Home
last modified time | relevance | path

Searched refs:hLen (Results 1 – 12 of 12) sorted by relevance

/external/tpm2/
Dstubs_hash.c98 INT16 hLen; // length of the hash in _cpri__KDFa() local
118 if((hLen = (INT16) _cpri__GetDigestSize(hashAlg)) == 0) in _cpri__KDFa()
123 bytes = once ? hLen : (INT16)((sizeInBits + 7) / 8); in _cpri__KDFa()
125 for (; bytes > 0; stream = &stream[hLen], bytes = bytes - hLen) in _cpri__KDFa()
127 if(bytes < hLen) in _cpri__KDFa()
128 hLen = bytes; in _cpri__KDFa()
156 _cpri__CompleteHMAC(&hashState, &hmacKey.b, hLen, stream); in _cpri__KDFa()
180 INT16 hLen = (INT16) _cpri__GetDigestSize(hashAlg); in _cpri__KDFe() local
186 if(hLen == 0) in _cpri__KDFe()
205 for (; bytes > 0; stream = &stream[hLen], bytes = bytes - hLen) in _cpri__KDFe()
[all …]
DCpriRSA.c349 INT32 hLen = _cpri__GetDigestSize(hashAlg); in OaepEncode() local
358 if(hLen <= 0) in OaepEncode()
366 if(messageSize > paddedSize - 2 * hLen - 2) in OaepEncode()
370 pp = &padded[hLen + 1]; in OaepEncode()
371 retVal = _cpri__HashBlock(hashAlg, lSize, (BYTE *)label, hLen, pp); in OaepEncode()
373 padLen = paddedSize - messageSize - (2 * hLen) - 2; in OaepEncode()
374 memset(&pp[hLen], 0, padLen); in OaepEncode()
375 pp[hLen+padLen] = 0x01; in OaepEncode()
377 memcpy(&pp[hLen+padLen], message, messageSize); in OaepEncode()
379 dbSize = hLen+padLen+messageSize; in OaepEncode()
[all …]
DCpriHash.c416 int hLen; in _cpri__CompleteHash() local
429 hLen = EVP_MD_CTX_size(context); in _cpri__CompleteHash()
430 if((unsigned)hLen > dOutSize) in _cpri__CompleteHash()
444 retVal = (UINT16)hLen; in _cpri__CompleteHash()
765 INT16 hLen; // length of the hash in _cpri__KDFa() local
785 if((hLen = (INT16) _cpri__GetDigestSize(hashAlg)) == 0) in _cpri__KDFa()
790 bytes = once ? hLen : (INT16)((sizeInBits + 7) / 8); in _cpri__KDFa()
792 for (; bytes > 0; stream = &stream[hLen], bytes = bytes - hLen) in _cpri__KDFa()
794 if(bytes < hLen) in _cpri__KDFa()
795 hLen = bytes; in _cpri__KDFa()
[all …]
DCryptUtil.c1992 UINT16 hLen = CryptGetHashDigestSize(hash); in CryptXORObfuscation() local
1995 pAssert((key != NULL) && (data != NULL) && (hLen != 0)); in CryptXORObfuscation()
1997 for(; remainBytes > 0; remainBytes -= hLen) in CryptXORObfuscation()
2004 for(i = hLen < remainBytes ? hLen : remainBytes; i > 0; i--) in CryptXORObfuscation()
Dpart4.txt21702 1584 UINT16 hLen = CryptGetHashDigestSize(hash);
21706 1588 pAssert((key != NULL) && (data != NULL) && (hLen != 0));
21709 1591 for(; remainBytes > 0; remainBytes -= hLen)
21717 1599 for(i = hLen < remainBytes ? hLen : remainBytes; i > 0; i--)
26913 288 int hLen;
26933 303 hLen = EVP_MD_CTX_size(context);
26934 304 if((unsigned)hLen > dOutSize)
26948 318 retVal = (UINT16)hLen;
27316 579 INT16 hLen; // length of the hash
27345 602 if((hLen = (INT16) _cpri__GetDigestSize(hashAlg)) == 0)
[all …]
DCpriECC.c680 UINT16 hLen = _cpri__GetDigestSize(hashAlg); in _cpri__GenerateKeyEcc() local
691 if(hLen <= 0) in _cpri__GenerateKeyEcc()
Dpart3.txt4873 TPM_ALG_OAEP mLen  k – 2hLen – 2
4880 2) hLen ≔ the number of octets in the digest produced by the hash algorithm used in the process
/external/boringssl/src/crypto/rsa/
Dpadding.c499 size_t hLen; in RSA_verify_PKCS1_PSS_mgf1() local
510 hLen = EVP_MD_size(Hash); in RSA_verify_PKCS1_PSS_mgf1()
517 sLen = hLen; in RSA_verify_PKCS1_PSS_mgf1()
535 if (emLen < ((int)hLen + sLen + 2)) { in RSA_verify_PKCS1_PSS_mgf1()
544 maskedDBLen = emLen - hLen - 1; in RSA_verify_PKCS1_PSS_mgf1()
551 if (PKCS1_MGF1(DB, maskedDBLen, H, hLen, mgf1Hash) < 0) { in RSA_verify_PKCS1_PSS_mgf1()
573 !EVP_DigestUpdate(&ctx, mHash, hLen)) { in RSA_verify_PKCS1_PSS_mgf1()
584 if (memcmp(H_, H, hLen)) { in RSA_verify_PKCS1_PSS_mgf1()
605 size_t hLen; in RSA_padding_add_PKCS1_PSS_mgf1() local
613 hLen = EVP_MD_size(Hash); in RSA_padding_add_PKCS1_PSS_mgf1()
[all …]
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/generators/
DPKCS5S2ParametersGenerator.java82 int hLen = hMac.getMacSize(); in generateDerivedKey() local
83 int l = (dkLen + hLen - 1) / hLen; in generateDerivedKey()
85 byte[] outBytes = new byte[l * hLen]; in generateDerivedKey()
102 outPos += hLen; in generateDerivedKey()
/external/libchrome/crypto/
Dsymmetric_key_win.cc409 DWORD hLen = 0; in DeriveKeyFromPassword() local
410 DWORD param_size = sizeof(hLen); in DeriveKeyFromPassword()
412 reinterpret_cast<BYTE*>(&hLen), &param_size, 0); in DeriveKeyFromPassword()
413 if (!ok || hLen == 0) in DeriveKeyFromPassword()
420 if ((dkLen / hLen) > 0xFFFFFFFF) { in DeriveKeyFromPassword()
428 size_t L = (dkLen + hLen - 1) / hLen; in DeriveKeyFromPassword()
431 size_t total_generated_size = L * hLen; in DeriveKeyFromPassword()
447 if (!ComputePBKDF2Block(prf, hLen, salt, iterations, block_index, in DeriveKeyFromPassword()
450 block_offset += hLen; in DeriveKeyFromPassword()
/external/tpm2/generator/
Draw_commands_fixed.txt8345 mLen  k – 2hLen – 2
8366 hLen ≔ the number of octets in the digest produced by the hash algorithm used in the process
Draw_commands.txt8334 mLen  k – 2hLen – 2
8355 hLen ≔ the number of octets in the digest produced by the hash algorithm used in the process