Searched refs:hLen (Results 1 – 3 of 3) sorted by relevance
/third_party/node/deps/openssl/openssl/crypto/rsa/ |
D | rsa_pss.c | 44 int hLen, maskedDBLen, MSBits, emLen; in RSA_verify_PKCS1_PSS_mgf1() local 56 hLen = EVP_MD_get_size(Hash); in RSA_verify_PKCS1_PSS_mgf1() 57 if (hLen < 0) in RSA_verify_PKCS1_PSS_mgf1() 67 sLen = hLen; in RSA_verify_PKCS1_PSS_mgf1() 83 if (emLen < hLen + 2) { in RSA_verify_PKCS1_PSS_mgf1() 88 sLen = emLen - hLen - 2; in RSA_verify_PKCS1_PSS_mgf1() 89 } else if (sLen > emLen - hLen - 2) { /* sLen can be small negative */ in RSA_verify_PKCS1_PSS_mgf1() 97 maskedDBLen = emLen - hLen - 1; in RSA_verify_PKCS1_PSS_mgf1() 104 if (PKCS1_MGF1(DB, maskedDBLen, H, hLen, mgf1Hash) < 0) in RSA_verify_PKCS1_PSS_mgf1() 123 || !EVP_DigestUpdate(ctx, mHash, hLen)) in RSA_verify_PKCS1_PSS_mgf1() [all …]
|
/third_party/openssl/crypto/rsa/ |
D | rsa_pss.c | 44 int hLen, maskedDBLen, MSBits, emLen; in RSA_verify_PKCS1_PSS_mgf1() local 56 hLen = EVP_MD_get_size(Hash); in RSA_verify_PKCS1_PSS_mgf1() 57 if (hLen < 0) in RSA_verify_PKCS1_PSS_mgf1() 67 sLen = hLen; in RSA_verify_PKCS1_PSS_mgf1() 83 if (emLen < hLen + 2) { in RSA_verify_PKCS1_PSS_mgf1() 88 sLen = emLen - hLen - 2; in RSA_verify_PKCS1_PSS_mgf1() 89 } else if (sLen > emLen - hLen - 2) { /* sLen can be small negative */ in RSA_verify_PKCS1_PSS_mgf1() 97 maskedDBLen = emLen - hLen - 1; in RSA_verify_PKCS1_PSS_mgf1() 104 if (PKCS1_MGF1(DB, maskedDBLen, H, hLen, mgf1Hash) < 0) in RSA_verify_PKCS1_PSS_mgf1() 123 || !EVP_DigestUpdate(ctx, mHash, hLen)) in RSA_verify_PKCS1_PSS_mgf1() [all …]
|
/third_party/node/test/parallel/ |
D | test-crypto-sign-verify.js | 155 function testPSS(algo, hLen) { argument 157 const max = keySize / 8 - hLen - 2; 162 return hLen;
|