_key()
|
D | psa_crypto_ecp.c | 230 *bits = ecp->grp.nbits + 1; in mbedtls_psa_ecp_import_key() 232 *bits = ecp->grp.nbits; in mbedtls_psa_ecp_import_key()
|
D | pkparse.c | 247 grp->nbits = mbedtls_mpi_bitlen(&grp->N); in pk_group_from_specified() 274 if (grp->pbits == ref.pbits && grp->nbits == ref.nbits && in pk_group_id_from_group()
|
D | ecp_curves.c | 4535 grp->nbits = mbedtls_mpi_bitlen(&grp->N); in ecp_group_load() 4647 grp->nbits = 254; in ecp_use_curve25519() 4702 grp->nbits = 447; in ecp_use_curve448()
|
D | ecp_curves_new.c | 4545 grp->nbits = mbedtls_mpi_bitlen(&grp->N); in ecp_group_load() 4684 grp->nbits = 254; in ecp_use_curve25519() 4745 grp->nbits = 447; in ecp_use_curve448()
|
D | psa_crypto.c | 3905 operation->ctx->grp.nbits); 4122 coordinate_bytes = PSA_BITS_TO_BYTES(operation->ctx->grp.nbits); 6238 m = ecp_group.nbits;
|
/mbedtls-latest/tests/suites/ |
D | test_suite_ecdh.function | 129 if (grp.nbits % 8 != 0) { 130 unsigned char shift = 8 - (grp.nbits % 8); 147 if (grp.nbits % 8 != 0) { 148 unsigned char shift = 8 - (grp.nbits % 8); 274 TEST_ASSERT(grp.nbits % 8 == 0);
|
D | test_suite_ecdsa.function | 105 if (grp.nbits % 8 != 0) { 106 unsigned char shift = 8 - (grp.nbits % 8);
|
D | test_suite_ecp.function | 43 if (grp1->nbits != grp2->nbits) { 1207 if (canonical && in_key->len == (key.grp.nbits + 7) / 8) { 1271 size_t length = (key.grp.nbits + 7) / 8; 1336 TEST_EQUAL(olen, (key.grp.nbits + 7) / 8);
|
/mbedtls-latest/tests/include/alt-dummy/ |
D | ecp_alt.h | 18 const size_t nbits; member
|
/mbedtls-latest/include/mbedtls/ |
D | rsa.h | 470 unsigned int nbits, int exponent);
|
D | bignum.h | 1065 int mbedtls_mpi_gen_prime(mbedtls_mpi *X, size_t nbits, int flags,
|
D | ecp.h | 246 size_t nbits; /*!< For Short Weierstrass: The number of bits in \p P. member
|
/mbedtls-latest/docs/architecture/ |
D | alternative-implementations.md | 51 * ECP: `mbedtls_ecp_group` must have the fields `id`, `P`, `A`, `B`, `G`, `N`, `pbits` and `nbits`.
|
/mbedtls-latest/docs/ |
D | psa-transition.md | 1229 … the PSA bit-size, the `bit_size` field in `mbedtls_ecp_curve_info`, the `nbits` field in `mbedtls… 1231 | Curve | `grp->nbits` | `grp->pbits` | `curve_info->bit_size` | PSA bit-size |
|
/mbedtls-latest/ |
D | ChangeLog | 6192 * Updated rsa_gen_key() so that ctx->N is always nbits in size
|