Home
last modified time | relevance | path

Searched refs:bits (Results 1 – 25 of 256) sorted by relevance

1234567891011

/openssl/crypto/perlasm/
H A Dsparcv9_modes.pl42 my ($alg,$bits) = @_;
93 .L${bits}_cbc_enc_loop:
195 .L${bits}cbc_enc_blk:
255 .size ${alg}${bits}_t4_cbc_encrypt,.-${alg}${bits}_t4_cbc_encrypt
260 my ($alg,$bits) = @_;
528 .L${bits}cbc_dec_blk:
617 .size ${alg}${bits}_t4_cbc_decrypt,.-${alg}${bits}_t4_cbc_decrypt
622 my ($alg,$bits) = @_;
666 .L${bits}_ctr32_loop:
831 .L${bits}_ctr32_blk:
[all …]
/openssl/crypto/whrlpool/
H A Dwp_dgst.c104 c->bitlen[0] += bits; in WHIRLPOOL_BitUpdate()
115 while (bits) { in WHIRLPOOL_BitUpdate()
119 bits %= WHIRLPOOL_BBLOCK; in WHIRLPOOL_BitUpdate()
124 if (bits >= bitrem) { in WHIRLPOOL_BitUpdate()
125 bits -= bitrem; in WHIRLPOOL_BitUpdate()
134 bits = 0; in WHIRLPOOL_BitUpdate()
154 while (bits) { in WHIRLPOOL_BitUpdate()
164 bits -= inpgap; in WHIRLPOOL_BitUpdate()
175 if (bits > 8) { in WHIRLPOOL_BitUpdate()
183 bits -= 8; in WHIRLPOOL_BitUpdate()
[all …]
/openssl/crypto/asn1/
H A Da_bitstr.c23 int ret, j, bits, len; in ossl_i2c_ASN1_BIT_STRING() local
41 bits = 0; in ossl_i2c_ASN1_BIT_STRING()
43 bits = 1; in ossl_i2c_ASN1_BIT_STRING()
45 bits = 2; in ossl_i2c_ASN1_BIT_STRING()
47 bits = 3; in ossl_i2c_ASN1_BIT_STRING()
49 bits = 4; in ossl_i2c_ASN1_BIT_STRING()
51 bits = 5; in ossl_i2c_ASN1_BIT_STRING()
53 bits = 6; in ossl_i2c_ASN1_BIT_STRING()
55 bits = 7; in ossl_i2c_ASN1_BIT_STRING()
60 bits = 0; in ossl_i2c_ASN1_BIT_STRING()
[all …]
/openssl/demos/pkey/
H A DEVP_PKEY_RSA_keygen.c58 if (EVP_PKEY_CTX_set_rsa_keygen_bits(genctx, bits) <= 0) { in generate_rsa_key_long()
113 pkey = EVP_PKEY_Q_keygen(libctx, propq, "RSA", (size_t)bits); in generate_rsa_key_short()
127 int bits = 0; in dump_key() local
185 if (EVP_PKEY_get_int_param(pkey, OSSL_PKEY_PARAM_BITS, &bits) == 0) { in dump_key()
191 fprintf(stdout, "\nNumber of bits: %d\n\n", bits); in dump_key()
245 unsigned int bits = 4096; in main() local
257 if (bits < 512) { in main()
262 bits = (unsigned int)bits_i; in main()
266 if (bits < 2048) in main()
271 pkey = generate_rsa_key_short(libctx, bits); in main()
[all …]
/openssl/crypto/bn/
H A Dbn_prime.c76 if (bits <= 512) in calc_trial_divisions()
78 else if (bits <= 1024) in calc_trial_divisions()
80 else if (bits <= 2048) in calc_trial_divisions()
82 else if (bits <= 4096) in calc_trial_divisions()
94 static int bn_mr_min_checks(int bits) in bn_mr_min_checks() argument
96 if (bits > 2048) in bn_mr_min_checks()
131 int checks = bn_mr_min_checks(bits); in BN_generate_prime_ex2()
133 if (bits < 2) { in BN_generate_prime_ex2()
137 } else if (add == NULL && safe && bits < 6 && bits != 3) { in BN_generate_prime_ex2()
531 if (BN_num_bits(rnd) != bits) in probable_prime()
[all …]
H A Dbn_rand.c30 if (bits == 0) { in bnrand()
36 if (bits < 0 || (bits == 1 && top > 0)) in bnrand()
39 bytes = (bits + 7) / 8; in bnrand()
40 bit = (bits - 1) % 8; in bnrand()
100 int BN_rand_ex(BIGNUM *rnd, int bits, int top, int bottom, in BN_rand_ex() argument
