/openssl/crypto/perlasm/ |
H A D | sparcv9_modes.pl | 42 my ($alg,$bits) = @_; 93 .L${bits}_cbc_enc_loop: 195 .L${bits}cbc_enc_blk: 255 .size ${alg}${bits}_t4_cbc_encrypt,.-${alg}${bits}_t4_cbc_encrypt 260 my ($alg,$bits) = @_; 528 .L${bits}cbc_dec_blk: 617 .size ${alg}${bits}_t4_cbc_decrypt,.-${alg}${bits}_t4_cbc_decrypt 622 my ($alg,$bits) = @_; 666 .L${bits}_ctr32_loop: 831 .L${bits}_ctr32_blk: [all …]
|
/openssl/crypto/whrlpool/ |
H A D | wp_dgst.c | 104 c->bitlen[0] += bits; in WHIRLPOOL_BitUpdate() 115 while (bits) { in WHIRLPOOL_BitUpdate() 119 bits %= WHIRLPOOL_BBLOCK; in WHIRLPOOL_BitUpdate() 124 if (bits >= bitrem) { in WHIRLPOOL_BitUpdate() 125 bits -= bitrem; in WHIRLPOOL_BitUpdate() 134 bits = 0; in WHIRLPOOL_BitUpdate() 154 while (bits) { in WHIRLPOOL_BitUpdate() 164 bits -= inpgap; in WHIRLPOOL_BitUpdate() 175 if (bits > 8) { in WHIRLPOOL_BitUpdate() 183 bits -= 8; in WHIRLPOOL_BitUpdate() [all …]
|
/openssl/crypto/asn1/ |
H A D | a_bitstr.c | 23 int ret, j, bits, len; in ossl_i2c_ASN1_BIT_STRING() local 41 bits = 0; in ossl_i2c_ASN1_BIT_STRING() 43 bits = 1; in ossl_i2c_ASN1_BIT_STRING() 45 bits = 2; in ossl_i2c_ASN1_BIT_STRING() 47 bits = 3; in ossl_i2c_ASN1_BIT_STRING() 49 bits = 4; in ossl_i2c_ASN1_BIT_STRING() 51 bits = 5; in ossl_i2c_ASN1_BIT_STRING() 53 bits = 6; in ossl_i2c_ASN1_BIT_STRING() 55 bits = 7; in ossl_i2c_ASN1_BIT_STRING() 60 bits = 0; in ossl_i2c_ASN1_BIT_STRING() [all …]
|
/openssl/demos/pkey/ |
H A D | EVP_PKEY_RSA_keygen.c | 58 if (EVP_PKEY_CTX_set_rsa_keygen_bits(genctx, bits) <= 0) { in generate_rsa_key_long() 113 pkey = EVP_PKEY_Q_keygen(libctx, propq, "RSA", (size_t)bits); in generate_rsa_key_short() 127 int bits = 0; in dump_key() local 185 if (EVP_PKEY_get_int_param(pkey, OSSL_PKEY_PARAM_BITS, &bits) == 0) { in dump_key() 191 fprintf(stdout, "\nNumber of bits: %d\n\n", bits); in dump_key() 245 unsigned int bits = 4096; in main() local 257 if (bits < 512) { in main() 262 bits = (unsigned int)bits_i; in main() 266 if (bits < 2048) in main() 271 pkey = generate_rsa_key_short(libctx, bits); in main() [all …]
|
/openssl/crypto/bn/ |
H A D | bn_prime.c | 76 if (bits <= 512) in calc_trial_divisions() 78 else if (bits <= 1024) in calc_trial_divisions() 80 else if (bits <= 2048) in calc_trial_divisions() 82 else if (bits <= 4096) in calc_trial_divisions() 94 static int bn_mr_min_checks(int bits) in bn_mr_min_checks() argument 96 if (bits > 2048) in bn_mr_min_checks() 131 int checks = bn_mr_min_checks(bits); in BN_generate_prime_ex2() 133 if (bits < 2) { in BN_generate_prime_ex2() 137 } else if (add == NULL && safe && bits < 6 && bits != 3) { in BN_generate_prime_ex2() 531 if (BN_num_bits(rnd) != bits) in probable_prime() [all …]
|
H A D | bn_rand.c | 30 if (bits == 0) { in bnrand() 36 if (bits < 0 || (bits == 1 && top > 0)) in bnrand() 39 bytes = (bits + 7) / 8; in bnrand() 40 bit = (bits - 1) % 8; in bnrand() 100 int BN_rand_ex(BIGNUM *rnd, int bits, int top, int bottom, in BN_rand_ex() argument 106 int BN_rand(BIGNUM *rnd, int bits, int top, int bottom) in BN_rand() argument 108 return bnrand(NORMAL, rnd, bits, top, bottom, 0, NULL); in BN_rand() 113 return bnrand(TESTING, rnd, bits, top, bottom, 0, NULL); in BN_bntest_rand() 124 int BN_priv_rand(BIGNUM *rnd, int bits, int top, int bottom) in BN_priv_rand() argument 126 return bnrand(PRIVATE, rnd, bits, top, bottom, 0, NULL); in BN_priv_rand() [all …]
