Searched refs:buf1 (Results 1 – 4 of 4) sorted by relevance
/mbedtls-latest/library/ |
D | entropy.c | 554 unsigned char buf1[2 * sizeof(unsigned long long int)]; in mbedtls_entropy_source_self_test() local 561 memset(buf1, 0x00, sizeof(buf1)); in mbedtls_entropy_source_self_test() 566 if ((ret = mbedtls_entropy_source_self_test_gather(buf1, sizeof(buf1))) != 0) { in mbedtls_entropy_source_self_test() 574 if ((ret = mbedtls_entropy_source_self_test_check_bits(buf1, sizeof(buf1))) != 0) { in mbedtls_entropy_source_self_test() 580 ret = memcmp(buf0, buf1, sizeof(buf0)) == 0; in mbedtls_entropy_source_self_test()
|
/mbedtls-latest/tests/suites/ |
D | test_suite_ssl_decrypt.function | 98 const uint8_t buf1[1] = { 'a' }; 100 /* We won't write to buf1[0] since it's out of range, so we can cast 102 rec.buf = (uint8_t *) buf1;
|
D | test_suite_pk.function | 414 unsigned char buf1[RSA_WRITE_PUBKEY_MAX_SIZE]; 415 unsigned char *p1 = buf1 + sizeof(buf1); 416 int len1 = mbedtls_rsa_write_pubkey(rsa1, buf1, &p1); 443 unsigned char buf1[ECP_WRITE_PUBKEY_MAX_SIZE]; 447 &len1, buf1, sizeof(buf1)), 0); 453 TEST_MEMORY_COMPARE(buf1, len1, buf2, len2);
|
D | test_suite_ssl.function | 2171 unsigned char *buf1 = NULL, *buf2 = NULL; 2209 buf1 = mbedtls_calloc(1, len0); 2210 TEST_ASSERT(buf1 != NULL); 2213 TEST_ASSERT(mbedtls_ssl_session_save(&session, buf1, len0, &len1) 2219 TEST_ASSERT(mbedtls_ssl_session_load(&session, buf1, len1) == 0); 2229 TEST_ASSERT(memcmp(buf1, buf2, len1) == 0); 2233 mbedtls_free(buf1);
|