/dports/security/cryptlib/cryptlib-3.4.3/context/ |
H A D | keyload.c | 235 eccKey->hLen > bytesToBits( ECCPARAM_MAX_N ) ) in checkPKCparams() 242 eccKey->qyLen > bytesToBits( ECCPARAM_MAX_QY ) ) in checkPKCparams() 249 eccKey->dLen > bytesToBits( ECCPARAM_MAX_D ) ) in checkPKCparams() 284 dlpKey->yLen < bytesToBits( 0 ) || \ in checkPKCparams() 285 dlpKey->yLen > bytesToBits( DLPPARAM_MAX_Y ) ) in checkPKCparams() 298 dlpKey->xLen > bytesToBits( DLPPARAM_MAX_X ) ) in checkPKCparams() 321 rsaKey->nLen > bytesToBits( RSAPARAM_MAX_N ) || \ in checkPKCparams() 746 bytesToBits( keyLength ) ) ); in generateKeyConvFunction() 784 bytesToBits( keyLength ) ); in generateKeyPKCFunction() 819 bytesToBits( keyLength ) ) ); in generateKeyMacFunction() [all …]
|
H A D | kg_dlp.c | 128 REQUIRES( primeBits >= bytesToBits( MIN_PKCSIZE ) && \ 129 primeBits <= bytesToBits( CRYPT_MAX_PKCSIZE ) ); 278 REQUIRES( pBits >= bytesToBits( MIN_PKCSIZE ) && \ 279 pBits <= bytesToBits( CRYPT_MAX_PKCSIZE ) ); 281 qBits <= bytesToBits( CRYPT_MAX_PKCSIZE ) ); 474 ( qBits >= bytesToBits( 20 ) && \ in generateDLPPrivateValue() 475 qBits <= bytesToBits( CRYPT_MAX_PKCSIZE ) ) ); in generateDLPPrivateValue() 487 REQUIRES( pLen >= bytesToBits( 20 ) && \ in generateDLPPrivateValue() 488 pLen <= bytesToBits( CRYPT_MAX_PKCSIZE ) ); in generateDLPPrivateValue() 814 REQUIRES( keyBits >= bytesToBits( MIN_PKCSIZE ) && \ [all …]
|
H A D | kg_rsa.c | 233 REQUIRES( eLen > 0 && eLen <= bytesToBits( CRYPT_MAX_PKCSIZE ) ); in checkRSAPublicKeyComponents() 263 if( eLen >= bytesToBits( sizeof( int ) ) ) in checkRSAPublicKeyComponents() 483 REQUIRES( keyBits >= bytesToBits( MIN_PKCSIZE ) && \ 484 keyBits <= bytesToBits( CRYPT_MAX_PKCSIZE ) ); 553 ENSURES( pkcInfo->keySizeBits >= bytesToBits( MIN_PKCSIZE ) && \ 554 pkcInfo->keySizeBits <= bytesToBits( CRYPT_MAX_PKCSIZE ) ); 633 ENSURES( pkcInfo->keySizeBits >= bytesToBits( MIN_PKCSIZE ) && \ in initCheckRSAkey() 634 pkcInfo->keySizeBits <= bytesToBits( CRYPT_MAX_PKCSIZE ) ); in initCheckRSAkey() 696 ENSURES( pkcInfo->keySizeBits >= bytesToBits( MIN_PKCSIZE ) && \ in initCheckRSAkey() 697 pkcInfo->keySizeBits <= bytesToBits( CRYPT_MAX_PKCSIZE ) ); in initCheckRSAkey()
|
H A D | kg_ecc.c | 160 REQUIRES( keyBits >= bytesToBits( MIN_PKCSIZE_ECC ) && \ 161 keyBits <= bytesToBits( CRYPT_MAX_PKCSIZE_ECC ) ); 192 REQUIRES( dLen >= 0 && dLen <= bytesToBits( CRYPT_MAX_PKCSIZE_ECC ) ); 518 REQUIRES( pLen >= bytesToBits( MIN_PKCSIZE_ECC ) && \ in checkECCDomainParameters() 519 pLen <= bytesToBits( CRYPT_MAX_PKCSIZE_ECC ) ); in checkECCDomainParameters() 529 tmp3hBits < bytesToBits( CRYPT_MAX_PKCSIZE_ECC ) ); in checkECCDomainParameters() 531 nBits < bytesToBits( CRYPT_MAX_PKCSIZE_ECC ) ); in checkECCDomainParameters() 751 REQUIRES( keyBits >= bytesToBits( MIN_PKCSIZE_ECC ) && \ 752 keyBits <= bytesToBits( CRYPT_MAX_PKCSIZE_ECC ) ); 940 ENSURES( pkcInfo->keySizeBits >= bytesToBits( MIN_PKCSIZE_ECC ) && \ in initCheckECCkey() [all …]
