/net-tools-latest/mbedtls-2.4.0/tests/suites/ |
D | test_suite_pkwrite.data | 9 Public key write check EC 192 bits 13 Public key write check EC 521 bits 17 Public key write check EC Brainpool 512 bits 29 Private key write check EC 192 bits 33 Private key write check EC 521 bits 37 Private key write check EC Brainpool 512 bits
|
D | test_suite_debug.data | 42 …bits\nMyFile(0999)\: basic constraints \: CA=false\nMyFile(0999)\: value of 'crt->rsa.N' (2048 bit… 46 …bits\nMyFile(0999)\: basic constraints \: CA=true\nMyFile(0999)\: value of 'crt->eckey.Q(X)' (384 … 49 …01020304050607":"MyFile":999:"VALUE":"MyFile(0999)\: value of 'VALUE' (49 bits) is\:\nMyFile(0999)… 52 …"00000000000007":"MyFile":999:"VALUE":"MyFile(0999)\: value of 'VALUE' (3 bits) is\:\nMyFile(0999)… 55 …"00000000000000":"MyFile":999:"VALUE":"MyFile(0999)\: value of 'VALUE' (0 bits) is\:\nMyFile(0999)… 58 …fbb2f958b4424":"MyFile":999:"VALUE":"MyFile(0999)\: value of 'VALUE' (764 bits) is\:\nMyFile(0999)… 61 …fbb2f958b4424":"MyFile":999:"VALUE":"MyFile(0999)\: value of 'VALUE' (764 bits) is\:\nMyFile(0999)… 64 …fbb2f958b4424":"MyFile":999:"VALUE":"MyFile(0999)\: value of 'VALUE' (759 bits) is\:\nMyFile(0999)…
|
D | test_suite_rsa.data | 137 RSA PKCS1 Sign #1 (SHA512, 1536 bits RSA) 145 RSA PKCS1 Sign #2 (SHA256, 2048 bits RSA) 157 RSA PKCS1 Sign #3 (SHA224, 2048 bits RSA) 165 RSA PKCS1 Sign #4 (SHA384, 2048 bits RSA) 173 RSA PKCS1 Sign #5 (MD2, 2048 bits RSA) 181 RSA PKCS1 Sign #6 (MD4, 2048 bits RSA) 189 RSA PKCS1 Sign #7 (MD5, 2048 bits RSA) 197 RSA PKCS1 Sign #8 (RAW, 2048 bits RSA) 291 RSA Check Public key #4 (N exactly 128 bits) 294 RSA Check Public key #5 (N smaller than 128 bits) [all …]
|
D | test_suite_x509parse.data | 3 …14\:44\:06\nsigned using \: RSA with SHA1\nRSA key size \: 2048 bits\nbasic constraints … 7 …14\:44\:06\nsigned using \: RSA with SHA1\nRSA key size \: 2048 bits\nbasic constraints … 11 …14\:44\:00\nsigned using \: RSA with SHA1\nRSA key size \: 2048 bits\nbasic constraints … 15 … 10\:56\:59\nsigned using \: RSA with MD2\nRSA key size \: 2048 bits\nbasic constraints … 19 … 14\:44\:07\nsigned using \: RSA with MD4\nRSA key size \: 2048 bits\nbasic constraints … 23 … 14\:44\:07\nsigned using \: RSA with MD5\nRSA key size \: 2048 bits\nbasic constraints … 27 …14\:44\:07\nsigned using \: RSA with SHA1\nRSA key size \: 2048 bits\nbasic constraints … 31 …:44\:07\nsigned using \: RSA with SHA-224\nRSA key size \: 2048 bits\nbasic constraints … 35 …:44\:07\nsigned using \: RSA with SHA-256\nRSA key size \: 2048 bits\nbasic constraints … 39 …:44\:07\nsigned using \: RSA with SHA-384\nRSA key size \: 2048 bits\nbasic constraints … [all …]
|
D | test_suite_blowfish.data | 277 BLOWFISH-SETKEY Setkey 440 bits 280 BLOWFISH-SETKEY Setkey 448 bits 283 BLOWFISH-SETKEY Setkey 456 bits
|
D | test_suite_ecp.data | 237 ECP mod p192 small (more than 192 bits, less limbs than 2 * 192 bits) 277 ECP mod p521 small (522 bits)
|
D | test_suite_mpi.function | 813 void mbedtls_mpi_gen_prime( int bits, int safe, int ref_ret ) 820 my_ret = mbedtls_mpi_gen_prime( &X, bits, safe, rnd_std_rand, NULL ); 827 TEST_ASSERT( actual_bits >= (size_t) bits ); 828 TEST_ASSERT( actual_bits <= (size_t) bits + 1 );
