Home
last modified time | relevance | path

Searched refs:input_len (Results 1 – 11 of 11) sorted by relevance

/mbedtls-3.5.0/tests/suites/
Dtest_suite_chachapoly.function88 size_t input_len = sizeof(input);
104 TEST_ASSERT(mbedtls_chachapoly_update(&ctx, input_len, input, output)
115 TEST_ASSERT(mbedtls_chachapoly_update(&ctx, input_len, input, output)
127 TEST_ASSERT(mbedtls_chachapoly_update(&ctx, input_len, input, output)
135 TEST_ASSERT(mbedtls_chachapoly_update(&ctx, input_len, input, output)
137 TEST_ASSERT(mbedtls_chachapoly_update(&ctx, input_len, input, output)
Dtest_suite_ssl.function113 size_t input_len;
142 input_len = 0;
146 input_len += put_ret[j];
151 if (input_len == 0) {
152 input_len = 1;
154 ASSERT_ALLOC(input, input_len);
162 TEST_ASSERT(output_len <= input_len);
172 for (i = 0; i < input_len; i++) {
/mbedtls-3.5.0/library/
Dcipher.c764 static int get_pkcs_padding(unsigned char *input, size_t input_len, in get_pkcs_padding() argument
774 padding_len = input[input_len - 1]; in get_pkcs_padding()
775 *data_len = input_len - padding_len; in get_pkcs_padding()
778 bad |= padding_len > input_len; in get_pkcs_padding()
783 pad_idx = input_len - padding_len; in get_pkcs_padding()
784 for (i = 0; i < input_len; i++) { in get_pkcs_padding()
808 static int get_one_and_zeros_padding(unsigned char *input, size_t input_len, in get_one_and_zeros_padding() argument
820 for (i = input_len; i > 0; i--) { in get_one_and_zeros_padding()
848 static int get_zeros_and_len_padding(unsigned char *input, size_t input_len, in get_zeros_and_len_padding() argument
858 padding_len = input[input_len - 1]; in get_zeros_and_len_padding()
[all …]
Dccm.c330 const unsigned char *input, size_t input_len, in mbedtls_ccm_update() argument
347 if (ctx->tag_len != 0 && ctx->processed + input_len > ctx->plaintext_len) { in mbedtls_ccm_update()
351 if (output_size < input_len) { in mbedtls_ccm_update()
354 *output_len = input_len; in mbedtls_ccm_update()
358 while (input_len > 0) { in mbedtls_ccm_update()
363 if (use_len > input_len) { in mbedtls_ccm_update()
364 use_len = input_len; in mbedtls_ccm_update()
422 input_len -= use_len; in mbedtls_ccm_update()
Dssl_tls13_keys.h465 const unsigned char *input, size_t input_len,
Dssl_tls13_keys.c342 const unsigned char *input, size_t input_len, in mbedtls_ssl_tls13_evolve_secret() argument
380 if (input != NULL && input_len != 0) { in mbedtls_ssl_tls13_evolve_secret()
382 l_input_len = input_len; in mbedtls_ssl_tls13_evolve_secret()
/mbedtls-3.5.0/tests/src/test_helpers/
Dssl_helpers.c159 const unsigned char *input, size_t input_len) in mbedtls_test_ssl_buffer_put() argument
168 if ((buf->content_length + input_len) > buf->capacity) { in mbedtls_test_ssl_buffer_put()
169 input_len = buf->capacity - buf->content_length; in mbedtls_test_ssl_buffer_put()
173 return (input_len == 0) ? 0 : -1; in mbedtls_test_ssl_buffer_put()
182 if (buf->start + buf->content_length + input_len in mbedtls_test_ssl_buffer_put()
184 overflow = (buf->start + buf->content_length + input_len) in mbedtls_test_ssl_buffer_put()
189 input_len - overflow); in mbedtls_test_ssl_buffer_put()
190 memcpy(buf->buffer, input + input_len - overflow, overflow); in mbedtls_test_ssl_buffer_put()
195 input, input_len); in mbedtls_test_ssl_buffer_put()
198 buf->content_length += input_len; in mbedtls_test_ssl_buffer_put()
[all …]
/mbedtls-3.5.0/include/mbedtls/
Dccm.h479 const unsigned char *input, size_t input_len,
Dssl.h1036 size_t input_len);
/mbedtls-3.5.0/programs/ssl/
Dssl_server2.c1139 size_t input_len; member
1159 size_t input_len) in ssl_async_start() argument
1199 if (input_len > SSL_ASYNC_INPUT_MAX_SIZE) { in ssl_async_start()
1210 memcpy(ctx->input, input, input_len); in ssl_async_start()
1211 ctx->input_len = input_len; in ssl_async_start()
1236 size_t input_len) in ssl_async_decrypt() argument
1240 input, input_len); in ssl_async_decrypt()
1265 ctx->input, ctx->input_len, in ssl_async_resume()
1272 ctx->input, ctx->input_len, in ssl_async_resume()
/mbedtls-3.5.0/tests/include/test/
Dssl_helpers.h220 const unsigned char *input, size_t input_len);