Searched refs:hLen (Results 1 – 5 of 5) sorted by relevance
/optee_os-3.20.0/core/lib/libtomcrypt/src/pk/pkcs1/ |
A D | pkcs_1_oaep_decode.c | 32 unsigned long hLen, x, y, modulus_len; in pkcs_1_oaep_decode() local 58 seed = XMALLOC(hLen); in pkcs_1_oaep_decode() 89 XMEMCPY(seed, msg + x, hLen); in pkcs_1_oaep_decode() 90 x += hLen; in pkcs_1_oaep_decode() 94 x += modulus_len - hLen - 1; in pkcs_1_oaep_decode() 97 if ((err = pkcs_1_mgf1(hash_idx, DB, modulus_len - hLen - 1, mask, hLen)) != CRYPT_OK) { in pkcs_1_oaep_decode() 102 for (y = 0; y < hLen; y++) { in pkcs_1_oaep_decode() 107 if ((err = pkcs_1_mgf1(hash_idx, seed, hLen, mask, modulus_len - hLen - 1)) != CRYPT_OK) { in pkcs_1_oaep_decode() 132 if (XMEM_NEQ(seed, DB, hLen) != 0) { in pkcs_1_oaep_decode() 137 for (x = hLen; x < (modulus_len - hLen - 1) && DB[x] == 0x00; x++) { in pkcs_1_oaep_decode() [all …]
|
A D | pkcs_1_oaep_encode.c | 54 if ((2*hLen >= (modulus_len - 2)) || (msglen > (modulus_len - 2*hLen - 2))) { in pkcs_1_oaep_encode() 61 seed = XMALLOC(hLen); in pkcs_1_oaep_encode() 90 x = hLen; in pkcs_1_oaep_encode() 103 if (prng_descriptor[prng_idx]->read(seed, hLen, prng) != hLen) { in pkcs_1_oaep_encode() 109 if ((err = pkcs_1_mgf1(hash_idx, seed, hLen, mask, modulus_len - hLen - 1)) != CRYPT_OK) { in pkcs_1_oaep_encode() 119 if ((err = pkcs_1_mgf1(hash_idx, DB, modulus_len - hLen - 1, mask, hLen)) != CRYPT_OK) { in pkcs_1_oaep_encode() 124 for (y = 0; y < hLen; y++) { in pkcs_1_oaep_encode() 138 XMEMCPY(out+x, seed, hLen); in pkcs_1_oaep_encode() 139 x += hLen; in pkcs_1_oaep_encode() 141 x += modulus_len - hLen - 1; in pkcs_1_oaep_encode() [all …]
|
A D | pkcs_1_pss_encode.c | 32 unsigned long x, y, hLen, modulus_len; in pkcs_1_pss_encode() local 48 hLen = hash_descriptor[hash_idx]->hashsize; in pkcs_1_pss_encode() 53 if ((saltlen > modulus_len) || (modulus_len < hLen + saltlen + 2)) { in pkcs_1_pss_encode() 107 XMEMSET(DB + x, 0, modulus_len - saltlen - hLen - 2); in pkcs_1_pss_encode() 108 x += modulus_len - saltlen - hLen - 2; in pkcs_1_pss_encode() 114 if ((err = pkcs_1_mgf1(hash_idx, hash, hLen, mask, modulus_len - hLen - 1)) != CRYPT_OK) { in pkcs_1_pss_encode() 119 for (y = 0; y < (modulus_len - hLen - 1); y++) { in pkcs_1_pss_encode() 132 XMEMCPY(out + y, DB, modulus_len - hLen - 1); in pkcs_1_pss_encode() 133 y += modulus_len - hLen - 1; in pkcs_1_pss_encode() 136 XMEMCPY(out + y, hash, hLen); in pkcs_1_pss_encode() [all …]
|
A D | pkcs_1_pss_decode.c | 31 unsigned long x, y, hLen, modulus_len; in pkcs_1_pss_decode() local 46 hLen = hash_descriptor[hash_idx]->hashsize; in pkcs_1_pss_decode() 52 (modulus_len < hLen + saltlen + 2)) { in pkcs_1_pss_decode() 85 XMEMCPY(DB, sig + x, modulus_len - hLen - 1); in pkcs_1_pss_decode() 86 x += modulus_len - hLen - 1; in pkcs_1_pss_decode() 89 XMEMCPY(hash, sig + x, hLen); in pkcs_1_pss_decode() 99 if ((err = pkcs_1_mgf1(hash_idx, hash, hLen, mask, modulus_len - hLen - 1)) != CRYPT_OK) { in pkcs_1_pss_decode() 104 for (y = 0; y < (modulus_len - hLen - 1); y++) { in pkcs_1_pss_decode() 114 for (x = 0; x < modulus_len - saltlen - hLen - 2; x++) { in pkcs_1_pss_decode() 146 if (FTMN_CALLEE_DONE_MEMCMP(XMEM_NEQ, mask, hash, hLen) == 0) { in pkcs_1_pss_decode()
|
A D | pkcs_1_mgf1.c | 25 unsigned long hLen, x; in pkcs_1_mgf1() local 40 hLen = hash_descriptor[hash_idx]->hashsize; in pkcs_1_mgf1() 44 buf = XMALLOC(hLen); in pkcs_1_mgf1() 78 for (x = 0; x < hLen && masklen > 0; x++, masklen--) { in pkcs_1_mgf1() 86 zeromem(buf, hLen); in pkcs_1_mgf1()
|
Completed in 5 milliseconds