106 int BN_rand(BIGNUM *rnd, int bits, int top, int bottom) in BN_rand() argument
108 return bnrand(NORMAL, rnd, bits, top, bottom, 0, NULL); in BN_rand()
113 return bnrand(TESTING, rnd, bits, top, bottom, 0, NULL); in BN_bntest_rand()
124 int BN_priv_rand(BIGNUM *rnd, int bits, int top, int bottom) in BN_priv_rand() argument
126 return bnrand(PRIVATE, rnd, bits, top, bottom, 0, NULL); in BN_priv_rand()
[all …]
H A Dbn_exp.c51 int i, bits, ret = 0; in BN_exp() local
69 bits = BN_num_bits(p); in BN_exp()
187 bits = BN_num_bits(p); in BN_mod_exp_recp()
188 if (bits == 0) { in BN_mod_exp_recp()
340 if (bits == 0) { in BN_mod_exp_mont()
647 if (bits == 0) { in BN_mod_exp_mont_consttime()
884 bits -= window0; in BN_mod_exp_mont_consttime()
1016 bits -= window0; in BN_mod_exp_mont_consttime()
1092 bits -= window0; in BN_mod_exp_mont_consttime()
1207 if (bits == 0) { in BN_mod_exp_mont_word()
[all …]
H A Dbn_mpi.c16 int bits; in BN_bn2mpi() local
21 bits = BN_num_bits(a); in BN_bn2mpi()
22 num = (bits + 7) / 8; in BN_bn2mpi()
23 if (bits > 0) { in BN_bn2mpi()
24 ext = ((bits & 0x07) == 0); in BN_bn2mpi()
/openssl/apps/
H A Dtestdsa.h202 #define set_dsa_ptr(st, bits) \ argument
204 st.priv = dsa##bits##_priv; \
205 st.pub = dsa##bits##_pub; \
206 st.p = dsa##bits##_p; \
207 st.g = dsa##bits##_g; \
208 st.q = dsa##bits##_q; \
209 st.priv_l = sizeof(dsa##bits##_priv); \
210 st.pub_l = sizeof(dsa##bits##_pub); \
211 st.p_l = sizeof(dsa##bits##_p); \
212 st.g_l = sizeof(dsa##bits##_g); \
[all …]
/openssl/test/recipes/
H A D15-test_mp_rsa.t24 bits => '2048',
29 bits => '4096',
34 bits => '8192',
57 my $bits = $param->{bits};
58 my $name = ($evp ? "evp" : "") . "${bits}p${primes}";
64 '-pkeyopt', "rsa_keygen_bits:$bits"])),
79 '-primes', $primes, $bits])), "genrsa $name");
/openssl/crypto/rc2/
H A Drc2_skey.c55 void RC2_set_key(RC2_KEY *key, int len, const unsigned char *data, int bits) in RC2_set_key() argument
67 if (bits <= 0) in RC2_set_key()
68 bits = 1024; in RC2_set_key()
69 if (bits > 1024) in RC2_set_key()
70 bits = 1024; in RC2_set_key()
85 j = (bits + 7) >> 3; in RC2_set_key()
87 c = (0xff >> (-bits & 0x07)); in RC2_set_key()
/openssl/crypto/ec/
H A Decp_s390x_nistp.c284 #define EC_GFP_S390X_NISTP_METHOD(bits) \ argument
286 static int ec_GFp_s390x_nistp##bits##_mul(const EC_GROUP *group, \
296 S390X_SCALAR_MULTIPLY_P##bits, \
297 S390X_SIZE_P##bits); \
300 static ECDSA_SIG *ecdsa_s390x_nistp##bits##_sign_sig(const unsigned \
308 S390X_ECDSA_SIGN_P##bits, \
309 S390X_SIZE_P##bits); \
312 static int ecdsa_s390x_nistp##bits##_verify_sig(const \
319 S390X_ECDSA_VERIFY_P##bits, \
320 S390X_SIZE_P##bits); \
[all …]
/openssl/doc/man3/
H A DSSL_CTX_set_security_level.pod19 int bits, int nid,
23 int bits, int nid,
75 The security level corresponds to a minimum of 80 bits of security. Any
77 DSA and DH keys shorter than 1024 bits and ECC keys shorter than 160 bits
87 shorter than 2048 bits and ECC keys shorter than 224 bits are prohibited.
