/dports/databases/mariadb103-server/mariadb-10.3.34/extra/yassl/taocrypt/src/ |
H A D | rsa.cpp | 88 pkcsBlock[0] = 0; 89 pkcsBlock++; 93 pkcsBlock[0] = 2; // block type 2 99 if (pkcsBlock[i] == 0) pkcsBlock[i] = 0x01; 115 pkcsBlock++; 135 memcpy (output, pkcsBlock+i, outputLen); 144 if (input == NULL || pkcsBlock == NULL) 150 pkcsBlock[0] = 0; 151 pkcsBlock++; 175 pkcsBlock++; [all …]
|
/dports/databases/mariadb103-client/mariadb-10.3.34/extra/yassl/taocrypt/src/ |
H A D | rsa.cpp | 88 pkcsBlock[0] = 0; in Pad() 89 pkcsBlock++; in Pad() 93 pkcsBlock[0] = 2; // block type 2 in Pad() 99 if (pkcsBlock[i] == 0) pkcsBlock[i] = 0x01; in Pad() 115 pkcsBlock++; in UnPad() 135 memcpy (output, pkcsBlock+i, outputLen); in UnPad() 144 if (input == NULL || pkcsBlock == NULL) in Pad() 150 pkcsBlock[0] = 0; in Pad() 151 pkcsBlock++; in Pad() 175 pkcsBlock++; in UnPad() [all …]
|
/dports/databases/mysql55-client/mysql-5.5.62/extra/yassl/taocrypt/src/ |
H A D | rsa.cpp | 88 pkcsBlock[0] = 0; in Pad() 89 pkcsBlock++; in Pad() 93 pkcsBlock[0] = 2; // block type 2 in Pad() 99 if (pkcsBlock[i] == 0) pkcsBlock[i] = 0x01; in Pad() 115 pkcsBlock++; in UnPad() 135 memcpy (output, pkcsBlock+i, outputLen); in UnPad() 144 if (input == NULL || pkcsBlock == NULL) in Pad() 150 pkcsBlock[0] = 0; in Pad() 151 pkcsBlock++; in Pad() 175 pkcsBlock++; in UnPad() [all …]
|
/dports/net-p2p/qtum/qtum-mainnet-fastlane-v0.20.3/src/cryptopp/ |
H A D | pkcspad.cpp | 65 pkcsBlock[0] = 0; in Pad() 66 pkcsBlock++; in Pad() 70 pkcsBlock[0] = 2; // block type 2 in Pad() 74 pkcsBlock[i] = (byte)rng.GenerateWord32(1, 0xff); in Pad() 76 pkcsBlock[pkcsBlockLen-inputLen-1] = 0; // separator in Pad() 89 invalid = (pkcsBlock[0] != 0) || invalid; in Unpad() 90 pkcsBlock++; in Unpad() 95 invalid = (pkcsBlock[0] != 2) || invalid; in Unpad() 99 while (i<pkcsBlockLen && pkcsBlock[i++]) { // null body in Unpad() 101 CRYPTOPP_ASSERT(i==pkcsBlockLen || pkcsBlock[i-1]==0); in Unpad() [all …]
|
/dports/security/cryptopp/cryptopp-8.6.0/ |
H A D | pkcspad.cpp | 71 pkcsBlock[0] = 0; in Pad() 72 pkcsBlock++; in Pad() 76 pkcsBlock[0] = 2; // block type 2 in Pad() 80 pkcsBlock[i] = (byte)rng.GenerateWord32(1, 0xff); in Pad() 82 pkcsBlock[pkcsBlockLen-inputLen-1] = 0; // separator in Pad() 95 invalid = (pkcsBlock[0] != 0) || invalid; in Unpad() 96 pkcsBlock++; in Unpad() 101 invalid = (pkcsBlock[0] != 2) || invalid; in Unpad() 105 while (i<pkcsBlockLen && pkcsBlock[i++]) { // null body in Unpad() 107 CRYPTOPP_ASSERT(i==pkcsBlockLen || pkcsBlock[i-1]==0); in Unpad() [all …]
|
/dports/emulators/citra/citra-ac98458e0/externals/cryptopp/cryptopp/ |
