Home
last modified time | relevance | path

Searched refs:hLen (Results 1 – 5 of 5) sorted by relevance

/optee_os/core/lib/libtomcrypt/src/pk/pkcs1/
H A Dpkcs_1_oaep_decode.c34 unsigned long hLen, x, y, modulus_len; in pkcs_1_oaep_decode() local
57 hLen = hash_descriptor[lparam_hash_used]->hashsize; in pkcs_1_oaep_decode()
61 if ((2*hLen >= (modulus_len - 2)) || (msglen != modulus_len)) { in pkcs_1_oaep_decode()
68 seed = XMALLOC(hLen); in pkcs_1_oaep_decode()
99 XMEMCPY(seed, msg + x, hLen); in pkcs_1_oaep_decode()
100 x += hLen; in pkcs_1_oaep_decode()
103 XMEMCPY(DB, msg + x, modulus_len - hLen - 1); in pkcs_1_oaep_decode()
104 x += modulus_len - hLen - 1; in pkcs_1_oaep_decode()
107 if ((err = pkcs_1_mgf1(mgf_hash, DB, modulus_len - hLen - 1, mask, hLen)) != CRYPT_OK) { in pkcs_1_oaep_decode()
112 for (y = 0; y < hLen; y++) { in pkcs_1_oaep_decode()
[all …]
H A Dpkcs_1_oaep_encode.c34 unsigned long hLen, x, y, modulus_len; in pkcs_1_oaep_encode() local
59 hLen = hash_descriptor[lparam_hash_used]->hashsize; in pkcs_1_oaep_encode()
63 if ((2*hLen >= (modulus_len - 2)) || (msglen > (modulus_len - 2*hLen - 2))) { in pkcs_1_oaep_encode()
70 seed = XMALLOC(hLen); in pkcs_1_oaep_encode()
99 x = hLen; in pkcs_1_oaep_encode()
100 y = modulus_len - msglen - 2*hLen - 2; in pkcs_1_oaep_encode()
114 if (prng_descriptor[prng_idx]->read(seed, hLen, prng) != hLen) { in pkcs_1_oaep_encode()
120 if ((err = pkcs_1_mgf1(mgf_hash, seed, hLen, mask, modulus_len - hLen - 1)) != CRYPT_OK) { in pkcs_1_oaep_encode()
125 for (y = 0; y < (modulus_len - hLen - 1); y++) { in pkcs_1_oaep_encode()
130 if ((err = pkcs_1_mgf1(mgf_hash, DB, modulus_len - hLen - 1, mask, hLen)) != CRYPT_OK) { in pkcs_1_oaep_encode()
[all …]
H A Dpkcs_1_pss_encode.c32 unsigned long x, y, hLen, modulus_len; in pkcs_1_pss_encode() local
48 hLen = hash_descriptor[hash_idx]->hashsize; in pkcs_1_pss_encode()
53 if ((saltlen > modulus_len) || (modulus_len < hLen + saltlen + 2)) { in pkcs_1_pss_encode()
107 XMEMSET(DB + x, 0, modulus_len - saltlen - hLen - 2); in pkcs_1_pss_encode()
108 x += modulus_len - saltlen - hLen - 2; in pkcs_1_pss_encode()
114 if ((err = pkcs_1_mgf1(hash_idx, hash, hLen, mask, modulus_len - hLen - 1)) != CRYPT_OK) { in pkcs_1_pss_encode()
119 for (y = 0; y < (modulus_len - hLen - 1); y++) { in pkcs_1_pss_encode()
132 XMEMCPY(out + y, DB, modulus_len - hLen - 1); in pkcs_1_pss_encode()
133 y += modulus_len - hLen - 1; in pkcs_1_pss_encode()
136 XMEMCPY(out + y, hash, hLen); in pkcs_1_pss_encode()
[all …]
H A Dpkcs_1_pss_decode.c31 unsigned long x, y, hLen, modulus_len; in pkcs_1_pss_decode() local
46 hLen = hash_descriptor[hash_idx]->hashsize; in pkcs_1_pss_decode()
52 (modulus_len < hLen + saltlen + 2)) { in pkcs_1_pss_decode()
85 XMEMCPY(DB, sig + x, modulus_len - hLen - 1); in pkcs_1_pss_decode()
86 x += modulus_len - hLen - 1; in pkcs_1_pss_decode()
89 XMEMCPY(hash, sig + x, hLen); in pkcs_1_pss_decode()
99 if ((err = pkcs_1_mgf1(hash_idx, hash, hLen, mask, modulus_len - hLen - 1)) != CRYPT_OK) { in pkcs_1_pss_decode()
104 for (y = 0; y < (modulus_len - hLen - 1); y++) { in pkcs_1_pss_decode()
114 for (x = 0; x < modulus_len - saltlen - hLen - 2; x++) { in pkcs_1_pss_decode()
146 if (FTMN_CALLEE_DONE_MEMCMP(XMEM_NEQ, mask, hash, hLen) == 0) { in pkcs_1_pss_decode()
H A Dpkcs_1_mgf1.c25 unsigned long hLen, x; in pkcs_1_mgf1() local
40 hLen = hash_descriptor[hash_idx]->hashsize; in pkcs_1_mgf1()
44 buf = XMALLOC(hLen); in pkcs_1_mgf1()
78 for (x = 0; x < hLen && masklen > 0; x++, masklen--) { in pkcs_1_mgf1()
86 zeromem(buf, hLen); in pkcs_1_mgf1()