|
H A D | bn_exp.c | 51 int i, bits, ret = 0; in BN_exp() local 69 bits = BN_num_bits(p); in BN_exp() 187 bits = BN_num_bits(p); in BN_mod_exp_recp() 188 if (bits == 0) { in BN_mod_exp_recp() 340 if (bits == 0) { in BN_mod_exp_mont() 647 if (bits == 0) { in BN_mod_exp_mont_consttime() 884 bits -= window0; in BN_mod_exp_mont_consttime() 1016 bits -= window0; in BN_mod_exp_mont_consttime() 1092 bits -= window0; in BN_mod_exp_mont_consttime() 1207 if (bits == 0) { in BN_mod_exp_mont_word() [all …]
|
H A D | bn_mpi.c | 16 int bits; in BN_bn2mpi() local 21 bits = BN_num_bits(a); in BN_bn2mpi() 22 num = (bits + 7) / 8; in BN_bn2mpi() 23 if (bits > 0) { in BN_bn2mpi() 24 ext = ((bits & 0x07) == 0); in BN_bn2mpi()
|
/openssl/apps/ |
H A D | testdsa.h | 202 #define set_dsa_ptr(st, bits) \ argument 204 st.priv = dsa##bits##_priv; \ 205 st.pub = dsa##bits##_pub; \ 206 st.p = dsa##bits##_p; \ 207 st.g = dsa##bits##_g; \ 208 st.q = dsa##bits##_q; \ 209 st.priv_l = sizeof(dsa##bits##_priv); \ 210 st.pub_l = sizeof(dsa##bits##_pub); \ 211 st.p_l = sizeof(dsa##bits##_p); \ 212 st.g_l = sizeof(dsa##bits##_g); \ [all …]
|
/openssl/test/recipes/ |
H A D | 15-test_mp_rsa.t | 24 bits => '2048', 29 bits => '4096', 34 bits => '8192', 57 my $bits = $param->{bits}; 58 my $name = ($evp ? "evp" : "") . "${bits}p${primes}"; 64 '-pkeyopt', "rsa_keygen_bits:$bits"])), 79 '-primes', $primes, $bits])), "genrsa $name");
|
/openssl/crypto/rc2/ |
H A D | rc2_skey.c | 55 void RC2_set_key(RC2_KEY *key, int len, const unsigned char *data, int bits) in RC2_set_key() argument 67 if (bits <= 0) in RC2_set_key() 68 bits = 1024; in RC2_set_key() 69 if (bits > 1024) in RC2_set_key() 70 bits = 1024; in RC2_set_key() 85 j = (bits + 7) >> 3; in RC2_set_key() 87 c = (0xff >> (-bits & 0x07)); in RC2_set_key()
|
/openssl/crypto/ec/ |
H A D | ecp_s390x_nistp.c | 284 #define EC_GFP_S390X_NISTP_METHOD(bits) \ argument 286 static int ec_GFp_s390x_nistp##bits##_mul(const EC_GROUP *group, \ 296 S390X_SCALAR_MULTIPLY_P##bits, \ 297 S390X_SIZE_P##bits); \ 300 static ECDSA_SIG *ecdsa_s390x_nistp##bits##_sign_sig(const unsigned \ 308 S390X_ECDSA_SIGN_P##bits, \ 309 S390X_SIZE_P##bits); \ 312 static int ecdsa_s390x_nistp##bits##_verify_sig(const \ 319 S390X_ECDSA_VERIFY_P##bits, \ 320 S390X_SIZE_P##bits); \ [all …]
|
/openssl/doc/man3/ |
H A D | SSL_CTX_set_security_level.pod | 19 int bits, int nid, 23 int bits, int nid, 75 The security level corresponds to a minimum of 80 bits of security. Any 77 DSA and DH keys shorter than 1024 bits and ECC keys shorter than 160 bits 87 shorter than 2048 bits and ECC keys shorter than 224 bits are prohibited. 94 shorter than 3072 bits and ECC keys shorter than 256 bits are prohibited. 100 Security level set to 192 bits of security. As a result RSA, DSA and 101 DH keys shorter than 7680 bits and ECC keys shorter than 384 bits are 107 shorter than 15360 bits and ECC keys shorter than 512 bits are prohibited. 129 The bits of security limits affect all relevant parameters including [all …]