|
D | main_test.function | 273 * The C standard doesn't guarantee that all-bits-0 is the representation 280 mbedtls_fprintf( stderr, "all-bits-zero is not a NULL pointer\n" );
|
D | test_suite_ecp.function | 357 void mbedtls_ecp_tls_read_group( char *record, int result, int bits ) 374 TEST_ASSERT( mbedtls_mpi_bitlen( &grp.P ) == (size_t) bits );
|
D | test_suite_cipher.blowfish.data | 553 BLOWFISH CBC Encrypt and decrypt 7 bytes, 192-bits key 557 BLOWFISH CTR Encrypt and decrypt 7 bytes, 192-bits key 561 BLOWFISH CFB64 Encrypt and decrypt 7 bytes, 192-bits key
|
/net-tools-latest/mbedtls-2.4.0/library/ |
D | asn1write.c | 291 const unsigned char *buf, size_t bits ) in mbedtls_asn1_write_bitstring() argument 296 size = ( bits / 8 ) + ( ( bits % 8 ) ? 1 : 0 ); in mbedtls_asn1_write_bitstring() 309 *--(*p) = (unsigned char) (size * 8 - bits); in mbedtls_asn1_write_bitstring()
|
D | aesni.c | 449 size_t bits ) in mbedtls_aesni_setkey_enc() argument 451 switch( bits ) in mbedtls_aesni_setkey_enc()
|
D | ecp_curves.c | 926 size_t i = 0, bits = b; \ 950 if( c < 0 ) fix_negative( N, c, &C, bits ); 956 static inline int fix_negative( mbedtls_mpi *N, signed char c, mbedtls_mpi *C, size_t bits ) in fix_negative() argument 962 ((void) bits); in fix_negative() 964 if( bits == 224 ) in fix_negative()
|
/net-tools-latest/mbedtls-2.4.0/include/mbedtls/ |
D | aesni.h | 103 size_t bits );
|
D | asn1write.h | 197 const unsigned char *buf, size_t bits );
|
/net-tools-latest/tinydtls-0.8.2/sha2/testvectors/testvectors/ |
D | vector005.info | 4 a very large grain of salt. The input sample is EMPTY (no bits).
|
/net-tools-latest/mbedtls-2.4.0/tests/data_files/ |
D | dh.1000.pem | 2 Recommended key length: 160 bits
|
D | dh.optlen.pem | 2 Recommended key length: 256 bits
|
/net-tools-latest/libcoap/include/coap/ |
D | coap.h.in | 37 #include "bits.h"
|
/net-tools-latest/tinydtls-0.8.2/aes/ |
D | rijndael.c | 1234 rijndael_set_key_enc_only(rijndael_ctx *ctx, const u_char *key, int bits) in rijndael_set_key_enc_only() argument 1238 rounds = rijndaelKeySetupEnc(ctx->ek, key, bits); in rijndael_set_key_enc_only() 1253 rijndael_set_key(rijndael_ctx *ctx, const u_char *key, int bits) in rijndael_set_key() argument 1257 rounds = rijndaelKeySetupEnc(ctx->ek, key, bits); in rijndael_set_key() 1260 if (rijndaelKeySetupDec(ctx->dk, key, bits) != rounds) in rijndael_set_key()
|
/net-tools-latest/libcoap/ |
D | Makefile.am | 76 include/coap/bits.h \
|
/net-tools-latest/mbedtls-2.4.0/ |
D | ChangeLog | 475 * Default DHM parameters server-side upgraded from 1024 to 2048 bits. 476 * A minimum RSA key size of 2048 bits is now enforced during ceritificate 721 * POLARSSL_MPI_MAX_SIZE now defaults to 1024 in order to allow 8192 bits 1330 * Default Blowfish keysize is now 128-bits 1340 * Corrected GCM counter incrementation to use only 32-bits instead of 1341 128-bits (found by Yawning Angel) 1600 * Inceased maximum size of ASN1 length reads to 32-bits. 1606 parity bits, to prevent mistakes in copying data. (Closes ticket #33) 1749 * Detection for DES weak keys and parity bits added
|