Home
last modified time | relevance | path

Searched refs:hLen (Results 1 – 5 of 5) sorted by relevance

/optee_os-3.20.0/core/lib/libtomcrypt/src/pk/pkcs1/
A Dpkcs_1_oaep_decode.c32 unsigned long hLen, x, y, modulus_len; in pkcs_1_oaep_decode() local
58 seed = XMALLOC(hLen); in pkcs_1_oaep_decode()
89 XMEMCPY(seed, msg + x, hLen); in pkcs_1_oaep_decode()
90 x += hLen; in pkcs_1_oaep_decode()
94 x += modulus_len - hLen - 1; in pkcs_1_oaep_decode()
97 if ((err = pkcs_1_mgf1(hash_idx, DB, modulus_len - hLen - 1, mask, hLen)) != CRYPT_OK) { in pkcs_1_oaep_decode()
102 for (y = 0; y < hLen; y++) { in pkcs_1_oaep_decode()
107 if ((err = pkcs_1_mgf1(hash_idx, seed, hLen, mask, modulus_len - hLen - 1)) != CRYPT_OK) { in pkcs_1_oaep_decode()
132 if (XMEM_NEQ(seed, DB, hLen) != 0) { in pkcs_1_oaep_decode()
137 for (x = hLen; x < (modulus_len - hLen - 1) && DB[x] == 0x00; x++) { in pkcs_1_oaep_decode()
[all …]
A Dpkcs_1_oaep_encode.c54 if ((2*hLen >= (modulus_len - 2)) || (msglen > (modulus_len - 2*hLen - 2))) { in pkcs_1_oaep_encode()
61 seed = XMALLOC(hLen); in pkcs_1_oaep_encode()
90 x = hLen; in pkcs_1_oaep_encode()
103 if (prng_descriptor[prng_idx]->read(seed, hLen, prng) != hLen) { in pkcs_1_oaep_encode()
109 if ((err = pkcs_1_mgf1(hash_idx, seed, hLen, mask, modulus_len - hLen - 1)) != CRYPT_OK) { in pkcs_1_oaep_encode()
119 if ((err = pkcs_1_mgf1(hash_idx, DB, modulus_len - hLen - 1, mask, hLen)) != CRYPT_OK) { in pkcs_1_oaep_encode()
124 for (y = 0; y < hLen; y++) { in pkcs_1_oaep_encode()
138 XMEMCPY(out+x, seed, hLen); in pkcs_1_oaep_encode()
139 x += hLen; in pkcs_1_oaep_encode()
141 x += modulus_len - hLen - 1; in pkcs_1_oaep_encode()
[all …]
A Dpkcs_1_pss_encode.c32 unsigned long x, y, hLen, modulus_len; in pkcs_1_pss_encode() local
48 hLen = hash_descriptor[hash_idx]->hashsize; in pkcs_1_pss_encode()
53 if ((saltlen > modulus_len) || (modulus_len < hLen + saltlen + 2)) { in pkcs_1_pss_encode()
107 XMEMSET(DB + x, 0, modulus_len - saltlen - hLen - 2); in pkcs_1_pss_encode()
108 x += modulus_len - saltlen - hLen - 2; in pkcs_1_pss_encode()
114 if ((err = pkcs_1_mgf1(hash_idx, hash, hLen, mask, modulus_len - hLen - 1)) != CRYPT_OK) { in pkcs_1_pss_encode()
119 for (y = 0; y < (modulus_len - hLen - 1); y++) { in pkcs_1_pss_encode()
132 XMEMCPY(out + y, DB, modulus_len - hLen - 1); in pkcs_1_pss_encode()
133 y += modulus_len - hLen - 1; in pkcs_1_pss_encode()
136 XMEMCPY(out + y, hash, hLen); in pkcs_1_pss_encode()
[all …]
A Dpkcs_1_pss_decode.c31 unsigned long x, y, hLen, modulus_len; in pkcs_1_pss_decode() local
46 hLen = hash_descriptor[hash_idx]->hashsize; in pkcs_1_pss_decode()
52 (modulus_len < hLen + saltlen + 2)) { in pkcs_1_pss_decode()
85 XMEMCPY(DB, sig + x, modulus_len - hLen - 1); in pkcs_1_pss_decode()
86 x += modulus_len - hLen - 1; in pkcs_1_pss_decode()
89 XMEMCPY(hash, sig + x, hLen); in pkcs_1_pss_decode()
99 if ((err = pkcs_1_mgf1(hash_idx, hash, hLen, mask, modulus_len - hLen - 1)) != CRYPT_OK) { in pkcs_1_pss_decode()
104 for (y = 0; y < (modulus_len - hLen - 1); y++) { in pkcs_1_pss_decode()
114 for (x = 0; x < modulus_len - saltlen - hLen - 2; x++) { in pkcs_1_pss_decode()
146 if (FTMN_CALLEE_DONE_MEMCMP(XMEM_NEQ, mask, hash, hLen) == 0) { in pkcs_1_pss_decode()
A Dpkcs_1_mgf1.c25 unsigned long hLen, x; in pkcs_1_mgf1() local
40 hLen = hash_descriptor[hash_idx]->hashsize; in pkcs_1_mgf1()
44 buf = XMALLOC(hLen); in pkcs_1_mgf1()
78 for (x = 0; x < hLen && masklen > 0; x++, masklen--) { in pkcs_1_mgf1()
86 zeromem(buf, hLen); in pkcs_1_mgf1()

Completed in 4 milliseconds