Home | History | Annotate | Download | only in testprof

Lines Matching defs:len2

130    unsigned long rsa_msgsize, len, len2, cnt;
190 len2 = rsa_msgsize;
195 DO(rsa_decrypt_key(out, len, tmp, &len2, NULL, 0, hash_idx, &stat2, &key));
198 if (len2 != rsa_msgsize) {
199 fprintf(stderr, "\nrsa_decrypt_key mismatch len %lu (first decrypt)", len2);
203 len2 = rsa_msgsize;
204 DO(rsa_decrypt_key(out, len, tmp, &len2, NULL, 0, hash_idx, &stat, &key));
209 if (len2 != rsa_msgsize || memcmp(tmp, in, rsa_msgsize)) {
211 fprintf(stderr, "\nrsa_decrypt_key mismatch, len %lu (second decrypt)\n", len2);
236 len2 = rsa_msgsize;
240 DO(rsa_decrypt_key(out, len, tmp, &len2, lparam, sizeof(lparam), hash_idx, &stat2, &key));
241 if (len2 != rsa_msgsize) {
242 fprintf(stderr, "\nrsa_decrypt_key mismatch len %lu (first decrypt)", len2);
248 len2 = rsa_msgsize;
249 DO(rsa_decrypt_key(out, len, tmp, &len2, lparam, sizeof(lparam), hash_idx, &stat, &key));
254 if (len2 != rsa_msgsize || memcmp(tmp, in, rsa_msgsize)) {
255 fprintf(stderr, "rsa_decrypt_key mismatch len %lu", len2);
263 len2 = rsa_msgsize;
266 len2 = rsa_msgsize;
267 DO(rsa_decrypt_key_ex(out, len, tmp, &len2, NULL, 0, 0, LTC_PKCS_1_V1_5, &stat, &key));
272 if (len2 != rsa_msgsize || memcmp(tmp, in, rsa_msgsize)) {
273 fprintf(stderr, "rsa_decrypt_key_ex mismatch len %lu", len2);
283 len2 = sizeof(tmp);
284 DO(rsa_export(tmp, &len2, PK_PRIVATE, &key));
285 DO(rsa_import(tmp, len2, &privKey));
286 len2 = sizeof(tmp);
287 DO(rsa_export(tmp, &len2, PK_PUBLIC, &key));
288 DO(rsa_import(tmp, len2, &pubKey));