/mbedtls-latest/library/ |
D | platform.c | 293 int mbedtls_platform_std_nv_seed_read(unsigned char *buf, size_t buf_len) in mbedtls_platform_std_nv_seed_read() argument 305 if ((n = fread(buf, 1, buf_len, file)) != buf_len) { in mbedtls_platform_std_nv_seed_read() 307 mbedtls_platform_zeroize(buf, buf_len); in mbedtls_platform_std_nv_seed_read() 315 int mbedtls_platform_std_nv_seed_write(unsigned char *buf, size_t buf_len) in mbedtls_platform_std_nv_seed_write() argument 327 if ((n = fwrite(buf, 1, buf_len, file)) != buf_len) { in mbedtls_platform_std_nv_seed_write() 342 static int platform_nv_seed_read_uninit(unsigned char *buf, size_t buf_len) in platform_nv_seed_read_uninit() argument 345 ((void) buf_len); in platform_nv_seed_read_uninit() 356 static int platform_nv_seed_write_uninit(unsigned char *buf, size_t buf_len) in platform_nv_seed_write_uninit() argument 359 ((void) buf_len); in platform_nv_seed_write_uninit() 366 int (*mbedtls_nv_seed_read)(unsigned char *buf, size_t buf_len) = [all …]
|
D | ssl_tls13_generic.c | 60 size_t *buf_len) in mbedtls_ssl_tls13_fetch_handshake_msg() argument 86 *buf_len = ssl->in_hslen - 4; in mbedtls_ssl_tls13_fetch_handshake_msg() 356 size_t buf_len; in mbedtls_ssl_tls13_process_certificate_verify() local 362 ssl, MBEDTLS_SSL_HS_CERTIFICATE_VERIFY, &buf, &buf_len)); in mbedtls_ssl_tls13_process_certificate_verify() 393 ssl, buf, buf + buf_len, in mbedtls_ssl_tls13_process_certificate_verify() 398 buf, buf_len)); in mbedtls_ssl_tls13_process_certificate_verify() 711 size_t buf_len; in mbedtls_ssl_tls13_process_certificate() local 715 &buf, &buf_len)); in mbedtls_ssl_tls13_process_certificate() 719 buf + buf_len)); in mbedtls_ssl_tls13_process_certificate() 724 ssl, MBEDTLS_SSL_HS_CERTIFICATE, buf, buf_len)); in mbedtls_ssl_tls13_process_certificate() [all …]
|
D | ssl_tls13_server.c | 2419 size_t buf_len, msg_len; in ssl_tls13_write_server_hello() local 2426 ssl, MBEDTLS_SSL_HS_SERVER_HELLO, &buf, &buf_len)); in ssl_tls13_write_server_hello() 2429 buf + buf_len, in ssl_tls13_write_server_hello() 2437 ssl, buf_len, msg_len)); in ssl_tls13_write_server_hello() 2492 size_t buf_len, msg_len; in ssl_tls13_write_hello_retry_request() local 2500 &buf, &buf_len)); in ssl_tls13_write_hello_retry_request() 2503 buf + buf_len, in ssl_tls13_write_hello_retry_request() 2510 MBEDTLS_SSL_PROC_CHK(mbedtls_ssl_finish_handshake_msg(ssl, buf_len, in ssl_tls13_write_hello_retry_request() 2611 size_t buf_len, msg_len; in ssl_tls13_write_encrypted_extensions() local 2622 &buf, &buf_len)); in ssl_tls13_write_encrypted_extensions() [all …]
|
D | entropy.c | 499 static int mbedtls_entropy_source_self_test_gather(unsigned char *buf, size_t buf_len) in mbedtls_entropy_source_self_test_gather() argument 504 size_t attempts = buf_len; in mbedtls_entropy_source_self_test_gather() 506 while (attempts > 0 && entropy_len < buf_len) { in mbedtls_entropy_source_self_test_gather() 508 buf_len - entropy_len, &olen)) != 0) { in mbedtls_entropy_source_self_test_gather() 516 if (entropy_len < buf_len) { in mbedtls_entropy_source_self_test_gather() 525 size_t buf_len) in mbedtls_entropy_source_self_test_check_bits() argument 531 for (i = 0; i < buf_len; i++) { in mbedtls_entropy_source_self_test_check_bits()