H A D | pkcspad.cpp | 71 pkcsBlock[0] = 0; in Pad() 72 pkcsBlock++; in Pad() 76 pkcsBlock[0] = 2; // block type 2 in Pad() 80 pkcsBlock[i] = (byte)rng.GenerateWord32(1, 0xff); in Pad() 82 pkcsBlock[pkcsBlockLen-inputLen-1] = 0; // separator in Pad() 95 invalid = (pkcsBlock[0] != 0) || invalid; in Unpad() 96 pkcsBlock++; in Unpad() 101 invalid = (pkcsBlock[0] != 2) || invalid; in Unpad() 105 while (i<pkcsBlockLen && pkcsBlock[i++]) { // null body in Unpad() 107 CRYPTOPP_ASSERT(i==pkcsBlockLen || pkcsBlock[i-1]==0); in Unpad() [all …]
|
/dports/emulators/citra-qt5/citra-ac98458e0/externals/cryptopp/cryptopp/ |
H A D | pkcspad.cpp | 71 pkcsBlock[0] = 0; in Pad() 72 pkcsBlock++; in Pad() 76 pkcsBlock[0] = 2; // block type 2 in Pad() 80 pkcsBlock[i] = (byte)rng.GenerateWord32(1, 0xff); in Pad() 82 pkcsBlock[pkcsBlockLen-inputLen-1] = 0; // separator in Pad() 95 invalid = (pkcsBlock[0] != 0) || invalid; in Unpad() 96 pkcsBlock++; in Unpad() 101 invalid = (pkcsBlock[0] != 2) || invalid; in Unpad() 105 while (i<pkcsBlockLen && pkcsBlock[i++]) { // null body in Unpad() 107 CRYPTOPP_ASSERT(i==pkcsBlockLen || pkcsBlock[i-1]==0); in Unpad() [all …]
|
/dports/sysutils/fusefs-securefs/securefs-0.12.0/external/cryptopp/ |
H A D | pkcspad.cpp | 71 pkcsBlock[0] = 0; in Pad() 72 pkcsBlock++; in Pad() 76 pkcsBlock[0] = 2; // block type 2 in Pad() 80 pkcsBlock[i] = (byte)rng.GenerateWord32(1, 0xff); in Pad() 82 pkcsBlock[pkcsBlockLen-inputLen-1] = 0; // separator in Pad() 95 invalid = (pkcsBlock[0] != 0) || invalid; in Unpad() 96 pkcsBlock++; in Unpad() 101 invalid = (pkcsBlock[0] != 2) || invalid; in Unpad() 105 while (i<pkcsBlockLen && pkcsBlock[i++]) { // null body in Unpad() 107 CRYPTOPP_ASSERT(i==pkcsBlockLen || pkcsBlock[i-1]==0); in Unpad() [all …]
|
/dports/security/wolfssl/wolfssl-5.1.0/wolfcrypt/src/ |
H A D | rsa.c | 1130 pkcsBlock[idx] = dbMask[i++] ^ pkcsBlock[idx]; in RsaPad_OAEP() 1138 pkcsBlock[idx++] = 0x00; in RsaPad_OAEP() 1152 pkcsBlock[idx] = pkcsBlock[idx] ^ seed[i++]; in RsaPad_OAEP() 1222 *(pkcsBlock++) = 0; in RsaPad_PSS() 1292 m = pkcsBlock; in RsaPad_PSS() 1316 ret = RsaMGF(mgf, pkcsBlock + maskLen, hLen, pkcsBlock, maskLen, heap); in RsaPad_PSS() 1374 if (pkcsBlock[i] == 0) pkcsBlock[i] = 0x01; in RsaPad() 1447 (void)pkcsBlock; in wc_RsaPad_ex() 1516 pkcsBlock[hLen + 1 + idx] = pkcsBlock[hLen + 1 + idx] ^ tmp[idx + hLen]; in RsaUnPad_OAEP() 1594 pkcsBlock++; in RsaUnPad_PSS() [all …]
|
/dports/databases/mariadb105-client/mariadb-10.5.15/extra/wolfssl/wolfssl/wolfcrypt/src/ |