|
H A D | key_rdpri.c | 559 bytesToBits( RSAPARAM_MIN_D ), in readPgpRsaPrivateKey() 560 bytesToBits( RSAPARAM_MAX_D ), in readPgpRsaPrivateKey() 564 bytesToBits( RSAPARAM_MIN_P ), in readPgpRsaPrivateKey() 565 bytesToBits( RSAPARAM_MAX_P ), in readPgpRsaPrivateKey() 569 bytesToBits( RSAPARAM_MIN_Q ), in readPgpRsaPrivateKey() 570 bytesToBits( RSAPARAM_MAX_Q ), in readPgpRsaPrivateKey() 574 bytesToBits( RSAPARAM_MIN_U ), in readPgpRsaPrivateKey() 575 bytesToBits( RSAPARAM_MAX_U ), in readPgpRsaPrivateKey() 601 bytesToBits( DLPPARAM_MIN_X ), in readPgpDlpPrivateKey() 602 bytesToBits( DLPPARAM_MAX_X ), in readPgpDlpPrivateKey()
|
H A D | key_rdpub.c | 894 bytesToBits( RSAPARAM_MIN_N ), in readPgpRsaPublicKey() 895 bytesToBits( RSAPARAM_MAX_N ) ); in readPgpRsaPublicKey() 898 bytesToBits( RSAPARAM_MIN_E ), in readPgpRsaPublicKey() 899 bytesToBits( RSAPARAM_MAX_E ), in readPgpRsaPublicKey() 963 bytesToBits( DLPPARAM_MIN_P ), in readPgpDlpPublicKey() 967 bytesToBits( DLPPARAM_MIN_Q ), in readPgpDlpPublicKey() 968 bytesToBits( DLPPARAM_MAX_Q ), in readPgpDlpPublicKey() 972 bytesToBits( DLPPARAM_MIN_G ), in readPgpDlpPublicKey() 973 bytesToBits( DLPPARAM_MAX_G ), in readPgpDlpPublicKey() 977 bytesToBits( DLPPARAM_MIN_Y ), in readPgpDlpPublicKey() [all …]
|
H A D | ctx_dsa.c | 67 const int hLen = bytesToBits( hashLength ); in hashToBignum() 77 REQUIRES( qLen >= bytesToBits( 20 ) && \ in hashToBignum() 78 qLen <= bytesToBits( CRYPT_MAX_PKCSIZE ) ); in hashToBignum() 474 status = generateBignum( k, bytesToBits( qLen ) + \ in sign() 475 bytesToBits( DLP_OVERFLOW_SIZE ), 0x80, in sign() 743 REQUIRES( keySizeBits >= bytesToBits( MIN_PKCSIZE ) && \ 744 keySizeBits <= bytesToBits( CRYPT_MAX_PKCSIZE ) );
|
H A D | ctx_bnmath.c | 255 IN_RANGE( 0, bytesToBits( CRYPT_MAX_PKCSIZE ) ) \ 270 shiftAmount < bytesToBits( CRYPT_MAX_PKCSIZE ) ); 326 IN_RANGE( 0, bytesToBits( CRYPT_MAX_PKCSIZE ) ) \ 342 shiftAmount < bytesToBits( CRYPT_MAX_PKCSIZE ) ); 836 IN_RANGE( 0, bytesToBits( CRYPT_MAX_PKCSIZE ) ) \ 849 shiftAmount < bytesToBits( CRYPT_MAX_PKCSIZE ) ); 866 shiftCount > 0 && iterationCount < bytesToBits( CRYPT_MAX_PKCSIZE ); 877 ENSURES( shift >= 0 && shift < bytesToBits( CRYPT_MAX_PKCSIZE ) ); 896 ENSURES_B( iterationCount < bytesToBits( CRYPT_MAX_PKCSIZE ) );
|
H A D | ctx_ecdsa.c | 51 const int hLen = bytesToBits( hashLength ); in hashToBignum() 61 REQUIRES( nLen >= 20 && nLen <= bytesToBits( CRYPT_MAX_PKCSIZE_ECC ) ); in hashToBignum() 389 status = generateBignum( k, bytesToBits( nLen ) + \ in sign() 390 bytesToBits( DLP_OVERFLOW_SIZE ), 0x80, in sign() 709 REQUIRES( keySizeBits >= bytesToBits( MIN_PKCSIZE_ECC ) && \ 710 keySizeBits <= bytesToBits( CRYPT_MAX_PKCSIZE_ECC ) );