|
D | ssl_tls13_client.c | 2000 size_t buf_len = 0; in ssl_tls13_process_server_hello() local 2006 ssl, MBEDTLS_SSL_HS_SERVER_HELLO, &buf, &buf_len)); in ssl_tls13_process_server_hello() 2008 ret = ssl_tls13_preprocess_server_hello(ssl, buf, buf + buf_len); in ssl_tls13_process_server_hello() 2021 buf + buf_len, in ssl_tls13_process_server_hello() 2028 ssl, MBEDTLS_SSL_HS_SERVER_HELLO, buf, buf_len)); in ssl_tls13_process_server_hello() 2193 size_t buf_len; in ssl_tls13_process_encrypted_extensions() local 2200 &buf, &buf_len)); in ssl_tls13_process_encrypted_extensions() 2204 ssl_tls13_parse_encrypted_extensions(ssl, buf, buf + buf_len)); in ssl_tls13_process_encrypted_extensions() 2267 buf, buf_len)); in ssl_tls13_process_encrypted_extensions() 2305 size_t buf_len; in ssl_tls13_write_end_of_early_data() local [all …]
|
D | ssl_msg.c | 943 || rec->buf_len < rec->data_offset in mbedtls_ssl_encrypt_buf() 944 || rec->buf_len - rec->data_offset < rec->data_len in mbedtls_ssl_encrypt_buf() 956 post_avail = rec->buf_len - (rec->data_len + rec->data_offset); in mbedtls_ssl_encrypt_buf() 1028 post_avail = rec->buf_len - (rec->data_len + rec->data_offset); in mbedtls_ssl_encrypt_buf() 1202 data, rec->buf_len - (data - rec->buf), in mbedtls_ssl_encrypt_buf() 1215 … data, rec->buf_len - (size_t) (data - rec->buf), /* dst */ in mbedtls_ssl_encrypt_buf() 1513 rec->buf_len < rec->data_offset || in mbedtls_ssl_decrypt_buf() 1514 rec->buf_len - rec->data_offset < rec->data_len) { in mbedtls_ssl_decrypt_buf() 1629 data, rec->buf_len - (data - rec->buf), in mbedtls_ssl_decrypt_buf() 1643 data, rec->buf_len - (size_t) (data - rec->buf), &olen, /* dst */ in mbedtls_ssl_decrypt_buf() [all …]
|
D | ssl_tls.c | 3393 size_t buf_len) in ssl_tls12_session_save() argument 3413 if (used <= buf_len) { in ssl_tls12_session_save() 3429 if (used <= buf_len) { in ssl_tls12_session_save() 3454 if (used <= buf_len) { in ssl_tls12_session_save() 3467 if (used <= buf_len) { in ssl_tls12_session_save() 3476 if (used <= buf_len) { in ssl_tls12_session_save() 3492 if (used <= buf_len) { in ssl_tls12_session_save() 3511 if (used <= buf_len) { in ssl_tls12_session_save() 3525 if (used <= buf_len) { in ssl_tls12_session_save() 3533 if (used <= buf_len) { in ssl_tls12_session_save() [all …]
|
D | ssl_client.c | 917 size_t buf_len, msg_len, binders_len; in mbedtls_ssl_write_client_hello() local 925 &buf, &buf_len)); in mbedtls_ssl_write_client_hello() 928 buf + buf_len, in mbedtls_ssl_write_client_hello() 988 buf_len, in mbedtls_ssl_write_client_hello()
|
D | pem.c | 500 unsigned char *buf, size_t buf_len, size_t *olen) in mbedtls_pem_write_buffer() argument 509 if (use_len + add_len > buf_len) { in mbedtls_pem_write_buffer() 545 memset(buf + *olen, 0, buf_len - *olen); in mbedtls_pem_write_buffer()
