/mbedtls-3.6.0/programs/psa/ |
D | psa_constant_names_generated.c | 90 static int psa_snprint_key_type(char *buffer, size_t buffer_size, in psa_snprint_key_type() argument 95 …case PSA_KEY_TYPE_AES: append(&buffer, buffer_size, &required_size, "PSA_KEY_TYPE_AES", 16); break; in psa_snprint_key_type() 96 …case PSA_KEY_TYPE_ARIA: append(&buffer, buffer_size, &required_size, "PSA_KEY_TYPE_ARIA", 17); bre… in psa_snprint_key_type() 97 …case PSA_KEY_TYPE_CAMELLIA: append(&buffer, buffer_size, &required_size, "PSA_KEY_TYPE_CAMELLIA", … in psa_snprint_key_type() 98 …case PSA_KEY_TYPE_CATEGORY_FLAG_PAIR: append(&buffer, buffer_size, &required_size, "PSA_KEY_TYPE_C… in psa_snprint_key_type() 99 …case PSA_KEY_TYPE_CATEGORY_KEY_PAIR: append(&buffer, buffer_size, &required_size, "PSA_KEY_TYPE_CA… in psa_snprint_key_type() 100 …case PSA_KEY_TYPE_CATEGORY_PUBLIC_KEY: append(&buffer, buffer_size, &required_size, "PSA_KEY_TYPE_… in psa_snprint_key_type() 101 …case PSA_KEY_TYPE_CATEGORY_RAW: append(&buffer, buffer_size, &required_size, "PSA_KEY_TYPE_CATEGOR… in psa_snprint_key_type() 102 …case PSA_KEY_TYPE_CATEGORY_SYMMETRIC: append(&buffer, buffer_size, &required_size, "PSA_KEY_TYPE_C… in psa_snprint_key_type() 103 …case PSA_KEY_TYPE_CHACHA20: append(&buffer, buffer_size, &required_size, "PSA_KEY_TYPE_CHACHA20", … in psa_snprint_key_type() [all …]
|
D | psa_constant_names.c | 43 static void append(char **buffer, size_t buffer_size, in append() argument 48 if (*required_size < buffer_size) { in append() 54 static void append_integer(char **buffer, size_t buffer_size, in append_integer() argument 59 size_t n = snprintf(*buffer, buffer_size - *required_size, format, value); in append_integer() 60 if (n < buffer_size - *required_size) { in append_integer() 71 static void append_with_curve(char **buffer, size_t buffer_size, in append_with_curve() argument 77 append(buffer, buffer_size, required_size, string, length); in append_with_curve() 78 append(buffer, buffer_size, required_size, "(", 1); in append_with_curve() 80 append(buffer, buffer_size, required_size, in append_with_curve() 83 append_integer(buffer, buffer_size, required_size, in append_with_curve() [all …]
|
D | key_ladder_demo.c | 357 size_t buffer_size = 0; in wrap_data() local 378 buffer_size = in wrap_data() 381 if (buffer_size < input_size) { in wrap_data() 389 SYS_CHECK((buffer = calloc(1, buffer_size)) != NULL); in wrap_data() 405 buffer, buffer_size, in wrap_data() 427 mbedtls_platform_zeroize(buffer, buffer_size); in wrap_data()
|
/mbedtls-3.6.0/tests/suites/ |
D | test_suite_asn1parse.function | 125 int get_len_step(const data_t *input, size_t buffer_size, 134 mbedtls_test_set_step(buffer_size); 137 if (buffer_size == 0) { 142 TEST_CALLOC_OR_SKIP(buf, buffer_size); 143 if (buffer_size > input->len) { 145 memset(buf + input->len, 'A', buffer_size - input->len); 147 memcpy(buf, input->x, buffer_size); 150 end = buf + buffer_size; 155 if (buffer_size >= input->len + actual_length) { 238 size_t buffer_size; [all …]
|
D | test_suite_psa_crypto.function | 115 size_t buffer_size, 140 *p = buffer + buffer_size; 1411 size_t buffer_size = byte_size + 1; 1416 TEST_CALLOC_OR_SKIP(buffer, buffer_size); 1439 for (n = byte_size; n < buffer_size; n++) { 1469 size_t buffer_size = /* Slight overapproximations */ 1478 TEST_CALLOC(buffer, buffer_size); 1480 TEST_ASSERT((ret = construct_fake_rsa_key(buffer, buffer_size, &p, 8658 size_t buffer_size = 16; 8663 output_buffer, buffer_size) [all …]
|
/mbedtls-3.6.0/programs/ssl/ |
D | ssl_server2.c | 609 uint16_t buffer_size; /* IO buffer size */ member 1658 opt.buffer_size = DFL_IO_BUF_LEN; in main() 1801 opt.buffer_size = atoi(q); in main() 1802 if (opt.buffer_size < 1) { in main() 1810 if (opt.buffer_size < opt.response_size) { in main() 1811 opt.buffer_size = opt.response_size; in main() 2246 size_t buf_content_size = opt.buffer_size; in main() 3645 len = opt.buffer_size; in main() 3646 memset(buf, 0, opt.buffer_size); in main() 3735 len = opt.buffer_size; in main() [all …]
|
/mbedtls-3.6.0/library/ |
D | pkwrite.c | 314 size_t buffer_size; in pk_write_opaque_pubkey() local 321 buffer_size = (size_t) (*p - start); in pk_write_opaque_pubkey() 322 if (psa_export_public_key(pk->priv_id, start, buffer_size, in pk_write_opaque_pubkey()
|
D | psa_crypto.c | 7607 uint8_t *buffer, size_t buffer_size, size_t *buffer_length) argument 7613 if (buffer_size < inputs->password_len) {
|
D | ssl_tls.c | 6611 size_t buffer_size, in ssl_calc_verify_tls_psa() argument 6627 status = psa_hash_finish(&cloned_op, hash, buffer_size, hlen); in ssl_calc_verify_tls_psa()
|
/mbedtls-3.6.0/include/psa/ |
D | crypto_extra.h | 1223 uint8_t *buffer, size_t buffer_size, size_t *buffer_length);
|
/mbedtls-3.6.0/docs/architecture/ |
D | tls13-support.md | 622 size_t buffer_size, 627 while( *data_len < buffer_size ) 630 buffer_size - *data_len );
|
/mbedtls-3.6.0/docs/proposed/ |
D | psa-driver-interface.md | 385 uint8_t *buffer, size_t buffer_size, size_t *buffer_length); 402 …` to *N*, where *N* is the length of the input in bytes. The value of `buffer_size` must be at lea… 636 uint8_t *buffer, size_t buffer_size, size_t *buffer_length);
|