|
H A D | kg_prime.c | 98 REQUIRES( k > 0 && k <= bytesToBits( CRYPT_MAX_PKCSIZE ); in witnessOld() 267 REQUIRES( k >= 1 && k <= bytesToBits( CRYPT_MAX_PKCSIZE ) ); 454 REQUIRES( noBits >= 120 && noBits <= bytesToBits( CRYPT_MAX_PKCSIZE ) ); 653 noBits <= bytesToBits( CRYPT_MAX_PKCSIZE + DLP_OVERFLOW_SIZE ) );
|
H A D | ctx_bnrw.c | 150 bignumLengthBits > bytesToBits( maxLength ) ) in checkBignum() 155 if( bignumLengthBits < bytesToBits( minLength ) || \ in checkBignum() 156 bignumLengthBits > bytesToBits( maxLength ) ) in checkBignum()
|
H A D | ctx_elg.c | 375 bytesToBits( length + DLP_OVERFLOW_SIZE ), in encryptFn() 637 REQUIRES( keySizeBits >= bytesToBits( MIN_PKCSIZE ) && \ 638 keySizeBits <= bytesToBits( CRYPT_MAX_PKCSIZE ) );
|
H A D | ctx_dh.c | 490 REQUIRES( keySizeBits >= bytesToBits( MIN_PKCSIZE ) && \ 491 keySizeBits <= bytesToBits( CRYPT_MAX_PKCSIZE ) );
|
H A D | ctx_ecdh.c | 480 REQUIRES( keySizeBits >= bytesToBits( MIN_PKCSIZE_ECC ) && \ 481 keySizeBits <= bytesToBits( CRYPT_MAX_PKCSIZE_ECC ) );
|
/dports/security/cryptlib/cryptlib-3.4.3/session/ |
H A D | ssh2_svr.c | 182 keySize > bytesToBits( CRYPT_MAX_PKCSIZE ) && \ in processDHE() 183 minKeySize <= bytesToBits( CRYPT_MAX_PKCSIZE ) ) in processDHE() 187 keySize = bytesToBits( CRYPT_MAX_PKCSIZE ); in processDHE() 206 if( keySize < bytesToBits( MIN_PKCSIZE ) || \ in processDHE() 207 keySize > bytesToBits( CRYPT_MAX_PKCSIZE ) ) in processDHE() 213 bytesToBits( MIN_PKCSIZE ), in processDHE() 214 bytesToBits( CRYPT_MAX_PKCSIZE ) ) ); in processDHE()
|
H A D | ssh2_cli.c | 145 status = writeUint32( stream, bytesToBits( SSH2_DEFAULT_KEYSIZE ) ); in processDHE() 153 writeUint32( stream, bytesToBits( MIN_PKCSIZE ) ); in processDHE() 154 writeUint32( stream, bytesToBits( SSH2_DEFAULT_KEYSIZE ) ); in processDHE() 155 status = writeUint32( stream, bytesToBits( CRYPT_MAX_PKCSIZE ) ); in processDHE()
|
H A D | ssl_cry.c | 1479 bytesToBits( sigKeySize ) )); in checkCertVerify() 1785 bytesToBits( keyexKeySize ), in checkKeyexSignature() 1786 bytesToBits( sigKeySize ) )); in checkKeyexSignature() 1795 bytesToBits( keyexKeySize ), in checkKeyexSignature() 1796 bytesToBits( sigKeySize ) )); in checkKeyexSignature()
|
/dports/net-p2p/vuze/vuze-5.7.4.0_2/com/aelitis/net/upnp/impl/ssdp/ |
H A D | SSDPIGDImpl.java | 201 boolean[] dev_bits = bytesToBits( dev_bytes ); in receivedNotify() 224 boolean[] this_bits = bytesToBits( this_bytes ); in receivedNotify() 289 bytesToBits( in bytesToBits() method in SSDPIGDImpl
|
/dports/security/cryptlib/cryptlib-3.4.3/device/ |