|
H A D | BN_rand.pod | 14 int BN_rand_ex(BIGNUM *rnd, int bits, int top, int bottom, 16 int BN_rand(BIGNUM *rnd, int bits, int top, int bottom); 18 int BN_priv_rand_ex(BIGNUM *rnd, int bits, int top, int bottom, 20 int BN_priv_rand(BIGNUM *rnd, int bits, int top, int bottom); 34 int BN_pseudo_rand(BIGNUM *rnd, int bits, int top, int bottom); 40 number of I<bits> in length and security strength at least I<strength> bits 44 If I<bits> is less than zero, or too small to 51 If it is B<BN_RAND_TOP_TWO>, the two most significant bits of 53 numbers will always have 2*I<bits> length. 56 If I<bits> is 1 then I<top> cannot also be B<BN_RAND_TOP_TWO>. [all …]
|
H A D | DSA_size.pod | 5 DSA_size, DSA_bits, DSA_security_bits - get DSA signature size, key bits or security bits 27 DSA_bits() returns the number of bits in key I<dsa>: this is the number 28 of bits in the I<p> parameter. 34 DSA_security_bits() returns the number of security bits of the given I<dsa> 39 DSA_security_bits() returns the number of security bits in the key, or -1 if 42 DSA_bits() returns the number of bits in the key, or -1 if I<dsa> doesn't
|
H A D | BN_num_bytes.pod | 21 BN_num_bits_word() returns the number of significant bits in a word. 25 BN_num_bits() returns the number of significant bits in a B<BIGNUM>, 38 the number of bits they expected (something like 512, 1024, 2048, 40 of bits doesn't always set the highest bits, thereby making the number 41 of I<significant> bits a little lower. If you want to know the "key
|
/openssl/crypto/camellia/ |
H A D | cmll_misc.c | 20 int Camellia_set_key(const unsigned char *userKey, const int bits, in Camellia_set_key() argument 25 if (bits != 128 && bits != 192 && bits != 256) in Camellia_set_key() 27 key->grand_rounds = Camellia_Ekeygen(bits, userKey, key->u.rd_key); in Camellia_set_key()
|
/openssl/crypto/dsa/ |
H A D | dsa_gen.c | 47 int DSA_generate_parameters_ex(DSA *dsa, int bits, in DSA_generate_parameters_ex() argument 53 return dsa->meth->dsa_paramgen(dsa, bits, seed_in, seed_len, in DSA_generate_parameters_ex() 61 if (bits < 2048 && seed_len <= 20) { in DSA_generate_parameters_ex() 63 bits, 160, cb)) in DSA_generate_parameters_ex() 67 bits, 0, cb)) in DSA_generate_parameters_ex()
|
/openssl/ssl/record/methods/ |
H A D | ssl3_cbc.c | 146 size_t bits; /* at most 18 bits */ in ssl3_cbc_digest_record() local 326 bits = 8 * mac_end_offset; in ssl3_cbc_digest_record() 333 bits += 8 * md_block_size; in ssl3_cbc_digest_record() 346 length_bytes[md_length_size - 4] = (unsigned char)(bits >> 24); in ssl3_cbc_digest_record() 347 length_bytes[md_length_size - 3] = (unsigned char)(bits >> 16); in ssl3_cbc_digest_record() 348 length_bytes[md_length_size - 2] = (unsigned char)(bits >> 8); in ssl3_cbc_digest_record() 349 length_bytes[md_length_size - 1] = (unsigned char)bits; in ssl3_cbc_digest_record() 352 length_bytes[md_length_size - 5] = (unsigned char)(bits >> 24); in ssl3_cbc_digest_record() 353 length_bytes[md_length_size - 6] = (unsigned char)(bits >> 16); in ssl3_cbc_digest_record() 354 length_bytes[md_length_size - 7] = (unsigned char)(bits >> 8); in ssl3_cbc_digest_record() [all …]