H A D | rsa.c | 1130 pkcsBlock[idx] = dbMask[i++] ^ pkcsBlock[idx]; in RsaPad_OAEP() 1138 pkcsBlock[idx++] = 0x00; in RsaPad_OAEP() 1152 pkcsBlock[idx] = pkcsBlock[idx] ^ seed[i++]; in RsaPad_OAEP() 1222 *(pkcsBlock++) = 0; in RsaPad_PSS() 1292 m = pkcsBlock; in RsaPad_PSS() 1316 ret = RsaMGF(mgf, pkcsBlock + maskLen, hLen, pkcsBlock, maskLen, heap); in RsaPad_PSS() 1374 if (pkcsBlock[i] == 0) pkcsBlock[i] = 0x01; in RsaPad() 1447 (void)pkcsBlock; in wc_RsaPad_ex() 1516 pkcsBlock[hLen + 1 + idx] = pkcsBlock[hLen + 1 + idx] ^ tmp[idx + hLen]; in RsaUnPad_OAEP() 1594 pkcsBlock++; in RsaUnPad_PSS() [all …]
|
/dports/databases/mariadb104-server/mariadb-10.4.24/extra/wolfssl/wolfssl/wolfcrypt/src/ |
H A D | rsa.c | 1130 pkcsBlock[idx] = dbMask[i++] ^ pkcsBlock[idx]; in RsaPad_OAEP() 1138 pkcsBlock[idx++] = 0x00; in RsaPad_OAEP() 1152 pkcsBlock[idx] = pkcsBlock[idx] ^ seed[i++]; in RsaPad_OAEP() 1222 *(pkcsBlock++) = 0; in RsaPad_PSS() 1292 m = pkcsBlock; in RsaPad_PSS() 1316 ret = RsaMGF(mgf, pkcsBlock + maskLen, hLen, pkcsBlock, maskLen, heap); in RsaPad_PSS() 1374 if (pkcsBlock[i] == 0) pkcsBlock[i] = 0x01; in RsaPad() 1447 (void)pkcsBlock; in wc_RsaPad_ex() 1516 pkcsBlock[hLen + 1 + idx] = pkcsBlock[hLen + 1 + idx] ^ tmp[idx + hLen]; in RsaUnPad_OAEP() 1594 pkcsBlock++; in RsaUnPad_PSS() [all …]
|
/dports/databases/mariadb105-server/mariadb-10.5.15/extra/wolfssl/wolfssl/wolfcrypt/src/ |
H A D | rsa.c | 1130 pkcsBlock[idx] = dbMask[i++] ^ pkcsBlock[idx]; in RsaPad_OAEP() 1138 pkcsBlock[idx++] = 0x00; in RsaPad_OAEP() 1152 pkcsBlock[idx] = pkcsBlock[idx] ^ seed[i++]; in RsaPad_OAEP() 1222 *(pkcsBlock++) = 0; in RsaPad_PSS() 1292 m = pkcsBlock; in RsaPad_PSS() 1316 ret = RsaMGF(mgf, pkcsBlock + maskLen, hLen, pkcsBlock, maskLen, heap); in RsaPad_PSS() 1374 if (pkcsBlock[i] == 0) pkcsBlock[i] = 0x01; in RsaPad() 1447 (void)pkcsBlock; in wc_RsaPad_ex() 1516 pkcsBlock[hLen + 1 + idx] = pkcsBlock[hLen + 1 + idx] ^ tmp[idx + hLen]; in RsaUnPad_OAEP() 1594 pkcsBlock++; in RsaUnPad_PSS() [all …]
|
/dports/databases/mariadb104-client/mariadb-10.4.24/extra/wolfssl/wolfssl/wolfcrypt/src/ |
H A D | rsa.c | 1130 pkcsBlock[idx] = dbMask[i++] ^ pkcsBlock[idx]; in RsaPad_OAEP() 1138 pkcsBlock[idx++] = 0x00; in RsaPad_OAEP() 1152 pkcsBlock[idx] = pkcsBlock[idx] ^ seed[i++]; in RsaPad_OAEP() 1222 *(pkcsBlock++) = 0; in RsaPad_PSS() 1292 m = pkcsBlock; in RsaPad_PSS() 1316 ret = RsaMGF(mgf, pkcsBlock + maskLen, hLen, pkcsBlock, maskLen, heap); in RsaPad_PSS() 1374 if (pkcsBlock[i] == 0) pkcsBlock[i] = 0x01; in RsaPad() 1447 (void)pkcsBlock; in wc_RsaPad_ex() 1516 pkcsBlock[hLen + 1 + idx] = pkcsBlock[hLen + 1 + idx] ^ tmp[idx + hLen]; in RsaUnPad_OAEP() 1594 pkcsBlock++; in RsaUnPad_PSS() [all …]
|
