/external/openssh/ |
D | sshconnect1.c | 357 packet_put_int(BN_num_bits(host_key->rsa->n)); in try_rhosts_rsa_authentication() 529 rbits = BN_num_bits(server_key->rsa->n); in ssh_kex() 542 rbits = BN_num_bits(host_key->rsa->n); in ssh_kex() 558 BN_num_bits(server_key->rsa->n), BN_num_bits(host_key->rsa->n)); in ssh_kex() 602 if (BN_num_bits(host_key->rsa->n) < in ssh_kex() 603 BN_num_bits(server_key->rsa->n) + SSH_KEY_BITS_RESERVED) { in ssh_kex() 606 BN_num_bits(host_key->rsa->n), in ssh_kex() 607 BN_num_bits(server_key->rsa->n), in ssh_kex() 615 if (BN_num_bits(server_key->rsa->n) < in ssh_kex() 616 BN_num_bits(host_key->rsa->n) + SSH_KEY_BITS_RESERVED) { in ssh_kex() [all …]
|
D | dh.c | 125 if (BN_num_bits(dhg->p) != dhg->size) { in parse_prime() 127 linenum, BN_num_bits(dhg->p), dhg->size - 1); in parse_prime() 218 int n = BN_num_bits(dh_pub); in dh_pub_is_valid() 246 debug2("bits set: %d/%d", bits_set, BN_num_bits(dh->p)); in dh_pub_is_valid() 253 bits_set, BN_num_bits(dh->p)); in dh_pub_is_valid() 265 (pbits = BN_num_bits(dh->p)) <= 0 || in dh_gen_key()
|
D | authfd.c | 218 keybits = BN_num_bits(key->rsa->n); in deserialise_identity1() 402 (r = sshbuf_put_u32(msg, BN_num_bits(key->rsa->n))) != 0 || in ssh_decrypt_challenge() 504 if ((r = sshbuf_put_u32(b, BN_num_bits(key->n))) != 0 || in ssh_encode_identity_rsa1() 627 (r = sshbuf_put_u32(msg, BN_num_bits(key->rsa->n))) != 0 || in ssh_remove_identity()
|
D | kexgexc.c | 110 if ((bits = BN_num_bits(p)) < 0 || in input_kex_dh_gex_group() 196 debug("bits %d", BN_num_bits(dh_server_pub)); in input_kex_dh_gex_reply()
|
D | ssh-rsa.c | 103 BN_num_bits(key->rsa->n) < SSH_RSA_MINIMUM_MODULUS_SIZE) in ssh_rsa_sign() 175 BN_num_bits(key->rsa->n) < SSH_RSA_MINIMUM_MODULUS_SIZE || in ssh_rsa_verify()
|
/external/vboot_reference/utility/ |
D | dumpRSAPublicKey.c | 24 int modulus = BN_num_bits(key->n); in check() 53 nwords = BN_num_bits(N) / 32; in output() 88 BN_set_word(NnumBits, BN_num_bits(N)); in output()
|
/external/openssh/regress/unittests/sshbuf/ |
D | test_sshbuf_getput_crypto.c | 86 ASSERT_U16_EQ(PEEK_U16(sshbuf_ptr(p1)), (u_int16_t)BN_num_bits(bn)); in sshbuf_getput_crypto_tests() 110 ASSERT_U16_EQ(PEEK_U16(sshbuf_ptr(p1)), (u_int16_t)BN_num_bits(bn)); in sshbuf_getput_crypto_tests() 181 ASSERT_INT_EQ(sshbuf_put_u16(p1, BN_num_bits(bn)), 0); in sshbuf_getput_crypto_tests() 198 ASSERT_INT_EQ(sshbuf_put_u16(p1, BN_num_bits(bn)), 0); in sshbuf_getput_crypto_tests() 230 ASSERT_INT_EQ(sshbuf_put_u16(p1, BN_num_bits(bn)), 0); in sshbuf_getput_crypto_tests() 247 ASSERT_INT_EQ(sshbuf_put_u16(p1, BN_num_bits(bn)), 0); in sshbuf_getput_crypto_tests()
|
/external/tpm2/ |
D | CpriRSA.c | 70 if(BN_num_bits(bnP) < BN_num_bits(bnN)/2) in RsaPrivateExponent() 79 if(BN_num_bytes(bnQr) != 0 || BN_num_bits(bnQ) != BN_num_bits(bnP)) in RsaPrivateExponent() 181 if(BN_num_bits(bnQ) != BN_num_bits(bnP)) in _cpri__TestKeyRSA() 191 if(BN_num_bits(bnN) != (publicKey->size * 8)) in _cpri__TestKeyRSA() 211 if(BN_num_bytes(bnQr) != 0 || BN_num_bits(bnQ) != BN_num_bits(bnP)) in _cpri__TestKeyRSA() 1304 if(BN_num_bits(bnT) < 100) // Difference has to be at least 100 bits in _cpri__GenerateKeyRSA() 1332 if(BN_num_bits(bnN) != keySizeInBits) in _cpri__GenerateKeyRSA()
|
D | CpriMisc.c | 33 size = size - (((UINT16) BN_num_bits(inVal) + 7) / 8); in BnTo2B()
|
D | RSAKeySieve.c | 264 wLen = BN_num_bits(bnW); in MillerRabin() 578 UINT32 rounds = MillerRabinRounds(BN_num_bits(bnP)); in PrimeSelectWithSieve() 584 primes = BN_num_bits(bnP); in PrimeSelectWithSieve() 888 || BN_num_bits(bnN) != keySizeInBits) in _cpri__GenerateKeyRSA()
|
/external/boringssl/src/crypto/dh/ |