|
D | ssl_misc.h | 1233 size_t buf_len; /* Buffer length */ member 1446 unsigned char **buf, size_t *buf_len); 1462 size_t buf_len, size_t msg_len); 2127 size_t *buf_len); 2786 size_t buf_len); 2863 unsigned char *obuf, size_t buf_len, size_t *olen);
|
D | ctr_drbg.c | 183 size_t buf_len, use_len; in block_cipher_df() local 206 buf_len = MBEDTLS_CTR_DRBG_BLOCKSIZE + 8 + data_len + 1; in block_cipher_df() 233 use_len = buf_len; in block_cipher_df()
|
D | ssl_tls13_keys.c | 145 unsigned char *buf, size_t buf_len) in mbedtls_ssl_tls13_hkdf_expand_label() argument 166 if (buf_len > MBEDTLS_SSL_TLS1_3_KEY_SCHEDULE_MAX_EXPANSION_LEN) { in mbedtls_ssl_tls13_hkdf_expand_label() 175 ssl_tls13_hkdf_encode_label(buf_len, in mbedtls_ssl_tls13_hkdf_expand_label() 207 buf_len); in mbedtls_ssl_tls13_hkdf_expand_label()
|
D | ssl_tls13_keys.h | 116 unsigned char *buf, size_t buf_len);
|
/mbedtls-latest/tests/suites/ |
D | test_suite_pkwrite.function | 33 size_t *buf_len, int is_public_key, int is_der) 39 ret = mbedtls_pk_write_pubkey_der(pk, *p, *buf_len); 41 ret = mbedtls_pk_write_key_der(pk, *p, *buf_len); 47 *p = *p + *buf_len - ret; 48 *buf_len = ret; 52 ret = mbedtls_pk_write_pubkey_pem(pk, *p, *buf_len); 54 ret = mbedtls_pk_write_key_pem(pk, *p, *buf_len); 60 *buf_len = strlen((char *) *p) + 1; /* +1 takes the string terminator into account */ 76 size_t buf_len, check_buf_len; 113 buf_len = check_buf_len; [all …]
|
D | test_suite_ssl_decrypt.function | 29 .buf_len = 0, 53 rec_good.buf_len = plaintext_length + transform_in.maclen; 55 TEST_CALLOC(rec_good.buf, rec_good.buf_len); 65 TEST_CALLOC(buf, rec.buf_len); 66 for (size_t i = 0; i < rec.buf_len; i++) { 70 memcpy(buf, rec_good.buf, rec.buf_len); 80 for (size_t n = 1; n < rec.buf_len; n++) { 85 rec.buf_len = n; 103 rec.buf_len = 0; 109 rec.buf_len = 0; [all …]
|
D | test_suite_entropy.function | 70 static int buffer_nv_seed_read(unsigned char *buf, size_t buf_len) 72 if (buf_len != MBEDTLS_ENTROPY_BLOCK_SIZE) { 80 static int buffer_nv_seed_write(unsigned char *buf, size_t buf_len) 82 if (buf_len != MBEDTLS_ENTROPY_BLOCK_SIZE) { 95 static int write_nv_seed(unsigned char *buf, size_t buf_len) 99 if (buf_len != MBEDTLS_ENTROPY_BLOCK_SIZE) { 119 static int read_nv_seed(unsigned char *buf, size_t buf_len) 123 if (buf_len != MBEDTLS_ENTROPY_BLOCK_SIZE) { 471 int (*original_mbedtls_nv_seed_read)(unsigned char *buf, size_t buf_len) = 473 int (*original_mbedtls_nv_seed_write)(unsigned char *buf, size_t buf_len) =
|
D | test_suite_rsa.function | 19 size_t buf_len = sizeof(buf); 35 buf_len, 46 buf_len, 65 buf_len, 76 buf_len, 97 MBEDTLS_MD_NONE, buf_len, 98 NULL, buf_len, 104 NULL, buf_len, 109 buf_len, NULL, 111 buf_len, buf), [all …]
|
D | test_suite_asn1write.function | 343 void mbedtls_asn1_write_len(int len, data_t *asn1, int buf_len, 354 p = buf + GUARD_LEN + buf_len; 363 TEST_ASSERT(buf[GUARD_LEN + buf_len + i] == GUARD_VAL); 367 TEST_ASSERT(p + asn1->len == buf + GUARD_LEN + buf_len); 372 ret = mbedtls_asn1_get_len(&p, buf + GUARD_LEN + buf_len, &read_len); 383 TEST_ASSERT(p == buf + GUARD_LEN + buf_len);
