/external/tpm2/ |
D | stubs_hash.c | 98 INT16 hLen; // length of the hash in _cpri__KDFa() local 118 if((hLen = (INT16) _cpri__GetDigestSize(hashAlg)) == 0) in _cpri__KDFa() 123 bytes = once ? hLen : (INT16)((sizeInBits + 7) / 8); in _cpri__KDFa() 125 for (; bytes > 0; stream = &stream[hLen], bytes = bytes - hLen) in _cpri__KDFa() 127 if(bytes < hLen) in _cpri__KDFa() 128 hLen = bytes; in _cpri__KDFa() 156 _cpri__CompleteHMAC(&hashState, &hmacKey.b, hLen, stream); in _cpri__KDFa() 180 INT16 hLen = (INT16) _cpri__GetDigestSize(hashAlg); in _cpri__KDFe() local 186 if(hLen == 0) in _cpri__KDFe() 205 for (; bytes > 0; stream = &stream[hLen], bytes = bytes - hLen) in _cpri__KDFe() [all …]
|
D | CpriRSA.c | 349 INT32 hLen = _cpri__GetDigestSize(hashAlg); in OaepEncode() local 358 if(hLen <= 0) in OaepEncode() 366 if(messageSize > paddedSize - 2 * hLen - 2) in OaepEncode() 370 pp = &padded[hLen + 1]; in OaepEncode() 371 retVal = _cpri__HashBlock(hashAlg, lSize, (BYTE *)label, hLen, pp); in OaepEncode() 373 padLen = paddedSize - messageSize - (2 * hLen) - 2; in OaepEncode() 374 memset(&pp[hLen], 0, padLen); in OaepEncode() 375 pp[hLen+padLen] = 0x01; in OaepEncode() 377 memcpy(&pp[hLen+padLen], message, messageSize); in OaepEncode() 379 dbSize = hLen+padLen+messageSize; in OaepEncode() [all …]
|
D | CpriHash.c | 416 int hLen; in _cpri__CompleteHash() local 429 hLen = EVP_MD_CTX_size(context); in _cpri__CompleteHash() 430 if((unsigned)hLen > dOutSize) in _cpri__CompleteHash() 444 retVal = (UINT16)hLen; in _cpri__CompleteHash() 765 INT16 hLen; // length of the hash in _cpri__KDFa() local 785 if((hLen = (INT16) _cpri__GetDigestSize(hashAlg)) == 0) in _cpri__KDFa() 790 bytes = once ? hLen : (INT16)((sizeInBits + 7) / 8); in _cpri__KDFa() 792 for (; bytes > 0; stream = &stream[hLen], bytes = bytes - hLen) in _cpri__KDFa() 794 if(bytes < hLen) in _cpri__KDFa() 795 hLen = bytes; in _cpri__KDFa() [all …]
|
D | CryptUtil.c | 1992 UINT16 hLen = CryptGetHashDigestSize(hash); in CryptXORObfuscation() local 1995 pAssert((key != NULL) && (data != NULL) && (hLen != 0)); in CryptXORObfuscation() 1997 for(; remainBytes > 0; remainBytes -= hLen) in CryptXORObfuscation() 2004 for(i = hLen < remainBytes ? hLen : remainBytes; i > 0; i--) in CryptXORObfuscation()
|
D | part4.txt | 21702 1584 UINT16 hLen = CryptGetHashDigestSize(hash); 21706 1588 pAssert((key != NULL) && (data != NULL) && (hLen != 0)); 21709 1591 for(; remainBytes > 0; remainBytes -= hLen) 21717 1599 for(i = hLen < remainBytes ? hLen : remainBytes; i > 0; i--) 26913 288 int hLen; 26933 303 hLen = EVP_MD_CTX_size(context); 26934 304 if((unsigned)hLen > dOutSize) 26948 318 retVal = (UINT16)hLen; 27316 579 INT16 hLen; // length of the hash 27345 602 if((hLen = (INT16) _cpri__GetDigestSize(hashAlg)) == 0) [all …]
|
D | CpriECC.c | 680 UINT16 hLen = _cpri__GetDigestSize(hashAlg); in _cpri__GenerateKeyEcc() local 691 if(hLen <= 0) in _cpri__GenerateKeyEcc()
|
D | part3.txt | 4873 TPM_ALG_OAEP mLen k – 2hLen – 2 4880 2) hLen ≔ the number of octets in the digest produced by the hash algorithm used in the process
|
/external/boringssl/src/crypto/rsa/ |
D | padding.c | 499 size_t hLen; in RSA_verify_PKCS1_PSS_mgf1() local 510 hLen = EVP_MD_size(Hash); in RSA_verify_PKCS1_PSS_mgf1() 517 sLen = hLen; in RSA_verify_PKCS1_PSS_mgf1() 535 if (emLen < ((int)hLen + sLen + 2)) { in RSA_verify_PKCS1_PSS_mgf1() 544 maskedDBLen = emLen - hLen - 1; in RSA_verify_PKCS1_PSS_mgf1() 551 if (PKCS1_MGF1(DB, maskedDBLen, H, hLen, mgf1Hash) < 0) { in RSA_verify_PKCS1_PSS_mgf1() 573 !EVP_DigestUpdate(&ctx, mHash, hLen)) { in RSA_verify_PKCS1_PSS_mgf1() 584 if (memcmp(H_, H, hLen)) { in RSA_verify_PKCS1_PSS_mgf1() 605 size_t hLen; in RSA_padding_add_PKCS1_PSS_mgf1() local 613 hLen = EVP_MD_size(Hash); in RSA_padding_add_PKCS1_PSS_mgf1() [all …]
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/generators/ |
D | PKCS5S2ParametersGenerator.java | 82 int hLen = hMac.getMacSize(); in generateDerivedKey() local 83 int l = (dkLen + hLen - 1) / hLen; in generateDerivedKey() 85 byte[] outBytes = new byte[l * hLen]; in generateDerivedKey() 102 outPos += hLen; in generateDerivedKey()
|
/external/libchrome/crypto/ |
D | symmetric_key_win.cc | 409 DWORD hLen = 0; in DeriveKeyFromPassword() local 410 DWORD param_size = sizeof(hLen); in DeriveKeyFromPassword() 412 reinterpret_cast<BYTE*>(&hLen), ¶m_size, 0); in DeriveKeyFromPassword() 413 if (!ok || hLen == 0) in DeriveKeyFromPassword() 420 if ((dkLen / hLen) > 0xFFFFFFFF) { in DeriveKeyFromPassword() 428 size_t L = (dkLen + hLen - 1) / hLen; in DeriveKeyFromPassword() 431 size_t total_generated_size = L * hLen; in DeriveKeyFromPassword() 447 if (!ComputePBKDF2Block(prf, hLen, salt, iterations, block_index, in DeriveKeyFromPassword() 450 block_offset += hLen; in DeriveKeyFromPassword()
|
/external/tpm2/generator/ |
D | raw_commands_fixed.txt | 8345 mLen k – 2hLen – 2 8366 hLen ≔ the number of octets in the digest produced by the hash algorithm used in the process
|
D | raw_commands.txt | 8334 mLen k – 2hLen – 2 8355 hLen ≔ the number of octets in the digest produced by the hash algorithm used in the process
|