OpenGrok
Home
Sort by relevance
Sort by last modified time
Full Search
Definition
Symbol
File Path
History
|
|
Help
Searched
refs:hLen
(Results
1 - 8
of
8
) sorted by null
/external/dropbear/libtomcrypt/src/pk/pkcs1/
pkcs_1_oaep_encode.c
41
unsigned long
hLen
, x, y, modulus_len;
58
hLen
= hash_descriptor[hash_idx].hashsize;
62
if ((2*
hLen
>= (modulus_len - 2)) || (msglen > (modulus_len - 2*
hLen
- 2))) {
69
seed = XMALLOC(
hLen
);
84
/* DB == lhash || PS || 0x01 || M, PS == k - mlen - 2
hlen
- 2 zeroes */
98
x =
hLen
;
99
y = modulus_len - msglen - 2*
hLen
- 2;
111
if (prng_descriptor[prng_idx].read(seed,
hLen
, prng) !=
hLen
) {
[
all
...]
pkcs_1_oaep_decode.c
40
unsigned long
hLen
, x, y, modulus_len;
55
hLen
= hash_descriptor[hash_idx].hashsize;
59
if ((2*
hLen
>= (modulus_len - 2)) || (msglen != modulus_len)) {
66
seed = XMALLOC(
hLen
);
84
1 ||
hLen
|| modulus_len -
hLen
- 1
96
XMEMCPY(seed, msg + x,
hLen
);
97
x +=
hLen
;
100
XMEMCPY(DB, msg + x, modulus_len -
hLen
- 1);
101
x += modulus_len -
hLen
- 1
[
all
...]
pkcs_1_mgf1.c
33
unsigned long
hLen
, x;
48
hLen
= hash_descriptor[hash_idx].hashsize;
52
buf = XMALLOC(
hLen
);
86
for (x = 0; x <
hLen
&& masklen > 0; x++, masklen--) {
94
zeromem(buf,
hLen
);
pkcs_1_pss_decode.c
38
unsigned long x, y,
hLen
, modulus_len;
53
hLen
= hash_descriptor[hash_idx].hashsize;
58
(modulus_len <
hLen
+ saltlen + 2) || (siglen != modulus_len)) {
91
XMEMCPY(DB, sig + x, modulus_len -
hLen
- 1);
92
x += modulus_len -
hLen
- 1;
95
XMEMCPY(hash, sig + x,
hLen
);
96
x +=
hLen
;
104
/* generate mask of length modulus_len -
hLen
- 1 from hash */
105
if ((err = pkcs_1_mgf1(hash_idx, hash,
hLen
, mask, modulus_len -
hLen
- 1)) != CRYPT_OK)
[
all
...]
pkcs_1_pss_encode.c
40
unsigned long x, y,
hLen
, modulus_len;
56
hLen
= hash_descriptor[hash_idx].hashsize;
60
if ((saltlen > modulus_len) || (modulus_len <
hLen
+ saltlen + 2)) {
112
/* generate DB = PS || 0x01 || salt, PS == modulus_len - saltlen -
hLen
- 2 zero bytes */
114
XMEMSET(DB + x, 0, modulus_len - saltlen -
hLen
- 2);
115
x += modulus_len - saltlen -
hLen
- 2;
120
/* generate mask of length modulus_len -
hLen
- 1 from hash */
121
if ((err = pkcs_1_mgf1(hash_idx, hash,
hLen
, mask, modulus_len -
hLen
- 1)) != CRYPT_OK) {
126
for (y = 0; y < (modulus_len -
hLen
- 1); y++)
[
all
...]
/external/openssl/crypto/rsa/
rsa_pss.c
78
int
hLen
, maskedDBLen, MSBits, emLen;
84
hLen
= EVP_MD_size(Hash);
85
if (
hLen
< 0)
89
* -1 sLen ==
hLen
93
if (sLen == -1) sLen =
hLen
;
113
if (emLen < (
hLen
+ sLen + 2)) /* sLen can be small negative */
123
maskedDBLen = emLen -
hLen
- 1;
131
if (PKCS1_MGF1(DB, maskedDBLen, H,
hLen
, Hash) < 0)
151
EVP_DigestUpdate(&ctx, mHash,
hLen
);
156
if (memcmp(H_, H,
hLen
))
[
all
...]
/external/bouncycastle/src/main/java/org/bouncycastle/crypto/generators/
PKCS5S2ParametersGenerator.java
86
int
hLen
= hMac.getMacSize();
87
int l = (dkLen +
hLen
- 1) /
hLen
;
89
byte[] out = new byte[l *
hLen
];
95
F(password, salt, iterationCount, iBuf, out, (i - 1) *
hLen
);
/external/dropbear/libtomcrypt/
crypt.tex
[
all
...]
Completed in 473 milliseconds