H A D | hardware.c | 953 REQUIRES( keySizeBits >= bytesToBits( MIN_PKCSIZE ) && \ in generateKeyComponents() 954 keySizeBits <= bytesToBits( CRYPT_MAX_PKCSIZE ) ); in generateKeyComponents() 984 REQUIRES( keySizeBits >= bytesToBits( MIN_PKCSIZE ) && \ in rsaGenerateComponents() 985 keySizeBits <= bytesToBits( CRYPT_MAX_PKCSIZE ) ); in rsaGenerateComponents() 1035 REQUIRES( keySizeBits >= bytesToBits( MIN_PKCSIZE ) && \ in dlpGenerateComponents() 1036 keySizeBits <= bytesToBits( CRYPT_MAX_PKCSIZE ) ); in dlpGenerateComponents() 1110 REQUIRES( keySizeBits >= bytesToBits( MIN_PKCSIZE ) && \ in generatePKCcomponents() 1111 keySizeBits <= bytesToBits( CRYPT_MAX_PKCSIZE ) ); in generatePKCcomponents()
|
H A D | capabil.h | 81 IN_RANGE( bytesToBits( MIN_KEYSIZE ), 82 bytesToBits( CRYPT_MAX_PKCSIZE ) ) \
|
H A D | pkcs11.c | 985 IN_RANGE( bytesToBits( MIN_KEYSIZE ), in cipherGenerateKey() 986 bytesToBits( CRYPT_MAX_PKCSIZE ) ) \ in cipherGenerateKey() 1011 REQUIRES( keySizeBits >= bytesToBits( MIN_KEYSIZE ) && \ in cipherGenerateKey() 1012 keySizeBits <= bytesToBits( CRYPT_MAX_KEYSIZE ) ); in cipherGenerateKey() 1025 IN_RANGE( bytesToBits( MIN_KEYSIZE ), in hmacGenerateKey() 1026 bytesToBits( CRYPT_MAX_PKCSIZE ) ) \ in hmacGenerateKey() 1051 REQUIRES( keySizeBits >= bytesToBits( MIN_KEYSIZE ) && \ in hmacGenerateKey() 1052 keySizeBits <= bytesToBits( CRYPT_MAX_KEYSIZE ) ); in hmacGenerateKey()
|
H A D | hw_dummy.c | 407 REQUIRES( keySizeBits >= bytesToBits( MIN_KEYSIZE ) && \ in aesGenerateKey() 408 keySizeBits <= bytesToBits( CRYPT_MAX_KEYSIZE ) ); in aesGenerateKey() 651 REQUIRES( keySizeBits >= bytesToBits( MIN_PKCSIZE ) && \ in rsaGenerateKey() 652 keySizeBits <= bytesToBits( CRYPT_MAX_PKCSIZE ) ); in rsaGenerateKey()
|
H A D | pkcs11_pkc.c | 549 REQUIRES( keysizeBits >= bytesToBits( MIN_PKCSIZE ) && \ in dhGenerateKey() 550 keysizeBits <= bytesToBits( CRYPT_MAX_PKCSIZE ) ); in dhGenerateKey() 600 dhKey.pLen = bytesToBits( length ); in dhGenerateKey() 606 dhKey.qLen = bytesToBits( length ); in dhGenerateKey() 611 dhKey.gLen = bytesToBits( length ); in dhGenerateKey() 988 REQUIRES( keysizeBits >= bytesToBits( MIN_PKCSIZE ) && \ in rsaGenerateKey() 989 keysizeBits <= bytesToBits( CRYPT_MAX_PKCSIZE ) ); in rsaGenerateKey() 1586 REQUIRES( keysizeBits >= bytesToBits( MIN_PKCSIZE ) && \ in dsaGenerateKey() 1587 keysizeBits <= bytesToBits( CRYPT_MAX_PKCSIZE ) ); in dsaGenerateKey() 2210 REQUIRES( keySizeBits >= bytesToBits( MIN_PKCSIZE_ECC ) && \ [all …]
|
/dports/security/cryptlib/cryptlib-3.4.3/bn/ |
H A D | bn.h | 331 IN_RANGE( 0, bytesToBits( CRYPT_MAX_PKCSIZE ) ) \ 394 IN_RANGE( 0, bytesToBits( CRYPT_MAX_PKCSIZE ) ) \ 398 IN_RANGE( 0, bytesToBits( CRYPT_MAX_PKCSIZE ) ) \ 430 IN_RANGE( 0, bytesToBits( CRYPT_MAX_PKCSIZE ) ) \
|
/dports/audio/rezound/rezound-0.13.1beta/src/frontend_fox/ |
H A D | custom_cursors.h | 80 static unsigned char *bytesToBits(const char *bytes,int bytesLength) in bytesToBits() function
|