/dports/security/wolfssl/wolfssl-5.1.0/wolfcrypt/user-crypto/src/ |
H A D | rsa.c | 544 pkcsBlock++; pkcsBlockLen--; in wc_RsaPad() 545 pkcsBlock[0] = padValue; /* insert padValue */ in wc_RsaPad() 565 ret = wc_RNG_GenerateBlock(rng, &pkcsBlock[1], padLen); in wc_RsaPad() 572 if (pkcsBlock[i] == 0) pkcsBlock[i] = 0x01; in wc_RsaPad() 575 pkcsBlock[pkcsBlockLen-inputLen-1] = 0; /* separator */ in wc_RsaPad() 576 XMEMCPY(pkcsBlock+pkcsBlockLen-inputLen, input, inputLen); in wc_RsaPad() 596 if (pkcsBlock[0] != 0x0) /* skip past zero */ in RsaUnPad() 598 pkcsBlock++; pkcsBlockLen--; in RsaUnPad() 601 invalid = (pkcsBlock[0] != padValue) || invalid; in RsaUnPad() 611 if(!(i==pkcsBlockLen || pkcsBlock[i-1]==0)) { in RsaUnPad() [all …]
|
/dports/databases/mariadb105-client/mariadb-10.5.15/extra/wolfssl/wolfssl/wolfcrypt/user-crypto/src/ |
H A D | rsa.c | 544 pkcsBlock++; pkcsBlockLen--; in wc_RsaPad() 545 pkcsBlock[0] = padValue; /* insert padValue */ in wc_RsaPad() 565 ret = wc_RNG_GenerateBlock(rng, &pkcsBlock[1], padLen); in wc_RsaPad() 572 if (pkcsBlock[i] == 0) pkcsBlock[i] = 0x01; in wc_RsaPad() 575 pkcsBlock[pkcsBlockLen-inputLen-1] = 0; /* separator */ in wc_RsaPad() 576 XMEMCPY(pkcsBlock+pkcsBlockLen-inputLen, input, inputLen); in wc_RsaPad() 596 if (pkcsBlock[0] != 0x0) /* skip past zero */ in RsaUnPad() 598 pkcsBlock++; pkcsBlockLen--; in RsaUnPad() 601 invalid = (pkcsBlock[0] != padValue) || invalid; in RsaUnPad() 611 if(!(i==pkcsBlockLen || pkcsBlock[i-1]==0)) { in RsaUnPad() [all …]
|
/dports/databases/mariadb104-server/mariadb-10.4.24/extra/wolfssl/wolfssl/wolfcrypt/user-crypto/src/ |
H A D | rsa.c | 544 pkcsBlock++; pkcsBlockLen--; in wc_RsaPad() 545 pkcsBlock[0] = padValue; /* insert padValue */ in wc_RsaPad() 565 ret = wc_RNG_GenerateBlock(rng, &pkcsBlock[1], padLen); in wc_RsaPad() 572 if (pkcsBlock[i] == 0) pkcsBlock[i] = 0x01; in wc_RsaPad() 575 pkcsBlock[pkcsBlockLen-inputLen-1] = 0; /* separator */ in wc_RsaPad() 576 XMEMCPY(pkcsBlock+pkcsBlockLen-inputLen, input, inputLen); in wc_RsaPad() 596 if (pkcsBlock[0] != 0x0) /* skip past zero */ in RsaUnPad() 598 pkcsBlock++; pkcsBlockLen--; in RsaUnPad() 601 invalid = (pkcsBlock[0] != padValue) || invalid; in RsaUnPad() 611 if(!(i==pkcsBlockLen || pkcsBlock[i-1]==0)) { in RsaUnPad() [all …]
|
/dports/databases/mariadb105-server/mariadb-10.5.15/extra/wolfssl/wolfssl/wolfcrypt/user-crypto/src/ |