|
/mbedtls-latest/include/mbedtls/ |
D | platform.h | 397 int mbedtls_platform_std_nv_seed_read(unsigned char *buf, size_t buf_len); 398 int mbedtls_platform_std_nv_seed_write(unsigned char *buf, size_t buf_len); 402 extern int (*mbedtls_nv_seed_read)(unsigned char *buf, size_t buf_len); 403 extern int (*mbedtls_nv_seed_write)(unsigned char *buf, size_t buf_len); 415 int (*nv_seed_read_func)(unsigned char *buf, size_t buf_len), 416 int (*nv_seed_write_func)(unsigned char *buf, size_t buf_len)
|
D | pem.h | 153 unsigned char *buf, size_t buf_len, size_t *olen);
|
/mbedtls-latest/tests/src/test_helpers/ |
D | ssl_helpers.c | 263 mbedtls_test_ssl_message_queue *queue, size_t buf_len) in mbedtls_test_ssl_message_queue_pop_info() argument 282 return (message_length > INT_MAX && buf_len > INT_MAX) ? INT_MAX : in mbedtls_test_ssl_message_queue_pop_info() 283 (message_length > buf_len) ? (int) buf_len : (int) message_length; in mbedtls_test_ssl_message_queue_pop_info() 300 size_t buf_len, size_t *msg_len) in test_ssl_message_queue_peek_info() argument 310 return (*msg_len > buf_len) ? MBEDTLS_TEST_ERROR_MESSAGE_TRUNCATED : 0; in test_ssl_message_queue_peek_info() 510 unsigned char *buf, size_t buf_len) in mbedtls_test_mock_tcp_recv_msg() argument 530 ret = test_ssl_message_queue_peek_info(queue, buf_len, &msg_len); in mbedtls_test_mock_tcp_recv_msg() 533 drop_len = msg_len - buf_len; in mbedtls_test_mock_tcp_recv_msg() 536 msg_len = buf_len; in mbedtls_test_mock_tcp_recv_msg() 554 ret = mbedtls_test_ssl_message_queue_pop_info(queue, buf_len); in mbedtls_test_mock_tcp_recv_msg() [all …]
|
/mbedtls-latest/programs/ssl/ |
D | ssl_client2.c | 2828 size_t buf_len; in main() local 2832 ret = mbedtls_ssl_context_save(&ssl, NULL, 0, &buf_len); in main() 2840 if ((context_buf = mbedtls_calloc(1, buf_len)) == NULL) { in main() 2846 context_buf_len = buf_len; in main() 2849 buf_len, &buf_len)) != 0) { in main() 2866 mbedtls_base64_encode(NULL, 0, &b64_len, context_buf, buf_len); in main() 2875 context_buf, buf_len)) != 0) { in main() 2942 buf_len)) != 0) { in main()
|
D | ssl_server2.c | 4013 size_t buf_len; in main() local 4017 ret = mbedtls_ssl_context_save(&ssl, NULL, 0, &buf_len); in main() 4025 if ((context_buf = mbedtls_calloc(1, buf_len)) == NULL) { in main() 4031 context_buf_len = buf_len; in main() 4034 buf_len, &buf_len)) != 0) { in main() 4051 mbedtls_base64_encode(NULL, 0, &b64_len, context_buf, buf_len); in main() 4060 context_buf, buf_len)) != 0) { in main() 4148 buf_len)) != 0) { in main()
|
/mbedtls-latest/tests/include/test/ |
D | ssl_helpers.h | 316 mbedtls_test_ssl_message_queue *queue, size_t buf_len); 425 unsigned char *buf, size_t buf_len);
|
/mbedtls-latest/docs/architecture/ |
D | tls13-support.md | 320 size_t *buf_len ); 330 buf, buf_len ); 335 buf_len );
|