Home
last modified time | relevance | path

Searched refs:hLen (Results 1 – 8 of 8) sorted by relevance

/external/ms-tpm-20-ref/TPMCmd/tpm/src/crypt/
DCryptRsa.c333 UINT16 hLen = CryptHashGetDigestSize(hashAlg); in OaepEncode() local
343 if(hLen == 0) in OaepEncode()
348 if(padded->size < (2 * hLen) + 2) in OaepEncode()
352 if(message->size > (padded->size - (2 * hLen) - 2)) in OaepEncode()
357 pp = &padded->buffer[hLen + 1]; in OaepEncode()
359 hLen, pp) != hLen) in OaepEncode()
363 padLen = padded->size - message->size - (2 * hLen) - 2; in OaepEncode()
364 MemorySet(&pp[hLen], 0, padLen); in OaepEncode()
365 pp[hLen + padLen] = 0x01; in OaepEncode()
367 memcpy(&pp[hLen + padLen], message->buffer, message->size); in OaepEncode()
[all …]
DCryptHash.c680 UINT32 hLen; in CryptMGF_KDF() local
688 hLen = hDef->digestSize; in CryptMGF_KDF()
689 for(bytes = 0; bytes < mSize; bytes += hLen) in CryptMGF_KDF()
696 CryptHashEnd(&hashState, MIN((mSize - bytes), hLen), in CryptMGF_KDF()
841 UINT16 hLen; in CryptKDFe() local
847 hLen = hashDef->digestSize; in CryptKDFe()
865 for(; bytes > 0; stream = &stream[hLen], bytes = bytes - hLen) in CryptKDFe()
867 if(bytes < hLen) in CryptKDFe()
868 hLen = bytes; in CryptKDFe()
900 CryptHashEnd(&hashState, hLen, stream); in CryptKDFe()
DCryptUtil.c372 UINT16 hLen = CryptHashGetDigestSize(hash); in CryptXORObfuscation() local
376 pAssert((key != NULL) && (data != NULL) && (hLen != 0)); in CryptXORObfuscation()
379 for(; remainBytes > 0; remainBytes -= hLen) in CryptXORObfuscation()
387 for(i = hLen < remainBytes ? hLen : remainBytes; i > 0; i--) in CryptXORObfuscation()
/external/rust/crates/quiche/deps/boringssl/src/crypto/fipsmodule/rsa/
Dpadding.c492 size_t hLen; in RSA_verify_PKCS1_PSS_mgf1() local
503 hLen = EVP_MD_size(Hash); in RSA_verify_PKCS1_PSS_mgf1()
510 sLen = hLen; in RSA_verify_PKCS1_PSS_mgf1()
528 if (emLen < (int)hLen + 2 || emLen < ((int)hLen + sLen + 2)) { in RSA_verify_PKCS1_PSS_mgf1()
537 maskedDBLen = emLen - hLen - 1; in RSA_verify_PKCS1_PSS_mgf1()
544 if (!PKCS1_MGF1(DB, maskedDBLen, H, hLen, mgf1Hash)) { in RSA_verify_PKCS1_PSS_mgf1()
566 !EVP_DigestUpdate(&ctx, mHash, hLen) || in RSA_verify_PKCS1_PSS_mgf1()
571 if (OPENSSL_memcmp(H_, H, hLen)) { in RSA_verify_PKCS1_PSS_mgf1()
591 size_t hLen; in RSA_padding_add_PKCS1_PSS_mgf1() local
598 hLen = EVP_MD_size(Hash); in RSA_padding_add_PKCS1_PSS_mgf1()
[all …]
/external/boringssl/src/crypto/fipsmodule/rsa/
Dpadding.c492 size_t hLen; in RSA_verify_PKCS1_PSS_mgf1() local
503 hLen = EVP_MD_size(Hash); in RSA_verify_PKCS1_PSS_mgf1()
510 sLen = hLen; in RSA_verify_PKCS1_PSS_mgf1()
528 if (emLen < (int)hLen + 2 || emLen < ((int)hLen + sLen + 2)) { in RSA_verify_PKCS1_PSS_mgf1()
537 maskedDBLen = emLen - hLen - 1; in RSA_verify_PKCS1_PSS_mgf1()
544 if (!PKCS1_MGF1(DB, maskedDBLen, H, hLen, mgf1Hash)) { in RSA_verify_PKCS1_PSS_mgf1()
566 !EVP_DigestUpdate(&ctx, mHash, hLen) || in RSA_verify_PKCS1_PSS_mgf1()
571 if (OPENSSL_memcmp(H_, H, hLen)) { in RSA_verify_PKCS1_PSS_mgf1()
591 size_t hLen; in RSA_padding_add_PKCS1_PSS_mgf1() local
598 hLen = EVP_MD_size(Hash); in RSA_padding_add_PKCS1_PSS_mgf1()
[all …]
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/generators/
DPKCS5S2ParametersGenerator.java82 int hLen = hMac.getMacSize(); in generateDerivedKey() local
83 int l = (dkLen + hLen - 1) / hLen; in generateDerivedKey()
85 byte[] outBytes = new byte[l * hLen]; in generateDerivedKey()
102 outPos += hLen; in generateDerivedKey()
/external/bouncycastle/repackaged/bcprov/src/main/java/com/android/org/bouncycastle/crypto/generators/
DPKCS5S2ParametersGenerator.java84 int hLen = hMac.getMacSize(); in generateDerivedKey() local
85 int l = (dkLen + hLen - 1) / hLen; in generateDerivedKey()
87 byte[] outBytes = new byte[l * hLen]; in generateDerivedKey()
104 outPos += hLen; in generateDerivedKey()
/external/bouncycastle/repackaged_platform/bcprov/src/main/java/com/android/internal/org/bouncycastle/crypto/generators/
DPKCS5S2ParametersGenerator.java84 int hLen = hMac.getMacSize(); in generateDerivedKey() local
85 int l = (dkLen + hLen - 1) / hLen; in generateDerivedKey()
87 byte[] outBytes = new byte[l * hLen]; in generateDerivedKey()
104 outPos += hLen; in generateDerivedKey()