HomeSort by relevance Sort by last modified time
    Searched refs:hLen (Results 1 - 5 of 5) sorted by null

  /external/openssl/crypto/rsa/
rsa_pss.c 85 int hLen, maskedDBLen, MSBits, emLen;
95 hLen = EVP_MD_size(Hash);
96 if (hLen < 0)
100 * -1 sLen == hLen
104 if (sLen == -1) sLen = hLen;
124 if (emLen < (hLen + sLen + 2)) /* sLen can be small negative */
134 maskedDBLen = emLen - hLen - 1;
142 if (PKCS1_MGF1(DB, maskedDBLen, H, hLen, mgf1Hash) < 0)
161 || !EVP_DigestUpdate(&ctx, mHash, hLen))
170 if (memcmp(H_, H, hLen))
    [all...]
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/generators/
PKCS5S2ParametersGenerator.java 81 int hLen = hMac.getMacSize();
82 int l = (dkLen + hLen - 1) / hLen;
84 byte[] outBytes = new byte[l * hLen];
101 outPos += hLen;
  /external/chromium_org/third_party/boringssl/src/crypto/rsa/
padding.c 554 size_t hLen;
565 hLen = EVP_MD_size(Hash);
568 * -1 sLen == hLen
572 sLen = hLen;
591 if (emLen < ((int)hLen + sLen + 2)) {
600 maskedDBLen = emLen - hLen - 1;
607 if (PKCS1_MGF1(DB, maskedDBLen, H, hLen, mgf1Hash) < 0) {
629 !EVP_DigestUpdate(&ctx, mHash, hLen)) {
640 if (memcmp(H_, H, hLen)) {
663 size_t hLen;
    [all...]
  /external/chromium_org/crypto/
symmetric_key_win.cc 406 DWORD hLen = 0;
407 DWORD param_size = sizeof(hLen);
409 reinterpret_cast<BYTE*>(&hLen), &param_size, 0);
410 if (!ok || hLen == 0)
413 // 1. If dkLen > (2^32 - 1) * hLen, output "derived key too long" and stop.
417 if ((dkLen / hLen) > 0xFFFFFFFF) {
422 // 2. Let l be the number of hLen-octet blocks in the derived key,
425 size_t L = (dkLen + hLen - 1) / hLen;
428 size_t total_generated_size = L * hLen;
    [all...]
  /external/google-tv-pairing-protocol/java/jar/
bcprov-jdk15-143.jar 

Completed in 856 milliseconds