|
/openssl/crypto/rsa/ |
H A D | rsa_gen.c | 44 return rsa->meth->rsa_keygen(rsa, bits, e_value, cb); in RSA_generate_key_ex() 50 int RSA_generate_multi_prime_key(RSA *rsa, int bits, int primes, in RSA_generate_multi_prime_key() argument 56 return rsa->meth->rsa_multi_prime_keygen(rsa, bits, primes, in RSA_generate_multi_prime_key() 66 return rsa->meth->rsa_keygen(rsa, bits, e_value, cb); in RSA_generate_multi_prime_key() 82 int ossl_rsa_multiprime_derive(RSA *rsa, int bits, int primes, in DEFINE_STACK_OF() 258 static int rsa_multiprime_keygen(RSA *rsa, int bits, int primes, in rsa_multiprime_keygen() argument 274 if (bits < RSA_MIN_MODULUS_BITS) { in rsa_multiprime_keygen() 316 quo = bits / primes; in rsa_multiprime_keygen() 317 rmd = bits % primes; in rsa_multiprime_keygen() 556 if (!ossl_rsa_multiprime_derive(rsa, bits, primes, e_value, in rsa_multiprime_keygen() [all …]
|
H A D | rsa_mp.c | 98 int ossl_rsa_multip_cap(int bits) in ossl_rsa_multip_cap() argument 102 if (bits < 1024) in ossl_rsa_multip_cap() 104 else if (bits < 4096) in ossl_rsa_multip_cap() 106 else if (bits < 8192) in ossl_rsa_multip_cap()
|
/openssl/providers/implementations/ciphers/ |
H A D | cipher_aes_hw_t4.inc | 18 int ret, bits; 24 bits = keylen * 8; 28 aes_t4_set_decrypt_key(key, bits, ks); 30 switch (bits) { 48 aes_t4_set_encrypt_key(key, bits, ks); 50 switch (bits) {
|
H A D | cipher_camellia_hw_t4.inc | 19 int ret = 0, bits, mode = dat->mode; 24 bits = keylen * 8; 26 cmll_t4_set_key(key, bits, ks); 30 switch (bits) { 54 switch (bits) {
|
/openssl/include/crypto/ |
H A D | aes_platform.h | 17 int vpaes_set_encrypt_key(const unsigned char *userKey, int bits, 19 int vpaes_set_decrypt_key(const unsigned char *userKey, int bits, 197 int aesni_set_encrypt_key(const unsigned char *userKey, int bits, 199 int aesni_set_decrypt_key(const unsigned char *userKey, int bits, 288 void aes_t4_set_encrypt_key(const unsigned char *key, int bits, AES_KEY *ks); 289 void aes_t4_set_decrypt_key(const unsigned char *key, int bits, AES_KEY *ks); 445 int rv64i_zkne_set_encrypt_key(const unsigned char *userKey, const int bits, 447 int rv64i_zknd_set_decrypt_key(const unsigned char *userKey, const int bits, 521 int rv32i_zkne_set_encrypt_key(const unsigned char *userKey, const int bits, 537 int HWAES_set_encrypt_key(const unsigned char *userKey, const int bits, [all …]
|
/openssl/providers/implementations/macs/ |
H A D | kmac_prov.c | 144 size_t bits); 514 while (bits && (cnt < sz)) { in get_encode_size() 516 bits >>= 8; in get_encode_size() 532 size_t bits) in right_encode() argument 534 unsigned int len = get_encode_size(bits); in right_encode() 545 bits >>= 8; in right_encode() 568 size_t i, bits, len, sz; in encode_string() local 570 bits = 8 * in_len; in encode_string() 571 len = get_encode_size(bits); in encode_string() 581 out[i] = (bits & 0xFF); in encode_string() [all …]
|