Searched refs:hLen (Results 1 – 5 of 5) sorted by relevance
| /optee_os/core/lib/libtomcrypt/src/pk/pkcs1/ |
| H A D | pkcs_1_oaep_decode.c | 34 unsigned long hLen, x, y, modulus_len; in pkcs_1_oaep_decode() local 57 hLen = hash_descriptor[lparam_hash_used]->hashsize; in pkcs_1_oaep_decode() 61 if ((2*hLen >= (modulus_len - 2)) || (msglen != modulus_len)) { in pkcs_1_oaep_decode() 68 seed = XMALLOC(hLen); in pkcs_1_oaep_decode() 99 XMEMCPY(seed, msg + x, hLen); in pkcs_1_oaep_decode() 100 x += hLen; in pkcs_1_oaep_decode() 103 XMEMCPY(DB, msg + x, modulus_len - hLen - 1); in pkcs_1_oaep_decode() 104 x += modulus_len - hLen - 1; in pkcs_1_oaep_decode() 107 if ((err = pkcs_1_mgf1(mgf_hash, DB, modulus_len - hLen - 1, mask, hLen)) != CRYPT_OK) { in pkcs_1_oaep_decode() 112 for (y = 0; y < hLen; y++) { in pkcs_1_oaep_decode() [all …]
|
| H A D | pkcs_1_oaep_encode.c | 34 unsigned long hLen, x, y, modulus_len; in pkcs_1_oaep_encode() local 59 hLen = hash_descriptor[lparam_hash_used]->hashsize; in pkcs_1_oaep_encode() 63 if ((2*hLen >= (modulus_len - 2)) || (msglen > (modulus_len - 2*hLen - 2))) { in pkcs_1_oaep_encode() 70 seed = XMALLOC(hLen); in pkcs_1_oaep_encode() 99 x = hLen; in pkcs_1_oaep_encode() 100 y = modulus_len - msglen - 2*hLen - 2; in pkcs_1_oaep_encode() 114 if (prng_descriptor[prng_idx]->read(seed, hLen, prng) != hLen) { in pkcs_1_oaep_encode() 120 if ((err = pkcs_1_mgf1(mgf_hash, seed, hLen, mask, modulus_len - hLen - 1)) != CRYPT_OK) { in pkcs_1_oaep_encode() 125 for (y = 0; y < (modulus_len - hLen - 1); y++) { in pkcs_1_oaep_encode() 130 if ((err = pkcs_1_mgf1(mgf_hash, DB, modulus_len - hLen - 1, mask, hLen)) != CRYPT_OK) { in pkcs_1_oaep_encode() [all …]
|
| H A D | pkcs_1_pss_encode.c | 32 unsigned long x, y, hLen, modulus_len; in pkcs_1_pss_encode() local 48 hLen = hash_descriptor[hash_idx]->hashsize; in pkcs_1_pss_encode() 53 if ((saltlen > modulus_len) || (modulus_len < hLen + saltlen + 2)) { in pkcs_1_pss_encode() 107 XMEMSET(DB + x, 0, modulus_len - saltlen - hLen - 2); in pkcs_1_pss_encode() 108 x += modulus_len - saltlen - hLen - 2; in pkcs_1_pss_encode() 114 if ((err = pkcs_1_mgf1(hash_idx, hash, hLen, mask, modulus_len - hLen - 1)) != CRYPT_OK) { in pkcs_1_pss_encode() 119 for (y = 0; y < (modulus_len - hLen - 1); y++) { in pkcs_1_pss_encode() 132 XMEMCPY(out + y, DB, modulus_len - hLen - 1); in pkcs_1_pss_encode() 133 y += modulus_len - hLen - 1; in pkcs_1_pss_encode() 136 XMEMCPY(out + y, hash, hLen); in pkcs_1_pss_encode() [all …]
|
| H A D | pkcs_1_pss_decode.c | 31 unsigned long x, y, hLen, modulus_len; in pkcs_1_pss_decode() local 46 hLen = hash_descriptor[hash_idx]->hashsize; in pkcs_1_pss_decode() 52 (modulus_len < hLen + saltlen + 2)) { in pkcs_1_pss_decode() 85 XMEMCPY(DB, sig + x, modulus_len - hLen - 1); in pkcs_1_pss_decode() 86 x += modulus_len - hLen - 1; in pkcs_1_pss_decode() 89 XMEMCPY(hash, sig + x, hLen); in pkcs_1_pss_decode() 99 if ((err = pkcs_1_mgf1(hash_idx, hash, hLen, mask, modulus_len - hLen - 1)) != CRYPT_OK) { in pkcs_1_pss_decode() 104 for (y = 0; y < (modulus_len - hLen - 1); y++) { in pkcs_1_pss_decode() 114 for (x = 0; x < modulus_len - saltlen - hLen - 2; x++) { in pkcs_1_pss_decode() 146 if (FTMN_CALLEE_DONE_MEMCMP(XMEM_NEQ, mask, hash, hLen) == 0) { in pkcs_1_pss_decode()
|
| H A D | pkcs_1_mgf1.c | 25 unsigned long hLen, x; in pkcs_1_mgf1() local 40 hLen = hash_descriptor[hash_idx]->hashsize; in pkcs_1_mgf1() 44 buf = XMALLOC(hLen); in pkcs_1_mgf1() 78 for (x = 0; x < hLen && masklen > 0; x++, masklen--) { in pkcs_1_mgf1() 86 zeromem(buf, hLen); in pkcs_1_mgf1()
|