Lines Matching defs:flen
29 const unsigned char *from, int flen)
34 if (flen > (tlen - RSA_PKCS1_PADDING_SIZE)) {
45 j = tlen - 3 - flen;
49 memcpy(p, from, (unsigned int)flen);
54 const unsigned char *from, int flen,
73 if (num == flen) {
78 flen--;
81 if ((num != (flen + 1)) || (*(p++) != 0x01)) {
87 j = flen - 1; /* one for type. */
123 int flen)
128 if (flen > (tlen - RSA_PKCS1_PADDING_SIZE)) {
131 } else if (flen < 0) {
142 j = tlen - 3 - flen;
157 memcpy(p, from, (unsigned int)flen);
162 const unsigned char *from, int flen)
164 return ossl_rsa_padding_add_PKCS1_type_2_ex(NULL, to, tlen, from, flen);
168 const unsigned char *from, int flen,
177 if (tlen <= 0 || flen <= 0)
185 if (flen > num || num < RSA_PKCS1_PADDING_SIZE) {
201 for (from += flen, em += num, i = 0; i < num; i++) {
202 mask = ~constant_time_is_zero(flen);
203 flen -= 1 & mask;
281 * should be stored in |from| which must be |flen| bytes in length and padded
282 * such that |flen == RSA_size()|. The TLS protocol version that the client
300 size_t flen, int client_version,
310 if (flen < RSA_PKCS1_PADDING_SIZE + SSL_MAX_MASTER_KEY_LENGTH
330 for (i = 2; i < flen - SSL_MAX_MASTER_KEY_LENGTH - 1; i++)
332 good &= constant_time_is_zero_8(from[flen - SSL_MAX_MASTER_KEY_LENGTH - 1]);
344 constant_time_eq(from[flen - SSL_MAX_MASTER_KEY_LENGTH],
347 constant_time_eq(from[flen - SSL_MAX_MASTER_KEY_LENGTH + 1],
364 constant_time_eq(from[flen - SSL_MAX_MASTER_KEY_LENGTH],
367 constant_time_eq(from[flen - SSL_MAX_MASTER_KEY_LENGTH + 1],
382 from[flen - SSL_MAX_MASTER_KEY_LENGTH + i],