Home
last modified time | relevance | path

Searched refs:bits (Results 1 – 22 of 22) sorted by relevance

/net-tools-latest/mbedtls-2.4.0/tests/suites/
Dtest_suite_pkwrite.data9 Public key write check EC 192 bits
13 Public key write check EC 521 bits
17 Public key write check EC Brainpool 512 bits
29 Private key write check EC 192 bits
33 Private key write check EC 521 bits
37 Private key write check EC Brainpool 512 bits
Dtest_suite_debug.data42bits\nMyFile(0999)\: basic constraints \: CA=false\nMyFile(0999)\: value of 'crt->rsa.N' (2048 bit…
46bits\nMyFile(0999)\: basic constraints \: CA=true\nMyFile(0999)\: value of 'crt->eckey.Q(X)' (384
49 …01020304050607":"MyFile":999:"VALUE":"MyFile(0999)\: value of 'VALUE' (49 bits) is\:\nMyFile(0999)…
52 …"00000000000007":"MyFile":999:"VALUE":"MyFile(0999)\: value of 'VALUE' (3 bits) is\:\nMyFile(0999)…
55 …"00000000000000":"MyFile":999:"VALUE":"MyFile(0999)\: value of 'VALUE' (0 bits) is\:\nMyFile(0999)…
58 …fbb2f958b4424":"MyFile":999:"VALUE":"MyFile(0999)\: value of 'VALUE' (764 bits) is\:\nMyFile(0999)…
61 …fbb2f958b4424":"MyFile":999:"VALUE":"MyFile(0999)\: value of 'VALUE' (764 bits) is\:\nMyFile(0999)…
64 …fbb2f958b4424":"MyFile":999:"VALUE":"MyFile(0999)\: value of 'VALUE' (759 bits) is\:\nMyFile(0999)…
Dtest_suite_rsa.data137 RSA PKCS1 Sign #1 (SHA512, 1536 bits RSA)
145 RSA PKCS1 Sign #2 (SHA256, 2048 bits RSA)
157 RSA PKCS1 Sign #3 (SHA224, 2048 bits RSA)
165 RSA PKCS1 Sign #4 (SHA384, 2048 bits RSA)
173 RSA PKCS1 Sign #5 (MD2, 2048 bits RSA)
181 RSA PKCS1 Sign #6 (MD4, 2048 bits RSA)
189 RSA PKCS1 Sign #7 (MD5, 2048 bits RSA)
197 RSA PKCS1 Sign #8 (RAW, 2048 bits RSA)
291 RSA Check Public key #4 (N exactly 128 bits)
294 RSA Check Public key #5 (N smaller than 128 bits)
[all …]
Dtest_suite_x509parse.data3 …14\:44\:06\nsigned using \: RSA with SHA1\nRSA key size \: 2048 bits\nbasic constraints …
7 …14\:44\:06\nsigned using \: RSA with SHA1\nRSA key size \: 2048 bits\nbasic constraints …
11 …14\:44\:00\nsigned using \: RSA with SHA1\nRSA key size \: 2048 bits\nbasic constraints …
15 … 10\:56\:59\nsigned using \: RSA with MD2\nRSA key size \: 2048 bits\nbasic constraints …
19 … 14\:44\:07\nsigned using \: RSA with MD4\nRSA key size \: 2048 bits\nbasic constraints …
23 … 14\:44\:07\nsigned using \: RSA with MD5\nRSA key size \: 2048 bits\nbasic constraints …
27 …14\:44\:07\nsigned using \: RSA with SHA1\nRSA key size \: 2048 bits\nbasic constraints …
31 …:44\:07\nsigned using \: RSA with SHA-224\nRSA key size \: 2048 bits\nbasic constraints …
35 …:44\:07\nsigned using \: RSA with SHA-256\nRSA key size \: 2048 bits\nbasic constraints …
39 …:44\:07\nsigned using \: RSA with SHA-384\nRSA key size \: 2048 bits\nbasic constraints …
[all …]
Dtest_suite_blowfish.data277 BLOWFISH-SETKEY Setkey 440 bits
280 BLOWFISH-SETKEY Setkey 448 bits
283 BLOWFISH-SETKEY Setkey 456 bits
Dtest_suite_ecp.data237 ECP mod p192 small (more than 192 bits, less limbs than 2 * 192 bits)
277 ECP mod p521 small (522 bits)
Dtest_suite_mpi.function813 void mbedtls_mpi_gen_prime( int bits, int safe, int ref_ret )
