HomeSort by relevance Sort by last modified time
    Searched defs:hLen (Results 1 - 10 of 10) sorted by null

  /external/dropbear/libtomcrypt/src/pk/pkcs1/
pkcs_1_mgf1.c 33 unsigned long hLen, x;
48 hLen = hash_descriptor[hash_idx].hashsize;
52 buf = XMALLOC(hLen);
86 for (x = 0; x < hLen && masklen > 0; x++, masklen--) {
94 zeromem(buf, hLen);
pkcs_1_oaep_decode.c 40 unsigned long hLen, x, y, modulus_len;
55 hLen = hash_descriptor[hash_idx].hashsize;
59 if ((2*hLen >= (modulus_len - 2)) || (msglen != modulus_len)) {
66 seed = XMALLOC(hLen);
84 1 || hLen || modulus_len - hLen - 1
96 XMEMCPY(seed, msg + x, hLen);
97 x += hLen;
100 XMEMCPY(DB, msg + x, modulus_len - hLen - 1);
101 x += modulus_len - hLen - 1
    [all...]
pkcs_1_oaep_encode.c 41 unsigned long hLen, x, y, modulus_len;
58 hLen = hash_descriptor[hash_idx].hashsize;
62 if ((2*hLen >= (modulus_len - 2)) || (msglen > (modulus_len - 2*hLen - 2))) {
69 seed = XMALLOC(hLen);
84 /* DB == lhash || PS || 0x01 || M, PS == k - mlen - 2hlen - 2 zeroes */
98 x = hLen;
99 y = modulus_len - msglen - 2*hLen - 2;
111 if (prng_descriptor[prng_idx].read(seed, hLen, prng) != hLen) {
    [all...]
pkcs_1_pss_decode.c 38 unsigned long x, y, hLen, modulus_len;
53 hLen = hash_descriptor[hash_idx].hashsize;
58 (modulus_len < hLen + saltlen + 2) || (siglen != modulus_len)) {
91 XMEMCPY(DB, sig + x, modulus_len - hLen - 1);
92 x += modulus_len - hLen - 1;
95 XMEMCPY(hash, sig + x, hLen);
96 x += hLen;
104 /* generate mask of length modulus_len - hLen - 1 from hash */
105 if ((err = pkcs_1_mgf1(hash_idx, hash, hLen, mask, modulus_len - hLen - 1)) != CRYPT_OK)
    [all...]
pkcs_1_pss_encode.c 40 unsigned long x, y, hLen, modulus_len;
56 hLen = hash_descriptor[hash_idx].hashsize;
60 if ((saltlen > modulus_len) || (modulus_len < hLen + saltlen + 2)) {
112 /* generate DB = PS || 0x01 || salt, PS == modulus_len - saltlen - hLen - 2 zero bytes */
114 XMEMSET(DB + x, 0, modulus_len - saltlen - hLen - 2);
115 x += modulus_len - saltlen - hLen - 2;
120 /* generate mask of length modulus_len - hLen - 1 from hash */
121 if ((err = pkcs_1_mgf1(hash_idx, hash, hLen, mask, modulus_len - hLen - 1)) != CRYPT_OK) {
126 for (y = 0; y < (modulus_len - hLen - 1); y++)
    [all...]
  /external/chromium_org/third_party/openssl/openssl/crypto/rsa/
rsa_pss.c 85 int hLen, maskedDBLen, MSBits, emLen;
95 hLen = EVP_MD_size(Hash);
96 if (hLen < 0)
100 * -1 sLen == hLen
104 if (sLen == -1) sLen = hLen;
124 if (emLen < (hLen + sLen + 2)) /* sLen can be small negative */
134 maskedDBLen = emLen - hLen - 1;
142 if (PKCS1_MGF1(DB, maskedDBLen, H, hLen, mgf1Hash) < 0)
161 || !EVP_DigestUpdate(&ctx, mHash, hLen))
170 if (memcmp(H_, H, hLen))
    [all...]
  /external/openssl/crypto/rsa/
rsa_pss.c 85 int hLen, maskedDBLen, MSBits, emLen;
95 hLen = EVP_MD_size(Hash);
96 if (hLen < 0)
100 * -1 sLen == hLen
104 if (sLen == -1) sLen = hLen;
124 if (emLen < (hLen + sLen + 2)) /* sLen can be small negative */
134 maskedDBLen = emLen - hLen - 1;
142 if (PKCS1_MGF1(DB, maskedDBLen, H, hLen, mgf1Hash) < 0)
161 || !EVP_DigestUpdate(&ctx, mHash, hLen))
170 if (memcmp(H_, H, hLen))
    [all...]
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/generators/
PKCS5S2ParametersGenerator.java 81 int hLen = hMac.getMacSize();
82 int l = (dkLen + hLen - 1) / hLen;
84 byte[] outBytes = new byte[l * hLen];
101 outPos += hLen;
  /prebuilts/devtools/tools/lib/
bcprov-jdk15on-1.48.jar 
  /prebuilts/tools/common/m2/repository/org/bouncycastle/bcprov-jdk15on/1.48/
bcprov-jdk15on-1.48.jar 

Completed in 2086 milliseconds