/mbedtls-latest/library/ |
D | aesce.c | 168 int rounds) in aesce_encrypt_block() argument 171 if (rounds == 10) { in aesce_encrypt_block() 174 if (rounds == 12) { in aesce_encrypt_block() 231 int rounds) in aesce_decrypt_block() argument 234 if (rounds == 10) { in aesce_decrypt_block() 237 if (rounds == 12) { in aesce_decrypt_block()
|
D | bignum.c | 2055 static int mpi_miller_rabin(const mbedtls_mpi *X, size_t rounds, in mpi_miller_rabin() argument 2076 for (i = 0; i < rounds; i++) { in mpi_miller_rabin() 2144 int mbedtls_mpi_is_prime_ext(const mbedtls_mpi *X, int rounds, in mbedtls_mpi_is_prime_ext() argument 2172 return mpi_miller_rabin(&XX, rounds, f_rng, p_rng); in mbedtls_mpi_is_prime_ext() 2195 int rounds; in mbedtls_mpi_gen_prime() local 2211 rounds = ((nbits >= 1300) ? 2 : (nbits >= 850) ? 3 : in mbedtls_mpi_gen_prime() 2219 rounds = ((nbits >= 1450) ? 4 : (nbits >= 1150) ? 5 : in mbedtls_mpi_gen_prime() 2239 ret = mbedtls_mpi_is_prime_ext(X, rounds, f_rng, p_rng); in mbedtls_mpi_gen_prime() 2271 (ret = mpi_miller_rabin(X, rounds, f_rng, p_rng)) in mbedtls_mpi_gen_prime() 2273 (ret = mpi_miller_rabin(&Y, rounds, f_rng, p_rng)) in mbedtls_mpi_gen_prime()
|
D | hmac_drbg.c | 48 unsigned char rounds = (additional != NULL && add_len != 0) ? 2 : 1; in mbedtls_hmac_drbg_update() local 53 for (sep[0] = 0; sep[0] < rounds; sep[0]++) { in mbedtls_hmac_drbg_update() 66 if (rounds == 2) { in mbedtls_hmac_drbg_update()
|
/mbedtls-latest/tests/suites/ |
D | test_suite_mps.data | 7 MPS Reader: Single step, multiple rounds, pausing disabled 10 MPS Reader: Single step, multiple rounds, pausing enabled but unused 19 MPS Reader: Multiple steps, multiple rounds, pausing disabled 22 MPS Reader: Multiple steps, multiple rounds, pausing enabled but unused
|
D | test_suite_random.function | 58 /* The two rounds must generate different random data. */ 105 /* The two rounds must generate different random data. */ 133 /* The two rounds must generate different random data. */ 157 /* The two rounds must generate different random data. */
|
D | test_suite_psa_crypto_pake.data | 109 PSA PAKE: check rounds w/o forced errors 113 PSA PAKE: check rounds w/o forced errors, TLS12_PRF 117 PSA PAKE: check rounds, key is destroyed after being passed to set_password_key 121 PSA PAKE: check rounds w/o forced errors, client input first
|
D | test_suite_bignum.function | 1130 int chunk_len, int rounds) 1142 res = mbedtls_mpi_is_prime_ext(&X, rounds - 1, 1151 res = mbedtls_mpi_is_prime_ext(&X, rounds,
|
D | test_suite_psa_crypto_driver_wrappers.data | 865 PSA PAKE: ecjpake rounds transparent driver: in-driver success 869 PSA PAKE: ecjpake rounds transparent driver: fallback success
|
D | test_suite_mps.function | 77 /* This test exercises multiple rounds of the basic use of the MPS reader:
|
/mbedtls-latest/include/mbedtls/ |
D | bignum.h | 1032 int mbedtls_mpi_is_prime_ext(const mbedtls_mpi *X, int rounds,
|
/mbedtls-latest/ |
D | CONTRIBUTING.md | 27 …erged and published. Contributions may need some modifications, so a few rounds of review and fixi…
|
D | ChangeLog | 2386 * Remove the zeroization of a pointer variable in AES rounds. It was valid 3239 * Fix mbedtls_mpi_is_prime() to use more rounds of probabilistic testing. The 3240 previous settings for the number of rounds made it practical for an 3245 For example, the number of rounds was enough to securely generate RSA key 3290 Miller-Rabin rounds.
|
/mbedtls-latest/docs/architecture/ |
D | tls13-support.md | 166 work to reduce review rounds and the number of comments in each round. They
|
/mbedtls-latest/docs/ |
D | 3.0-migration-guide.md | 165 number of Miller-Rabin rounds.
|
/mbedtls-latest/docs/proposed/ |
D | psa-driver-interface.md | 859 3. If the second round does not collect enough entropy, the core makes more similar rounds, until t…
|