820 my_ret = mbedtls_mpi_gen_prime( &X, bits, safe, rnd_std_rand, NULL );
827 TEST_ASSERT( actual_bits >= (size_t) bits );
828 TEST_ASSERT( actual_bits <= (size_t) bits + 1 );
Dmain_test.function273 * The C standard doesn't guarantee that all-bits-0 is the representation
280 mbedtls_fprintf( stderr, "all-bits-zero is not a NULL pointer\n" );
Dtest_suite_ecp.function357 void mbedtls_ecp_tls_read_group( char *record, int result, int bits )
374 TEST_ASSERT( mbedtls_mpi_bitlen( &grp.P ) == (size_t) bits );
Dtest_suite_cipher.blowfish.data553 BLOWFISH CBC Encrypt and decrypt 7 bytes, 192-bits key
557 BLOWFISH CTR Encrypt and decrypt 7 bytes, 192-bits key
561 BLOWFISH CFB64 Encrypt and decrypt 7 bytes, 192-bits key
/net-tools-latest/mbedtls-2.4.0/library/
Dasn1write.c291 const unsigned char *buf, size_t bits ) in mbedtls_asn1_write_bitstring() argument
296 size = ( bits / 8 ) + ( ( bits % 8 ) ? 1 : 0 ); in mbedtls_asn1_write_bitstring()
309 *--(*p) = (unsigned char) (size * 8 - bits); in mbedtls_asn1_write_bitstring()
Daesni.c449 size_t bits ) in mbedtls_aesni_setkey_enc() argument
451 switch( bits ) in mbedtls_aesni_setkey_enc()
Decp_curves.c926 size_t i = 0, bits = b; \
950 if( c < 0 ) fix_negative( N, c, &C, bits );
956 static inline int fix_negative( mbedtls_mpi *N, signed char c, mbedtls_mpi *C, size_t bits ) in fix_negative() argument
962 ((void) bits); in fix_negative()
964 if( bits == 224 ) in fix_negative()
/net-tools-latest/mbedtls-2.4.0/include/mbedtls/
Daesni.h103 size_t bits );
Dasn1write.h197 const unsigned char *buf, size_t bits );
/net-tools-latest/tinydtls-0.8.2/sha2/testvectors/testvectors/
Dvector005.info4 a very large grain of salt. The input sample is EMPTY (no bits).
/net-tools-latest/mbedtls-2.4.0/tests/data_files/
Ddh.1000.pem2 Recommended key length: 160 bits
Ddh.optlen.pem2 Recommended key length: 256 bits
/net-tools-latest/libcoap/include/coap/
Dcoap.h.in37 #include "bits.h"
/net-tools-latest/tinydtls-0.8.2/aes/
Drijndael.c1234 rijndael_set_key_enc_only(rijndael_ctx *ctx, const u_char *key, int bits) in rijndael_set_key_enc_only() argument
1238 rounds = rijndaelKeySetupEnc(ctx->ek, key, bits); in rijndael_set_key_enc_only()
1253 rijndael_set_key(rijndael_ctx *ctx, const u_char *key, int bits) in rijndael_set_key() argument
1257 rounds = rijndaelKeySetupEnc(ctx->ek, key, bits); in rijndael_set_key()
1260 if (rijndaelKeySetupDec(ctx->dk, key, bits) != rounds) in rijndael_set_key()
/net-tools-latest/libcoap/
DMakefile.am76 include/coap/bits.h \
/net-tools-latest/mbedtls-2.4.0/
DChangeLog475 * Default DHM parameters server-side upgraded from 1024 to 2048 bits.
476 * A minimum RSA key size of 2048 bits is now enforced during ceritificate
721 * POLARSSL_MPI_MAX_SIZE now defaults to 1024 in order to allow 8192 bits
1330 * Default Blowfish keysize is now 128-bits
1340 * Corrected GCM counter incrementation to use only 32-bits instead of
1341 128-bits (found by Yawning Angel)
1600 * Inceased maximum size of ASN1 length reads to 32-bits.
1606 parity bits, to prevent mistakes in copying data. (Closes ticket #33)
1749 * Detection for DES weak keys and parity bits added