94 shorter than 3072 bits and ECC keys shorter than 256 bits are prohibited.
100 Security level set to 192 bits of security. As a result RSA, DSA and
101 DH keys shorter than 7680 bits and ECC keys shorter than 384 bits are
107 shorter than 15360 bits and ECC keys shorter than 512 bits are prohibited.
129 The bits of security limits affect all relevant parameters including
[all …]
H A DBN_rand.pod14 int BN_rand_ex(BIGNUM *rnd, int bits, int top, int bottom,
16 int BN_rand(BIGNUM *rnd, int bits, int top, int bottom);
18 int BN_priv_rand_ex(BIGNUM *rnd, int bits, int top, int bottom,
20 int BN_priv_rand(BIGNUM *rnd, int bits, int top, int bottom);
34 int BN_pseudo_rand(BIGNUM *rnd, int bits, int top, int bottom);
40 number of I<bits> in length and security strength at least I<strength> bits
44 If I<bits> is less than zero, or too small to
51 If it is B<BN_RAND_TOP_TWO>, the two most significant bits of
53 numbers will always have 2*I<bits> length.
56 If I<bits> is 1 then I<top> cannot also be B<BN_RAND_TOP_TWO>.
[all …]
H A DDSA_size.pod5 DSA_size, DSA_bits, DSA_security_bits - get DSA signature size, key bits or security bits
27 DSA_bits() returns the number of bits in key I<dsa>: this is the number
28 of bits in the I<p> parameter.
34 DSA_security_bits() returns the number of security bits of the given I<dsa>
39 DSA_security_bits() returns the number of security bits in the key, or -1 if
42 DSA_bits() returns the number of bits in the key, or -1 if I<dsa> doesn't
H A DBN_num_bytes.pod21 BN_num_bits_word() returns the number of significant bits in a word.
25 BN_num_bits() returns the number of significant bits in a B<BIGNUM>,
38 the number of bits they expected (something like 512, 1024, 2048,
40 of bits doesn't always set the highest bits, thereby making the number
41 of I<significant> bits a little lower. If you want to know the "key
/openssl/crypto/camellia/
H A Dcmll_misc.c20 int Camellia_set_key(const unsigned char *userKey, const int bits, in Camellia_set_key() argument
25 if (bits != 128 && bits != 192 && bits != 256) in Camellia_set_key()
27 key->grand_rounds = Camellia_Ekeygen(bits, userKey, key->u.rd_key); in Camellia_set_key()
/openssl/crypto/dsa/
H A Ddsa_gen.c47 int DSA_generate_parameters_ex(DSA *dsa, int bits, in DSA_generate_parameters_ex() argument
53 return dsa->meth->dsa_paramgen(dsa, bits, seed_in, seed_len, in DSA_generate_parameters_ex()
61 if (bits < 2048 && seed_len <= 20) { in DSA_generate_parameters_ex()
63 bits, 160, cb)) in DSA_generate_parameters_ex()
67 bits, 0, cb)) in DSA_generate_parameters_ex()
/openssl/ssl/record/methods/
H A Dssl3_cbc.c146 size_t bits; /* at most 18 bits */ in ssl3_cbc_digest_record() local
326 bits = 8 * mac_end_offset; in ssl3_cbc_digest_record()
333 bits += 8 * md_block_size; in ssl3_cbc_digest_record()
346 length_bytes[md_length_size - 4] = (unsigned char)(bits >> 24); in ssl3_cbc_digest_record()
347 length_bytes[md_length_size - 3] = (unsigned char)(bits >> 16); in ssl3_cbc_digest_record()
348 length_bytes[md_length_size - 2] = (unsigned char)(bits >> 8); in ssl3_cbc_digest_record()
349 length_bytes[md_length_size - 1] = (unsigned char)bits; in ssl3_cbc_digest_record()
