HomeSort by relevance Sort by last modified time
    Searched refs:hLen (Results 1 - 9 of 9) sorted by null

  /external/dropbear/libtomcrypt/src/pk/pkcs1/
pkcs_1_oaep_encode.c 41 unsigned long hLen, x, y, modulus_len;
58 hLen = hash_descriptor[hash_idx].hashsize;
62 if ((2*hLen >= (modulus_len - 2)) || (msglen > (modulus_len - 2*hLen - 2))) {
69 seed = XMALLOC(hLen);
84 /* DB == lhash || PS || 0x01 || M, PS == k - mlen - 2hlen - 2 zeroes */
98 x = hLen;
99 y = modulus_len - msglen - 2*hLen - 2;
111 if (prng_descriptor[prng_idx].read(seed, hLen, prng) != hLen) {
    [all...]
pkcs_1_oaep_decode.c 40 unsigned long hLen, x, y, modulus_len;
55 hLen = hash_descriptor[hash_idx].hashsize;
59 if ((2*hLen >= (modulus_len - 2)) || (msglen != modulus_len)) {
66 seed = XMALLOC(hLen);
84 1 || hLen || modulus_len - hLen - 1
96 XMEMCPY(seed, msg + x, hLen);
97 x += hLen;
100 XMEMCPY(DB, msg + x, modulus_len - hLen - 1);
101 x += modulus_len - hLen - 1
    [all...]
pkcs_1_mgf1.c 33 unsigned long hLen, x;
48 hLen = hash_descriptor[hash_idx].hashsize;
52 buf = XMALLOC(hLen);
86 for (x = 0; x < hLen && masklen > 0; x++, masklen--) {
94 zeromem(buf, hLen);
pkcs_1_pss_decode.c 38 unsigned long x, y, hLen, modulus_len;
53 hLen = hash_descriptor[hash_idx].hashsize;
58 (modulus_len < hLen + saltlen + 2) || (siglen != modulus_len)) {
91 XMEMCPY(DB, sig + x, modulus_len - hLen - 1);
92 x += modulus_len - hLen - 1;
95 XMEMCPY(hash, sig + x, hLen);
96 x += hLen;
104 /* generate mask of length modulus_len - hLen - 1 from hash */
105 if ((err = pkcs_1_mgf1(hash_idx, hash, hLen, mask, modulus_len - hLen - 1)) != CRYPT_OK)
    [all...]
pkcs_1_pss_encode.c 40 unsigned long x, y, hLen, modulus_len;
56 hLen = hash_descriptor[hash_idx].hashsize;
60 if ((saltlen > modulus_len) || (modulus_len < hLen + saltlen + 2)) {
112 /* generate DB = PS || 0x01 || salt, PS == modulus_len - saltlen - hLen - 2 zero bytes */
114 XMEMSET(DB + x, 0, modulus_len - saltlen - hLen - 2);
115 x += modulus_len - saltlen - hLen - 2;
120 /* generate mask of length modulus_len - hLen - 1 from hash */
121 if ((err = pkcs_1_mgf1(hash_idx, hash, hLen, mask, modulus_len - hLen - 1)) != CRYPT_OK) {
126 for (y = 0; y < (modulus_len - hLen - 1); y++)
    [all...]
  /external/openssl/crypto/rsa/
rsa_pss.c 78 int hLen, maskedDBLen, MSBits, emLen;
84 hLen = EVP_MD_size(Hash);
85 if (hLen < 0)
89 * -1 sLen == hLen
93 if (sLen == -1) sLen = hLen;
113 if (emLen < (hLen + sLen + 2)) /* sLen can be small negative */
123 maskedDBLen = emLen - hLen - 1;
131 if (PKCS1_MGF1(DB, maskedDBLen, H, hLen, Hash) < 0)
151 EVP_DigestUpdate(&ctx, mHash, hLen);
156 if (memcmp(H_, H, hLen))
    [all...]
  /external/bouncycastle/src/main/java/org/bouncycastle/crypto/generators/
PKCS5S2ParametersGenerator.java 86 int hLen = hMac.getMacSize();
87 int l = (dkLen + hLen - 1) / hLen;
89 byte[] out = new byte[l * hLen];
95 F(password, salt, iterationCount, iBuf, out, (i - 1) * hLen);
  /external/chromium/crypto/
symmetric_key_win.cc 406 DWORD hLen = 0;
407 DWORD param_size = sizeof(hLen);
409 reinterpret_cast<BYTE*>(&hLen), &param_size, 0);
410 if (!ok || hLen == 0)
413 // 1. If dkLen > (2^32 - 1) * hLen, output "derived key too long" and stop.
417 if ((dkLen / hLen) > 0xFFFFFFFF) {
422 // 2. Let l be the number of hLen-octet blocks in the derived key,
425 size_t L = (dkLen + hLen - 1) / hLen;
428 size_t total_generated_size = L * hLen;
    [all...]
  /external/dropbear/libtomcrypt/
crypt.tex     [all...]

Completed in 239 milliseconds