Lines Matching refs:hLen
21702 1584 UINT16 hLen = CryptGetHashDigestSize(hash);
21706 1588 pAssert((key != NULL) && (data != NULL) && (hLen != 0));
21709 1591 for(; remainBytes > 0; remainBytes -= hLen)
21717 1599 for(i = hLen < remainBytes ? hLen : remainBytes; i > 0; i--)
26913 288 int hLen;
26933 303 hLen = EVP_MD_CTX_size(context);
26934 304 if((unsigned)hLen > dOutSize)
26948 318 retVal = (UINT16)hLen;
27316 579 INT16 hLen; // length of the hash
27345 602 if((hLen = (INT16) _cpri__GetDigestSize(hashAlg)) == 0)
27352 609 bytes = once ? hLen : (INT16)((sizeInBits + 7) / 8);
27355 612 for (; bytes > 0; stream = &stream[hLen], bytes = bytes - hLen)
27357 614 if(bytes < hLen)
27358 615 hLen = bytes;
27390 647 // Compute HMAC. At the start of each iteration, hLen is set
27391 648 // to the smaller of hLen and bytes. This causes bytes to decrement
27393 650 _cpri__CompleteHMAC(&hashState, &hmacKey.b, hLen, stream);
27439 675 INT16 hLen = (INT16) _cpri__GetDigestSize(hashAlg);
27447 683 if(hLen == 0)
27469 705 for (; bytes > 0; stream = &stream[hLen], bytes = bytes - hLen)
27471 707 if(bytes < hLen)
27472 708 hLen = bytes;
27510 740 // Compute Hash. hLen was changed to be the smaller of bytes or hLen
27512 742 _cpri__CompleteHash(&hashState, hLen, stream);
29242 303 INT32 hLen = _cpri__GetDigestSize(hashAlg);
29253 314 if(hLen <= 0)
29262 323 // messageSize <= k 2hLen 2
29263 324 if(messageSize > paddedSize - 2 * hLen - 2)
29268 329 pp = &padded[hLen + 1];
29269 330 retVal = _cpri__HashBlock(hashAlg, lSize, (BYTE *)label, hLen, pp);
29271 332 // concatenate PS of k mLen 2hLen 2
29272 333 padLen = paddedSize - messageSize - (2 * hLen) - 2;
29273 334 memset(&pp[hLen], 0, padLen);
29274 335 pp[hLen+padLen] = 0x01;
29276 337 memcpy(&pp[hLen+padLen], message, messageSize);
29278 339 // The total size of db = hLen + pad + mSize;
29279 340 dbSize = hLen+padLen+messageSize;
29288 349 _cpri__GenerateRandom(hLen, mySeed);
29290 351 // mask = MGF1 (seed, nSize hLen 1)
29291 352 if((retVal = _cpri__MGF1(dbSize, mask, hashAlg, hLen, seed)) < 0)
29304 360 pp = &padded[hLen + 1];
29307 363 if((retVal = _cpri__MGF1(hLen, &padded[1], hashAlg, dbSize, pp)) < 0)
29314 370 for(i = hLen; i > 0; i--)
29349 390 INT32 hLen = _cpri__GetDigestSize(hashAlg);
29358 399 pAssert(hLen > 0 && dataOutSize != NULL && dataOut != NULL && padded != NULL);
29376 412 if(paddedSize < (unsigned)((2 * hLen) + 2) || *padded != 0)
29381 417 if((retVal = _cpri__MGF1(hLen, seedMask, hashAlg,
29382 418 paddedSize-hLen-1, &padded[hLen+1])) < 0)
29388 424 for(i = hLen; i > 0; i--)
29392 428 if((retVal = _cpri__MGF1(paddedSize-hLen-1, mask, hashAlg,
29393 429 hLen, seedMask)) < 0)
29397 433 pp = &padded[hLen+1];
29399 435 for(i = paddedSize-hLen-1; i > 0; i--)
29404 440 if((retVal=_cpri__HashBlock(hashAlg, lSize,(BYTE *)label, hLen, seedMask)) < 0)
29407 443 if(memcmp(seedMask, mask, hLen) != 0)
29411 447 pm = &mask[hLen];
29412 448 for(i = paddedSize-(2*hLen)-1; i > 0; i--)
29555 547 INT32 hLen = _cpri__GetDigestSize(hashAlg);
29564 556 pAssert(eOut != NULL && hLen > 0 && hashIn != NULL );
29567 559 mLen = (UINT16)(eOutSize - hLen - 1);
29578 565 if(saltSize > hLen)
29579 566 saltSize = (UINT16)hLen;
29589 576 saltSize = hLen;
29590 577 memcpy(salt, saltIn, hLen);
29601 588 _cpri__CompleteHash(&hashState, hLen, &eOut[eOutSize - hLen - 1]);
29604 591 if((retVal = _cpri__MGF1(mLen, eOut, hashAlg, hLen, &eOut[mLen])) < 0)
29662 624 INT32 hLen = _cpri__GetDigestSize(hashAlg);
29676 638 if(hLen == 0)
29685 647 // Use the hLen bytes at the end of the buffer to generate a mask
29687 649 mLen = eInSize - hLen - 1;
29688 650 if((retVal = _cpri__MGF1(mLen, mask, hashAlg, hLen, &eIn[mLen])) < 0)
29752 709 fail |= (retVal != hLen);
29753 710 fail |= (memcmp(mask, eIn, hLen) != 0);
33852 575 UINT16 hLen = _cpri__GetDigestSize(hashAlg);
33870 588 if(hLen <= 0)