Lines Matching refs:bit

247      and MBEDTLS_MPI_MAX_SIZE is smaller than needed for a 4096-bit RSA key.
473 when compiling for Thumb (T32) or 32-bit Arm (A32).
484 AES when compiling for Thumb (T32) or 32-bit Arm (A32).
508 hardware accelerated AES is not present (around 13-23% on 64-bit Arm).
522 * Add support for using AES-CBC 128, 192, and 256 bit schemes
535 * Add support for 8-bit GCM tables for Shoup's algorithm to speedup GCM
537 performance by around 30% on 64-bit Intel; 125% on Armv7-M.
547 the MBEDTLS_X509_EXT_BASIC_CONSTRAINTS bit in the certificate's
809 * Add support to restrict AES to 128-bit keys in order to save code size.
888 implementations for 32- and 64-bit Arm and for x86 and x86-64, which are
1087 64-bit Arm. A new configuration option, MBEDTLS_AESCE_C, can
1098 * AES-NI is now supported in 32-bit builds, or when MBEDTLS_HAVE_ASM
1102 compilers still require MBEDTLS_HAVE_ASM and a 64-bit target.)
1113 * Add support for AES with the Armv8-A Cryptographic Extension on 64-bit
1168 have the most-significant bit set in their last byte.
1835 * Fix a bug in mbedtls_gcm_starts() when the bit length of the iv
1922 key type used, as well as the key bit-size in the case of
2648 -Wformat-signedness, and fix the code that causes signed-one-bit-field
3075 about 1 bit of information on average and could cause the value to be
3097 (32-bit and 64-bit) using GCC, Clang or Visual Studio. Contributed by
3506 that comply with FIPS 186-4, including SHA-512 with a 1024-bit key.
3507 * Add support for 128-bit keys in CTR_DRBG. Note that using keys shorter
3782 * Fix compilation warnings with IAR toolchain, on 32 bit platform.
3984 * Fix test_suite_pk to work on 64-bit ILP32 systems. #849
4057 leaking 1 bit of the private key. Reported by prashantkspatil.
4149 * Fix out-of-memory problem when parsing 4096-bit PKCS8-encrypted RSA keys.
4272 * Fix conditional preprocessor directives in bignum.h to enable 64-bit
4292 64-bit division. This is useful on embedded platforms where 64-bit division
4386 * Add checks in the PK module for the RSA functions on 64-bit systems.
4395 using RSA through the PK module in 64-bit systems. The issue was caused by
4684 of TLS, but might be in other uses. On 32 bit machines, requires reading a
4685 string of close to or larger than 1GB to exploit; on 64 bit machines, would
4692 buffer is 512MB or larger on 32-bit platforms. Found by Guido Vranken,
4725 * Fix warning when using a 64bit platform. (found by embedthis) (#275)
4907 been removed (compiler is required to support 32-bit operations).
4989 * Add support for bit strings in X.509 names (request by Fredrik Axelsson).
5034 * Fix potential unintended sign extension in asn1_get_len() on 64-bit
5587 * Fix potential unintended sign extension in asn1_get_len() on 64-bit
5805 * Fixes for 64-bit compilation with MS Visual Studio
6040 * Fixed issues with Intel compiler on 64-bit systems (Closes ticket #50)
6124 * Added mpi_get_bit() and mpi_set_bit() individual bit setter/getter
6159 displays actual bit size of the value.
6166 platform (32-bit / 64-bit) (Fixes ticket #19, found by Mads
6343 * Fixed Camellia and XTEA for 64-bit Windows systems.
6372 * Fixed compatibility of XTEA and Camellia on a 64-bit system
6450 * Fixed a bug in mpi_read_binary() on 64-bit platforms
6479 * Added multiply assembly code for 64-bit PowerPCs,