Lines Matching refs:len

69     for (i = 1; i < pointP->len; i++) {
92 int len;
98 printf("ec_points_mul: params [len=%d]:", params->DEREncoding.len);
99 for (i = 0; i < params->DEREncoding.len; i++)
118 printf("ec_points_mul: pointP [len=%d]:", pointP->len);
119 for (i = 0; i < pointP->len; i++)
126 len = (params->fieldID.size + 7) >> 3;
129 (pointP->len != (2 * len + 1))) {
157 CHECK_MPI_OK( mp_read_unsigned_octets(&Px, pointP->data + 1, (mp_size) len) );
158 CHECK_MPI_OK( mp_read_unsigned_octets(&Py, pointP->data + 1 + len, (mp_size) len) );
171 (mp_size) len) );
172 CHECK_MPI_OK( mp_read_unsigned_octets(&Gy, params->base.data + 1 + len,
173 (mp_size) len) );
203 (mp_size) len) );
204 CHECK_MPI_OK( mp_to_fixlen_octets(&Qy, pointQ->data + 1 + len,
205 (mp_size) len) );
210 printf("ec_points_mul: pointQ [len=%d]:", pointQ->len);
211 for (i = 0; i < pointQ->len; i++)
249 int len;
309 len = (ecParams->fieldID.size + 7) >> 3;
310 SECITEM_AllocItem(arena, &key->publicValue, 2*len + 1, kmflag);
311 len = ecParams->order.len;
312 SECITEM_AllocItem(arena, &key->privateValue, len, kmflag);
315 if (privKeyLen >= len) {
316 memcpy(key->privateValue.data, privKeyBytes, len);
318 memset(key->privateValue.data, 0, (len - privKeyLen));
319 memcpy(key->privateValue.data + (len - privKeyLen), privKeyBytes, privKeyLen);
326 (mp_size) len) );
366 * - len: the length in octets of the order buffer
369 * Returns a buffer of len octets that holds the private key. The caller
373 ec_GenerateRandomPrivateKey(const unsigned char *order, int len, int kmflag)
387 /* Generates 2*len random bytes using the global random bit generator
391 if ((privKeyBytes = PORT_Alloc(2*len, kmflag)) == NULL) goto cleanup;
392 CHECK_SEC_OK( RNG_GenerateGlobalRandomBytes(privKeyBytes, 2*len) );
393 CHECK_MPI_OK( mp_read_unsigned_octets(&privKeyVal, privKeyBytes, 2*len) );
394 CHECK_MPI_OK( mp_read_unsigned_octets(&order_1, order, len) );
399 CHECK_MPI_OK( mp_to_fixlen_octets(&privKeyVal, privKeyBytes, len) );
400 memset(privKeyBytes+len, 0, len);
411 kmem_free(privKeyBytes, 2*len);
428 int len;
436 len = ecParams->order.len;
437 privKeyBytes = ec_GenerateRandomPrivateKey(ecParams->order.data, len,
441 CHECK_SEC_OK( ec_NewKey(ecParams, privKey, privKeyBytes, len, kmflag) );
445 PORT_ZFree(privKeyBytes, len * 2);
468 int len;
475 len = (ecParams->fieldID.size + 7) >> 3;
477 (publicValue->len != (2 * len + 1))) {
488 (mp_size) len) );
489 CHECK_MPI_OK( mp_read_unsigned_octets(&Py, publicValue->data + 1 + len,
490 (mp_size) len) );
542 ** derived secret, and derivedSecret->len is the size of the secret
555 unsigned int len = 0;
575 len = (ecParams->fieldID.size + 7) >> 3;
576 pointQ.len = 2*len + 1;
577 if ((pointQ.data = PORT_Alloc(2*len + 1, kmflag)) == NULL) goto cleanup;
582 (mp_size) privateValue->len) );
600 SECITEM_AllocItem(NULL, derivedSecret, len, kmflag);
601 memcpy(derivedSecret->data, pointQ.data + 1, len);
607 for (i = 0; i < derivedSecret->len; i++)
616 PORT_ZFree(pointQ.data, 2*len + 1);
662 olen = ecParams->order.len;
667 if (signature->len < 2*olen) {
702 kGpoint.len = 2*flen + 1;
744 if (digest->len*8 > ecParams->fieldID.size) {
745 mpl_rsh(&s,&s,digest->len*8 - ecParams->fieldID.size);
792 signature->len = 2*olen;
830 int len;
839 len = key->ecParams.order.len;
840 kBytes = ec_GenerateRandomPrivateKey(key->ecParams.order.data, len,
845 rv = ECDSA_SignDigestWithSeed(key, signature, digest, kBytes, len, kmflag);
849 PORT_ZFree(kBytes, len * 2);
903 olen = ecParams->order.len;
904 if (signature->len == 0 || signature->len%2 != 0 ||
905 signature->len > 2*olen) {
909 slen = signature->len/2;
959 if (digest->len*8 > ecParams->fieldID.size) { /* u1 = HASH(M') */
960 mpl_rsh(&u1,&u1,digest->len*8- ecParams->fieldID.size);