Searched refs:DAA_PARAM_SIZE_RSA_MODULUS (Results 1 – 7 of 7) sorted by relevance
/netbsd-src/crypto/external/cpl/trousers/dist/src/tspi/daa/daa_issuer/ |
H A D | key_correctness_proof.c | 93 int length = DAA_PARAM_SIZE_RSA_MODULUS / 8; in generateMessageDigest() 246 if( bi_nbin_size( n) != DAA_PARAM_SIZE_RSA_MODULUS / 8) { in is_pk_correct() 249 DAA_PARAM_SIZE_RSA_MODULUS / 8); in is_pk_correct() 253 if( bi_cmp( n, bi_shift_left( tmp1, bi_1, DAA_PARAM_SIZE_RSA_MODULUS)) in is_pk_correct() 257 DAA_PARAM_SIZE_RSA_MODULUS); in is_pk_correct() 261 if( bi_cmp( n, bi_shift_left( tmp1, bi_1, DAA_PARAM_SIZE_RSA_MODULUS - 1 )) in is_pk_correct() 265 DAA_PARAM_SIZE_RSA_MODULUS); in is_pk_correct()
|
H A D | issue_credential.c | 195 byte_array = (BYTE *)malloc( DAA_PARAM_SIZE_RSA_MODULUS / 8); in compute_join_challenge_issuer() 197 LogError("malloc of %d bytes failed", DAA_PARAM_SIZE_RSA_MODULUS / 8); in compute_join_challenge_issuer() 200 bi_2_byte_array( byte_array, DAA_PARAM_SIZE_RSA_MODULUS / 8, capitalA); in compute_join_challenge_issuer() 201 EVP_DigestUpdate(mdctx, byte_array, DAA_PARAM_SIZE_RSA_MODULUS / 8); in compute_join_challenge_issuer() 202 LogDebug( "capitalA: %s", dump_byte_array( DAA_PARAM_SIZE_RSA_MODULUS / 8, byte_array)); in compute_join_challenge_issuer() 203 bi_2_byte_array( byte_array, DAA_PARAM_SIZE_RSA_MODULUS / 8, capital_Atilde); in compute_join_challenge_issuer() 204 EVP_DigestUpdate(mdctx, byte_array, DAA_PARAM_SIZE_RSA_MODULUS / 8); in compute_join_challenge_issuer() 206 dump_byte_array( DAA_PARAM_SIZE_RSA_MODULUS / 8, byte_array)); in compute_join_challenge_issuer() 583 length = DAA_PARAM_SIZE_RSA_MODULUS + 2 * DAA_PARAM_SAFETY_MARGIN + in Tspi_DAA_IssueCredential_internal()
|
H A D | keypair_generator.c | 93 int length_mod = DAA_PARAM_SIZE_RSA_MODULUS; in generate_key_pair()
|
/netbsd-src/crypto/external/cpl/trousers/dist/src/include/daa/ |
H A D | daa_parameter.h | 32 #define DAA_PARAM_SIZE_RSA_MODULUS (2048) macro
|
/netbsd-src/crypto/external/cpl/trousers/dist/src/tspi/daa/ |
H A D | daa_structs.c | 579 5 * ((DAA_PARAM_SIZE_RSA_MODULUS / 8)+ sizeof(int)) + in encoded_DAA_PK_internal() 582 pk->capitalY->length*(((DAA_PARAM_SIZE_RSA_MODULUS / 8)+sizeof(int))) in encoded_DAA_PK_internal() 594 length = DAA_PARAM_SIZE_RSA_MODULUS / 8; in encoded_DAA_PK_internal() 635 length = DAA_PARAM_SIZE_RSA_MODULUS / 8; in encoded_DAA_PK_internal() 823 BYTE *array = (BYTE*)malloc((DAA_PARAM_SIZE_RSA_MODULUS+7)/8); in convert2issuer_settings()
|
/netbsd-src/crypto/external/cpl/trousers/dist/src/tspi/daa/daa_platform/ |
H A D | platform.c | 317 modulus_length = DAA_PARAM_SIZE_RSA_MODULUS / 8; 523 modulus_length = DAA_PARAM_SIZE_RSA_MODULUS / 8; in Tspi_TPM_DAA_JoinInit_internal() 813 length = DAA_PARAM_SIZE_RSA_MODULUS / 8; in compute_join_challenge_host() 991 bi_urandom( v_tilde_prime, DAA_PARAM_SIZE_RSA_MODULUS + in Tspi_TPM_DAA_JoinCreateDaaPubKey_internal() 2180 size_bits = DAA_PARAM_SIZE_RSA_MODULUS + DAA_PARAM_SAFETY_MARGIN; in Tspi_TPM_DAA_Sign_internal() 2213 size_bits = DAA_PARAM_SIZE_EXPONENT_CERTIFICATE + DAA_PARAM_SIZE_RSA_MODULUS + in Tspi_TPM_DAA_Sign_internal()
|
/netbsd-src/crypto/external/cpl/trousers/dist/src/tspi/daa/daa_verifier/ |
H A D | verifier_transaction.c | 292 update( mdctx, "capitalT", capital_t, DAA_PARAM_SIZE_RSA_MODULUS); in compute_sign_challenge_host() 293 update( mdctx, "capitalTTilde", capital_tilde, DAA_PARAM_SIZE_RSA_MODULUS); in compute_sign_challenge_host()
|