/external/wpa_supplicant_8/src/tls/ |
pkcs1.c | 16 static int pkcs1_generate_encryption_block(u8 block_type, size_t modlen, 30 * k = length of modulus in octets (modlen) 33 if (modlen < 12 || modlen > *outlen || inlen > modlen - 11) { 35 "lengths (modlen=%lu outlen=%lu inlen=%lu)", 36 __func__, (unsigned long) modlen, 45 ps_len = modlen - inlen - 3; 83 size_t modlen; local 85 modlen = crypto_rsa_get_modulus_len(key) [all...] |
rsa.c | 247 size_t modlen; local 306 modlen = crypto_rsa_get_modulus_len(key); 307 if (modlen > *outlen) { 308 *outlen = modlen; 312 if (bignum_get_unsigned_bin_len(tmp) > modlen) 315 *outlen = modlen; 316 os_memset(out, 0, modlen); 319 (modlen - bignum_get_unsigned_bin_len(tmp)), NULL) < 0)
|
/external/dropbear/libtomcrypt/testprof/ |
pkcs_1_test.c | 9 unsigned long x, y, l1, l2, l3, i1, i2, lparamlen, saltlen, modlen; local 37 modlen = 800 + (abs(rand()) % 224); 41 DO(pkcs_1_oaep_encode(buf[0], l3, lparam, lparamlen, modlen, &yarrow_prng, prng_idx, hash_idx, buf[1], &l1)); 45 DO(pkcs_1_oaep_decode(buf[1], l1, lparam, lparamlen, modlen, hash_idx, buf[2], &l2, &res1)); 63 DO(pkcs_1_pss_encode(buf[0], l3, saltlen, &yarrow_prng, prng_idx, hash_idx, modlen, buf[1], &l1)); 64 DO(pkcs_1_pss_decode(buf[0], l3, buf[1], l1, saltlen, hash_idx, modlen, &res1)); 67 DO(pkcs_1_pss_decode(buf[0], l3, buf[1], l1, saltlen, hash_idx, modlen, &res2)); 71 pkcs_1_pss_decode(buf[0], l3, buf[1], l1, saltlen, hash_idx, modlen, &res3);
|
/external/wpa_supplicant_6/wpa_supplicant/src/tls/ |
rsa.c | 256 size_t modlen; local 315 modlen = crypto_rsa_get_modulus_len(key); 316 if (modlen > *outlen) { 317 *outlen = modlen; 321 if (bignum_get_unsigned_bin_len(tmp) > modlen) 324 *outlen = modlen; 325 os_memset(out, 0, modlen); 328 (modlen - bignum_get_unsigned_bin_len(tmp)), NULL) < 0)
|
/external/openssh/ |
ssh-rsa.c | 115 u_int len, dlen, modlen; local 147 modlen = RSA_size(key->rsa); 148 if (len > modlen) { 149 error("ssh_rsa_verify: len %u > modlen %u", len, modlen); 152 } else if (len < modlen) { 153 u_int diff = modlen - len; 154 debug("ssh_rsa_verify: add padding: modlen %u > len %u", 155 modlen, len); 156 sigblob = xrealloc(sigblob, 1, modlen); [all...] |
/external/dropbear/ |
keyimport.c | 518 int modlen = -9999; local 639 modlen = len; 643 buf_putstring(blobbuf, modptr, modlen); [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/crypto/ |
crypto_internal.c | 569 static int pkcs1_generate_encryption_block(u8 block_type, size_t modlen, 583 * k = length of modulus in octets (modlen) 586 if (modlen < 12 || modlen > *outlen || inlen > modlen - 11) { 588 "lengths (modlen=%lu outlen=%lu inlen=%lu)", 589 __func__, (unsigned long) modlen, 598 ps_len = modlen - inlen - 3; 637 size_t modlen; local 639 modlen = crypto_rsa_get_modulus_len(key) [all...] |
crypto_libtomcrypt.c | 492 static int pkcs1_generate_encryption_block(u8 block_type, size_t modlen, 506 * k = length of modulus in octets (modlen) 509 if (modlen < 12 || modlen > *outlen || inlen > modlen - 11) { 511 "lengths (modlen=%lu outlen=%lu inlen=%lu)", 512 __func__, (unsigned long) modlen, 521 ps_len = modlen - inlen - 3; 559 unsigned long len, modlen; local 562 modlen = mp_unsigned_bin_size(key->N) [all...] |
/external/wpa_supplicant_8/src/crypto/ |
crypto_libtomcrypt.c | 486 static int pkcs1_generate_encryption_block(u8 block_type, size_t modlen, 500 * k = length of modulus in octets (modlen) 503 if (modlen < 12 || modlen > *outlen || inlen > modlen - 11) { 505 "lengths (modlen=%lu outlen=%lu inlen=%lu)", 506 __func__, (unsigned long) modlen, 515 ps_len = modlen - inlen - 3; 553 unsigned long len, modlen; local 556 modlen = mp_unsigned_bin_size(key->N) [all...] |