Home
last modified time | relevance | path

Searched refs:buffer_size (Results 1 – 12 of 12) sorted by relevance

/mbedtls-3.6.0/programs/psa/
Dpsa_constant_names_generated.c90 static int psa_snprint_key_type(char *buffer, size_t buffer_size, in psa_snprint_key_type() argument
95 …case PSA_KEY_TYPE_AES: append(&buffer, buffer_size, &required_size, "PSA_KEY_TYPE_AES", 16); break; in psa_snprint_key_type()
96 …case PSA_KEY_TYPE_ARIA: append(&buffer, buffer_size, &required_size, "PSA_KEY_TYPE_ARIA", 17); bre… in psa_snprint_key_type()
97 …case PSA_KEY_TYPE_CAMELLIA: append(&buffer, buffer_size, &required_size, "PSA_KEY_TYPE_CAMELLIA", … in psa_snprint_key_type()
98 …case PSA_KEY_TYPE_CATEGORY_FLAG_PAIR: append(&buffer, buffer_size, &required_size, "PSA_KEY_TYPE_C… in psa_snprint_key_type()
99 …case PSA_KEY_TYPE_CATEGORY_KEY_PAIR: append(&buffer, buffer_size, &required_size, "PSA_KEY_TYPE_CA… in psa_snprint_key_type()
100 …case PSA_KEY_TYPE_CATEGORY_PUBLIC_KEY: append(&buffer, buffer_size, &required_size, "PSA_KEY_TYPE_… in psa_snprint_key_type()
101 …case PSA_KEY_TYPE_CATEGORY_RAW: append(&buffer, buffer_size, &required_size, "PSA_KEY_TYPE_CATEGOR… in psa_snprint_key_type()
102 …case PSA_KEY_TYPE_CATEGORY_SYMMETRIC: append(&buffer, buffer_size, &required_size, "PSA_KEY_TYPE_C… in psa_snprint_key_type()
103 …case PSA_KEY_TYPE_CHACHA20: append(&buffer, buffer_size, &required_size, "PSA_KEY_TYPE_CHACHA20", … in psa_snprint_key_type()
[all …]
Dpsa_constant_names.c43 static void append(char **buffer, size_t buffer_size, in append() argument
48 if (*required_size < buffer_size) { in append()
54 static void append_integer(char **buffer, size_t buffer_size, in append_integer() argument
59 size_t n = snprintf(*buffer, buffer_size - *required_size, format, value); in append_integer()
60 if (n < buffer_size - *required_size) { in append_integer()
71 static void append_with_curve(char **buffer, size_t buffer_size, in append_with_curve() argument
77 append(buffer, buffer_size, required_size, string, length); in append_with_curve()
78 append(buffer, buffer_size, required_size, "(", 1); in append_with_curve()
80 append(buffer, buffer_size, required_size, in append_with_curve()
83 append_integer(buffer, buffer_size, required_size, in append_with_curve()
[all …]
Dkey_ladder_demo.c357 size_t buffer_size = 0; in wrap_data() local
378 buffer_size = in wrap_data()
381 if (buffer_size < input_size) { in wrap_data()
389 SYS_CHECK((buffer = calloc(1, buffer_size)) != NULL); in wrap_data()
405 buffer, buffer_size, in wrap_data()
427 mbedtls_platform_zeroize(buffer, buffer_size); in wrap_data()
/mbedtls-3.6.0/tests/suites/
Dtest_suite_asn1parse.function125 int get_len_step(const data_t *input, size_t buffer_size,
134 mbedtls_test_set_step(buffer_size);
137 if (buffer_size == 0) {
142 TEST_CALLOC_OR_SKIP(buf, buffer_size);
143 if (buffer_size > input->len) {
145 memset(buf + input->len, 'A', buffer_size - input->len);
147 memcpy(buf, input->x, buffer_size);
150 end = buf + buffer_size;
155 if (buffer_size >= input->len + actual_length) {
238 size_t buffer_size;
[all …]
Dtest_suite_psa_crypto.function115 size_t buffer_size,
140 *p = buffer + buffer_size;
1411 size_t buffer_size = byte_size + 1;
1416 TEST_CALLOC_OR_SKIP(buffer, buffer_size);
1439 for (n = byte_size; n < buffer_size; n++) {
1469 size_t buffer_size = /* Slight overapproximations */
1478 TEST_CALLOC(buffer, buffer_size);
1480 TEST_ASSERT((ret = construct_fake_rsa_key(buffer, buffer_size, &p,
8658 size_t buffer_size = 16;
8663 output_buffer, buffer_size)
[all …]
/mbedtls-3.6.0/programs/ssl/
Dssl_server2.c609 uint16_t buffer_size; /* IO buffer size */ member
1658 opt.buffer_size = DFL_IO_BUF_LEN; in main()
1801 opt.buffer_size = atoi(q); in main()
1802 if (opt.buffer_size < 1) { in main()
1810 if (opt.buffer_size < opt.response_size) { in main()
1811 opt.buffer_size = opt.response_size; in main()
2246 size_t buf_content_size = opt.buffer_size; in main()
3645 len = opt.buffer_size; in main()
3646 memset(buf, 0, opt.buffer_size); in main()
3735 len = opt.buffer_size; in main()
[all …]
/mbedtls-3.6.0/library/
Dpkwrite.c314 size_t buffer_size; in pk_write_opaque_pubkey() local
321 buffer_size = (size_t) (*p - start); in pk_write_opaque_pubkey()
322 if (psa_export_public_key(pk->priv_id, start, buffer_size, in pk_write_opaque_pubkey()
Dpsa_crypto.c7607 uint8_t *buffer, size_t buffer_size, size_t *buffer_length) argument
7613 if (buffer_size < inputs->password_len) {
Dssl_tls.c6611 size_t buffer_size, in ssl_calc_verify_tls_psa() argument
6627 status = psa_hash_finish(&cloned_op, hash, buffer_size, hlen); in ssl_calc_verify_tls_psa()
/mbedtls-3.6.0/include/psa/
Dcrypto_extra.h1223 uint8_t *buffer, size_t buffer_size, size_t *buffer_length);
/mbedtls-3.6.0/docs/architecture/
Dtls13-support.md622 size_t buffer_size,
627 while( *data_len < buffer_size )
630 buffer_size - *data_len );
/mbedtls-3.6.0/docs/proposed/
Dpsa-driver-interface.md385 uint8_t *buffer, size_t buffer_size, size_t *buffer_length);
402 …` to *N*, where *N* is the length of the input in bytes. The value of `buffer_size` must be at lea…
636     uint8_t *buffer, size_t buffer_size, size_t *buffer_length);