H A D | rsa.c | 544 pkcsBlock++; pkcsBlockLen--; in wc_RsaPad() 545 pkcsBlock[0] = padValue; /* insert padValue */ in wc_RsaPad() 565 ret = wc_RNG_GenerateBlock(rng, &pkcsBlock[1], padLen); in wc_RsaPad() 572 if (pkcsBlock[i] == 0) pkcsBlock[i] = 0x01; in wc_RsaPad() 575 pkcsBlock[pkcsBlockLen-inputLen-1] = 0; /* separator */ in wc_RsaPad() 576 XMEMCPY(pkcsBlock+pkcsBlockLen-inputLen, input, inputLen); in wc_RsaPad() 596 if (pkcsBlock[0] != 0x0) /* skip past zero */ in RsaUnPad() 598 pkcsBlock++; pkcsBlockLen--; in RsaUnPad() 601 invalid = (pkcsBlock[0] != padValue) || invalid; in RsaUnPad() 611 if(!(i==pkcsBlockLen || pkcsBlock[i-1]==0)) { in RsaUnPad() [all …]
|
/dports/databases/mariadb104-client/mariadb-10.4.24/extra/wolfssl/wolfssl/wolfcrypt/user-crypto/src/ |
H A D | rsa.c | 544 pkcsBlock++; pkcsBlockLen--; in wc_RsaPad() 545 pkcsBlock[0] = padValue; /* insert padValue */ in wc_RsaPad() 565 ret = wc_RNG_GenerateBlock(rng, &pkcsBlock[1], padLen); in wc_RsaPad() 572 if (pkcsBlock[i] == 0) pkcsBlock[i] = 0x01; in wc_RsaPad() 575 pkcsBlock[pkcsBlockLen-inputLen-1] = 0; /* separator */ in wc_RsaPad() 576 XMEMCPY(pkcsBlock+pkcsBlockLen-inputLen, input, inputLen); in wc_RsaPad() 596 if (pkcsBlock[0] != 0x0) /* skip past zero */ in RsaUnPad() 598 pkcsBlock++; pkcsBlockLen--; in RsaUnPad() 601 invalid = (pkcsBlock[0] != padValue) || invalid; in RsaUnPad() 611 if(!(i==pkcsBlockLen || pkcsBlock[i-1]==0)) { in RsaUnPad() [all …]
|
/dports/security/wolfssl/wolfssl-5.1.0/wolfssl/wolfcrypt/ |
H A D | rsa.h | 382 WOLFSSL_LOCAL int wc_RsaPad_ex(const byte* input, word32 inputLen, byte* pkcsBlock, 386 WOLFSSL_LOCAL int wc_RsaUnPad_ex(byte* pkcsBlock, word32 pkcsBlockLen, byte** out,
|
/dports/databases/mariadb105-client/mariadb-10.5.15/extra/wolfssl/wolfssl/wolfssl/wolfcrypt/ |
H A D | rsa.h | 382 WOLFSSL_LOCAL int wc_RsaPad_ex(const byte* input, word32 inputLen, byte* pkcsBlock, 386 WOLFSSL_LOCAL int wc_RsaUnPad_ex(byte* pkcsBlock, word32 pkcsBlockLen, byte** out,
|
/dports/databases/mariadb104-server/mariadb-10.4.24/extra/wolfssl/wolfssl/wolfssl/wolfcrypt/ |
H A D | rsa.h | 382 WOLFSSL_LOCAL int wc_RsaPad_ex(const byte* input, word32 inputLen, byte* pkcsBlock, 386 WOLFSSL_LOCAL int wc_RsaUnPad_ex(byte* pkcsBlock, word32 pkcsBlockLen, byte** out,
|
/dports/databases/mariadb105-server/mariadb-10.5.15/extra/wolfssl/wolfssl/wolfssl/wolfcrypt/ |
H A D | rsa.h | 382 WOLFSSL_LOCAL int wc_RsaPad_ex(const byte* input, word32 inputLen, byte* pkcsBlock, 386 WOLFSSL_LOCAL int wc_RsaUnPad_ex(byte* pkcsBlock, word32 pkcsBlockLen, byte** out,
|
/dports/databases/mariadb104-client/mariadb-10.4.24/extra/wolfssl/wolfssl/wolfssl/wolfcrypt/ |
H A D | rsa.h | 382 WOLFSSL_LOCAL int wc_RsaPad_ex(const byte* input, word32 inputLen, byte* pkcsBlock, 386 WOLFSSL_LOCAL int wc_RsaUnPad_ex(byte* pkcsBlock, word32 pkcsBlockLen, byte** out,
|