Home | History | Annotate | Download | only in rsa

Lines Matching defs:mdlen

324   size_t mdlen = EVP_MD_size(md);
326 if (to_len < 2 * mdlen + 2) {
332 if (from_len > emlen - 2 * mdlen - 1) {
337 if (emlen < 2 * mdlen + 1) {
344 uint8_t *db = to + mdlen + 1;
349 OPENSSL_memset(db + mdlen, 0, emlen - from_len - 2 * mdlen - 1);
350 db[emlen - from_len - mdlen - 1] = 0x01;
351 OPENSSL_memcpy(db + emlen - from_len - mdlen, from, from_len);
352 if (!RAND_bytes(seed, mdlen)) {
356 uint8_t *dbmask = OPENSSL_malloc(emlen - mdlen);
363 if (!PKCS1_MGF1(dbmask, emlen - mdlen, seed, mdlen, mgf1md)) {
366 for (size_t i = 0; i < emlen - mdlen; i++) {
371 if (!PKCS1_MGF1(seedmask, mdlen, db, emlen - mdlen, mgf1md)) {
374 for (size_t i = 0; i < mdlen; i++) {
398 size_t mdlen = EVP_MD_size(md);
403 if (from_len < 1 + 2*mdlen + 1) {
409 size_t dblen = from_len - mdlen - 1;
417 const uint8_t *maskeddb = from + 1 + mdlen;
420 if (!PKCS1_MGF1(seed, mdlen, maskeddb, dblen, mgf1md)) {
423 for (size_t i = 0; i < mdlen; i++) {
427 if (!PKCS1_MGF1(db, dblen, seed, mdlen, mgf1md)) {
439 crypto_word_t bad = ~constant_time_is_zero_w(CRYPTO_memcmp(db, phash, mdlen));
444 for (size_t i = mdlen; i < dblen; i++) {