352 length_bytes[md_length_size - 5] = (unsigned char)(bits >> 24); in ssl3_cbc_digest_record()
353 length_bytes[md_length_size - 6] = (unsigned char)(bits >> 16); in ssl3_cbc_digest_record()
354 length_bytes[md_length_size - 7] = (unsigned char)(bits >> 8); in ssl3_cbc_digest_record()
[all …]
/openssl/crypto/rsa/
H A Drsa_gen.c44 return rsa->meth->rsa_keygen(rsa, bits, e_value, cb); in RSA_generate_key_ex()
50 int RSA_generate_multi_prime_key(RSA *rsa, int bits, int primes, in RSA_generate_multi_prime_key() argument
56 return rsa->meth->rsa_multi_prime_keygen(rsa, bits, primes, in RSA_generate_multi_prime_key()
66 return rsa->meth->rsa_keygen(rsa, bits, e_value, cb); in RSA_generate_multi_prime_key()
82 int ossl_rsa_multiprime_derive(RSA *rsa, int bits, int primes, in DEFINE_STACK_OF()
258 static int rsa_multiprime_keygen(RSA *rsa, int bits, int primes, in rsa_multiprime_keygen() argument
274 if (bits < RSA_MIN_MODULUS_BITS) { in rsa_multiprime_keygen()
316 quo = bits / primes; in rsa_multiprime_keygen()
317 rmd = bits % primes; in rsa_multiprime_keygen()
556 if (!ossl_rsa_multiprime_derive(rsa, bits, primes, e_value, in rsa_multiprime_keygen()
[all …]
H A Drsa_mp.c98 int ossl_rsa_multip_cap(int bits) in ossl_rsa_multip_cap() argument
102 if (bits < 1024) in ossl_rsa_multip_cap()
104 else if (bits < 4096) in ossl_rsa_multip_cap()
106 else if (bits < 8192) in ossl_rsa_multip_cap()
/openssl/providers/implementations/ciphers/
H A Dcipher_aes_hw_t4.inc18 int ret, bits;
24 bits = keylen * 8;
28 aes_t4_set_decrypt_key(key, bits, ks);
30 switch (bits) {
48 aes_t4_set_encrypt_key(key, bits, ks);
50 switch (bits) {
H A Dcipher_camellia_hw_t4.inc19 int ret = 0, bits, mode = dat->mode;
24 bits = keylen * 8;
26 cmll_t4_set_key(key, bits, ks);
30 switch (bits) {
54 switch (bits) {
/openssl/include/crypto/
H A Daes_platform.h17 int vpaes_set_encrypt_key(const unsigned char *userKey, int bits,
19 int vpaes_set_decrypt_key(const unsigned char *userKey, int bits,
197 int aesni_set_encrypt_key(const unsigned char *userKey, int bits,
199 int aesni_set_decrypt_key(const unsigned char *userKey, int bits,
288 void aes_t4_set_encrypt_key(const unsigned char *key, int bits, AES_KEY *ks);
289 void aes_t4_set_decrypt_key(const unsigned char *key, int bits, AES_KEY *ks);
445 int rv64i_zkne_set_encrypt_key(const unsigned char *userKey, const int bits,
447 int rv64i_zknd_set_decrypt_key(const unsigned char *userKey, const int bits,
521 int rv32i_zkne_set_encrypt_key(const unsigned char *userKey, const int bits,
537 int HWAES_set_encrypt_key(const unsigned char *userKey, const int bits,
[all …]
/openssl/providers/implementations/macs/
H A Dkmac_prov.c144 size_t bits);
514 while (bits && (cnt < sz)) { in get_encode_size()
516 bits >>= 8; in get_encode_size()
532 size_t bits) in right_encode() argument
534 unsigned int len = get_encode_size(bits); in right_encode()
545 bits >>= 8; in right_encode()
568 size_t i, bits, len, sz; in encode_string() local
570 bits = 8 * in_len; in encode_string()
571 len = get_encode_size(bits); in encode_string()
581 out[i] = (bits & 0xFF); in encode_string()
[all …]

Completed in 44 milliseconds

1234567891011