Home | History | Annotate | Download | only in tpm2

Lines Matching refs:padded

327 //      This function performs OAEP padding. The size of the buffer to receive the OAEP padded data must
339 BYTE *padded, // OUT: the pad data
343 BYTE *message // IN: the message being padded
360 pAssert(padded != NULL && message != NULL);
374 // Offset into padded leaving room for masked seed and byte of zero
375 pp = &padded[hLen + 1];
401 pp = &padded[hLen + 1];
403 if((retVal = _cpri__MGF1(hLen, &padded[1], hashAlg, dbSize, pp)) < 0)
407 pp = &padded[1];
412 *padded = 0x00;
436 UINT32 paddedSize, // IN: the size of the padded data
437 BYTE *padded // IN: the padded data
450 pAssert(hLen > 0 && dataOutSize != NULL && dataOut != NULL && padded != NULL);
458 // Strange size (anything smaller can't be an OAEP padded block)
460 if(paddedSize < (unsigned)((2 * hLen) + 2) || *padded != 0)
465 paddedSize-hLen-1, &padded[hLen+1])) < 0)
468 pp = &padded[1];
476 // Use the mask generated from seed to recover the padded data
477 pp = &padded[hLen+1];
529 BYTE *padded, // OUT: the pad data
531 BYTE *message // IN: the message being padded
538 memcpy(&padded[paddedSize - messageSize], message, messageSize);
540 *padded = 0;
541 padded[1] = 2;
543 _cpri__GenerateRandom(ps, &padded[2]);
545 padded[2+ps] = 0;
550 if(padded[ps] == 0)
551 padded[ps] = 0x55; // In the < 0.5% of the cases that the random