D | dh.c | 262 if (BN_num_bits(dh->p) > OPENSSL_DH_MAX_MODULUS_BITS) { in DH_generate_key() 305 const unsigned p_bits = BN_num_bits(dh->p); in DH_generate_key() 349 if (BN_num_bits(dh->p) > OPENSSL_DH_MAX_MODULUS_BITS) { in DH_compute_key() 398 unsigned DH_num_bits(const DH *dh) { return BN_num_bits(dh->p); } in DH_num_bits()
|
/external/boringssl/src/crypto/fipsmodule/ecdsa/ |
D | ecdsa.c | 74 num_bits = BN_num_bits(order); in digest_to_bn() 256 if (BN_num_bits(order) < 160) { in ecdsa_sign_setup() 298 if (BN_num_bits(k) <= BN_num_bits(order)) { in ecdsa_sign_setup()
|
/external/boringssl/src/crypto/rsa_extra/ |
D | rsa_test.cc | 505 EXPECT_EQ(2048u, BN_num_bits(rsa->n)); in TEST() 510 EXPECT_EQ(3072u, BN_num_bits(rsa->n)); in TEST() 664 EXPECT_EQ(1024u, BN_num_bits(rsa->n)); in TEST() 669 EXPECT_EQ(1024u, BN_num_bits(rsa->n)); in TEST() 674 EXPECT_EQ(1024u, BN_num_bits(rsa->n)); in TEST() 679 EXPECT_EQ(1152u, BN_num_bits(rsa->n)); in TEST()
|
/external/vboot_reference/host/lib/ |
D | util_misc.c | 49 nwords = BN_num_bits(rsa_private_key->n) / 32; in vb_keyb_from_rsa() 94 BN_set_word(NnumBits, BN_num_bits(N)); in vb_keyb_from_rsa()
|
/external/boringssl/src/crypto/fipsmodule/ec/ |
D | wnaf.c | 131 len = BN_num_bits(scalar); in compute_wNAF() 309 bits = i < num ? BN_num_bits(scalars[i]) : BN_num_bits(g_scalar); in ec_wNAF_mul()
|
/external/boringssl/src/crypto/fipsmodule/bn/ |
D | exponentiation.c | 158 bits = BN_num_bits(p); in BN_exp() 224 recp->num_bits = BN_num_bits(d); in BN_RECP_CTX_set() 297 i = BN_num_bits(m); in BN_div_recp() 434 bits = BN_num_bits(p); in mod_exp_recp() 588 bits = BN_num_bits(p); in BN_mod_exp_mont() 872 bits = BN_num_bits(p); in BN_mod_exp_mont_consttime() 904 if ((16 == a->top) && (16 == p->top) && (BN_num_bits(m) == 1024) && in BN_mod_exp_mont_consttime()
|
D | bn.c | 228 unsigned BN_num_bits(const BIGNUM *bn) { in BN_num_bits() function 239 return (BN_num_bits(bn) + 7) / 8; in BN_num_bytes()
|
D | sqrt.c | 242 if (!BN_pseudo_rand(y, BN_num_bits(p), 0, 0)) { in BN_mod_sqrt() 461 if (!BN_lshift(estimate, BN_value_one(), BN_num_bits(in)/2)) { in BN_sqrt()
|
D | montgomery_inv.c | 172 unsigned n_bits = BN_num_bits(n); in bn_mod_exp_base_2_vartime()
|
D | div.c | 227 norm_shift = BN_BITS2 - ((BN_num_bits(divisor)) % BN_BITS2); in BN_div() 516 max_shift = BN_num_bits(m) - BN_num_bits(r); in BN_mod_lshift_quick()
|
/external/boringssl/src/crypto/dsa/ |
D | dsa.c | 626 i = BN_num_bits(dsa->q); in DSA_do_check_signature() 633 if (BN_num_bits(dsa->p) > OPENSSL_DSA_MAX_MODULUS_BITS) { in DSA_do_check_signature() 866 if (BN_num_bits(&kq) <= BN_num_bits(dsa->q) && !BN_add(&kq, &kq, dsa->q)) { in DSA_sign_setup() 939 ret->priv_length = BN_num_bits(r->q); in DSA_dup_DH()
|
/external/boringssl/src/crypto/evp/ |
D | print.c | 162 mod_len = BN_num_bits(rsa->n); in do_rsa_print() 256 BIO_printf(bp, "%s: (%d bit)\n", ktype, BN_num_bits(x->p)) <= 0) { in do_dsa_print() 371 BIO_printf(bp, "%s: (%d bit)\n", ecstr, BN_num_bits(order)) <= 0) { in do_EC_KEY_print()
|
/external/boringssl/src/crypto/bn_extra/ |
D | bn_asn1.c | 72 (BN_num_bits(bn) % 8 == 0 && !CBB_add_u8(&child, 0x00)) || in BN_marshal_asn1()
|
D | convert.c | 385 const size_t bits = BN_num_bits(in); in BN_bn2mpi() 462 BN_clear_bit(out, BN_num_bits(out) - 1); in BN_mpi2bn()
|
/external/boringssl/src/crypto/fipsmodule/rsa/ |
D | rsa_impl.c | 76 unsigned rsa_bits = BN_num_bits(rsa->n); in check_modulus_and_exponent_sizes() 94 if (BN_num_bits(rsa->e) > kMaxExponentBits) { in check_modulus_and_exponent_sizes() 804 int b_bits = BN_num_bits(b); in rsa_greater_than_pow2() 1008 if (BN_num_bits(rsa->n) != (unsigned)bits) { in RSA_generate_key_ex()
|