Searched refs:hLen (Results 1 – 4 of 4) sorted by relevance
/external/chromium_org/third_party/openssl/openssl/crypto/rsa/ |
D | rsa_pss.c | 85 int hLen, maskedDBLen, MSBits, emLen; in RSA_verify_PKCS1_PSS_mgf1() local 95 hLen = EVP_MD_size(Hash); in RSA_verify_PKCS1_PSS_mgf1() 96 if (hLen < 0) in RSA_verify_PKCS1_PSS_mgf1() 104 if (sLen == -1) sLen = hLen; in RSA_verify_PKCS1_PSS_mgf1() 124 if (emLen < (hLen + sLen + 2)) /* sLen can be small negative */ in RSA_verify_PKCS1_PSS_mgf1() 134 maskedDBLen = emLen - hLen - 1; in RSA_verify_PKCS1_PSS_mgf1() 142 if (PKCS1_MGF1(DB, maskedDBLen, H, hLen, mgf1Hash) < 0) in RSA_verify_PKCS1_PSS_mgf1() 161 || !EVP_DigestUpdate(&ctx, mHash, hLen)) in RSA_verify_PKCS1_PSS_mgf1() 170 if (memcmp(H_, H, hLen)) in RSA_verify_PKCS1_PSS_mgf1() 200 int hLen, maskedDBLen, MSBits, emLen; in RSA_padding_add_PKCS1_PSS_mgf1() local [all …]
|
/external/openssl/crypto/rsa/ |
D | rsa_pss.c | 85 int hLen, maskedDBLen, MSBits, emLen; in RSA_verify_PKCS1_PSS_mgf1() local 95 hLen = EVP_MD_size(Hash); in RSA_verify_PKCS1_PSS_mgf1() 96 if (hLen < 0) in RSA_verify_PKCS1_PSS_mgf1() 104 if (sLen == -1) sLen = hLen; in RSA_verify_PKCS1_PSS_mgf1() 124 if (emLen < (hLen + sLen + 2)) /* sLen can be small negative */ in RSA_verify_PKCS1_PSS_mgf1() 134 maskedDBLen = emLen - hLen - 1; in RSA_verify_PKCS1_PSS_mgf1() 142 if (PKCS1_MGF1(DB, maskedDBLen, H, hLen, mgf1Hash) < 0) in RSA_verify_PKCS1_PSS_mgf1() 161 || !EVP_DigestUpdate(&ctx, mHash, hLen)) in RSA_verify_PKCS1_PSS_mgf1() 170 if (memcmp(H_, H, hLen)) in RSA_verify_PKCS1_PSS_mgf1() 200 int hLen, maskedDBLen, MSBits, emLen; in RSA_padding_add_PKCS1_PSS_mgf1() local [all …]
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/generators/ |
D | PKCS5S2ParametersGenerator.java | 81 int hLen = hMac.getMacSize(); in generateDerivedKey() local 82 int l = (dkLen + hLen - 1) / hLen; in generateDerivedKey() 84 byte[] outBytes = new byte[l * hLen]; in generateDerivedKey() 101 outPos += hLen; in generateDerivedKey()
|
/external/chromium_org/crypto/ |
D | symmetric_key_win.cc | 406 DWORD hLen = 0; in DeriveKeyFromPassword() local 407 DWORD param_size = sizeof(hLen); in DeriveKeyFromPassword() 409 reinterpret_cast<BYTE*>(&hLen), ¶m_size, 0); in DeriveKeyFromPassword() 410 if (!ok || hLen == 0) in DeriveKeyFromPassword() 417 if ((dkLen / hLen) > 0xFFFFFFFF) { in DeriveKeyFromPassword() 425 size_t L = (dkLen + hLen - 1) / hLen; in DeriveKeyFromPassword() 428 size_t total_generated_size = L * hLen; in DeriveKeyFromPassword() 444 if (!ComputePBKDF2Block(prf, hLen, salt, iterations, block_index, in DeriveKeyFromPassword() 447 block_offset += hLen; in DeriveKeyFromPassword()
|