Home
last modified time | relevance | path

Searched refs:hLen (Results 1 – 4 of 4) sorted by relevance

/external/chromium_org/third_party/openssl/openssl/crypto/rsa/
Drsa_pss.c85 int hLen, maskedDBLen, MSBits, emLen; in RSA_verify_PKCS1_PSS_mgf1() local
95 hLen = EVP_MD_size(Hash); in RSA_verify_PKCS1_PSS_mgf1()
96 if (hLen < 0) in RSA_verify_PKCS1_PSS_mgf1()
104 if (sLen == -1) sLen = hLen; in RSA_verify_PKCS1_PSS_mgf1()
124 if (emLen < (hLen + sLen + 2)) /* sLen can be small negative */ in RSA_verify_PKCS1_PSS_mgf1()
134 maskedDBLen = emLen - hLen - 1; in RSA_verify_PKCS1_PSS_mgf1()
142 if (PKCS1_MGF1(DB, maskedDBLen, H, hLen, mgf1Hash) < 0) in RSA_verify_PKCS1_PSS_mgf1()
161 || !EVP_DigestUpdate(&ctx, mHash, hLen)) in RSA_verify_PKCS1_PSS_mgf1()
170 if (memcmp(H_, H, hLen)) in RSA_verify_PKCS1_PSS_mgf1()
200 int hLen, maskedDBLen, MSBits, emLen; in RSA_padding_add_PKCS1_PSS_mgf1() local
[all …]
/external/openssl/crypto/rsa/
Drsa_pss.c85 int hLen, maskedDBLen, MSBits, emLen; in RSA_verify_PKCS1_PSS_mgf1() local
95 hLen = EVP_MD_size(Hash); in RSA_verify_PKCS1_PSS_mgf1()
96 if (hLen < 0) in RSA_verify_PKCS1_PSS_mgf1()
104 if (sLen == -1) sLen = hLen; in RSA_verify_PKCS1_PSS_mgf1()
124 if (emLen < (hLen + sLen + 2)) /* sLen can be small negative */ in RSA_verify_PKCS1_PSS_mgf1()
134 maskedDBLen = emLen - hLen - 1; in RSA_verify_PKCS1_PSS_mgf1()
142 if (PKCS1_MGF1(DB, maskedDBLen, H, hLen, mgf1Hash) < 0) in RSA_verify_PKCS1_PSS_mgf1()
161 || !EVP_DigestUpdate(&ctx, mHash, hLen)) in RSA_verify_PKCS1_PSS_mgf1()
170 if (memcmp(H_, H, hLen)) in RSA_verify_PKCS1_PSS_mgf1()
200 int hLen, maskedDBLen, MSBits, emLen; in RSA_padding_add_PKCS1_PSS_mgf1() local
[all …]
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/generators/
DPKCS5S2ParametersGenerator.java81 int hLen = hMac.getMacSize(); in generateDerivedKey() local
82 int l = (dkLen + hLen - 1) / hLen; in generateDerivedKey()
84 byte[] outBytes = new byte[l * hLen]; in generateDerivedKey()
101 outPos += hLen; in generateDerivedKey()
/external/chromium_org/crypto/
Dsymmetric_key_win.cc406 DWORD hLen = 0; in DeriveKeyFromPassword() local
407 DWORD param_size = sizeof(hLen); in DeriveKeyFromPassword()
409 reinterpret_cast<BYTE*>(&hLen), &param_size, 0); in DeriveKeyFromPassword()
410 if (!ok || hLen == 0) in DeriveKeyFromPassword()
417 if ((dkLen / hLen) > 0xFFFFFFFF) { in DeriveKeyFromPassword()
425 size_t L = (dkLen + hLen - 1) / hLen; in DeriveKeyFromPassword()
428 size_t total_generated_size = L * hLen; in DeriveKeyFromPassword()
444 if (!ComputePBKDF2Block(prf, hLen, salt, iterations, block_index, in DeriveKeyFromPassword()
447 block_offset += hLen; in DeriveKeyFromPassword()