Searched refs:in_len (Results 1 – 11 of 11) sorted by relevance
/mbedtls-latest/library/ |
D | nist_kw.c | 131 const unsigned char *input, size_t in_len, in mbedtls_nist_kw_wrap() argument 147 if (out_size < in_len + KW_SEMIBLOCK_LENGTH) { in mbedtls_nist_kw_wrap() 155 if (in_len < 16 || in mbedtls_nist_kw_wrap() 157 in_len > 0x1FFFFFFFFFFFFF8 || in mbedtls_nist_kw_wrap() 159 in_len % KW_SEMIBLOCK_LENGTH != 0) { in mbedtls_nist_kw_wrap() 164 memmove(output + KW_SEMIBLOCK_LENGTH, input, in_len); in mbedtls_nist_kw_wrap() 166 if (in_len % 8 != 0) { in mbedtls_nist_kw_wrap() 167 padlen = (8 - (in_len % 8)); in mbedtls_nist_kw_wrap() 170 if (out_size < in_len + KW_SEMIBLOCK_LENGTH + padlen) { in mbedtls_nist_kw_wrap() 178 if (in_len < 1 in mbedtls_nist_kw_wrap() [all …]
|
D | ssl_msg.c | 3475 const unsigned char *in, size_t in_len, in mbedtls_ssl_check_dtls_clihlo_cookie() argument 3508 (unsigned) in_len)); in mbedtls_ssl_check_dtls_clihlo_cookie() 3510 if (in_len < 61) { in mbedtls_ssl_check_dtls_clihlo_cookie() 3528 if (59 + 1 + sid_len + 1 > in_len) { in mbedtls_ssl_check_dtls_clihlo_cookie() 3531 (unsigned) in_len - 61)); in mbedtls_ssl_check_dtls_clihlo_cookie() 3538 if (59 + 1 + sid_len + 1 + cookie_len > in_len) { in mbedtls_ssl_check_dtls_clihlo_cookie() 3541 (unsigned) (in_len - sid_len - 61))); in mbedtls_ssl_check_dtls_clihlo_cookie() 4889 ssl->in_len = ssl->in_cid + rec.cid_len; in ssl_get_next_record() 4891 ssl->in_iv = ssl->in_msg = ssl->in_len + 2; in ssl_get_next_record() 5008 ssl->in_len = ssl->in_cid + rec.cid_len; in ssl_get_next_record() [all …]
|
D | cmac.c | 388 const unsigned char *input, size_t in_len, in mbedtls_aes_cmac_prf_128() argument 420 ret = mbedtls_cipher_cmac(cipher_info, int_key, 128, input, in_len, in mbedtls_aes_cmac_prf_128()
|
D | ssl_misc.h | 2862 const unsigned char *in, size_t in_len,
|
D | ssl_tls12_server.c | 962 MBEDTLS_GET_UINT16_BE(ssl->in_len, 0))); in ssl_parse_client_hello() 998 msg_len = MBEDTLS_GET_UINT16_BE(ssl->in_len, 0); in ssl_parse_client_hello()
|
D | ssl_tls.c | 352 len_offset_in = ssl->in_len - ssl->in_buf; in handle_buffer_resizing() 392 ssl->in_len = ssl->in_buf + len_offset_in; in handle_buffer_resizing() 1439 ssl->in_len = NULL; in mbedtls_ssl_setup()
|
/mbedtls-latest/tests/suites/ |
D | test_suite_constant_time_hmac.function | 29 size_t min_in_len, in_len, max_in_len, i; 92 for (in_len = min_in_len; in_len <= max_in_len; in_len++) { 93 mbedtls_test_set_step(max_in_len * 10000 + in_len); 98 for (i = 0; i < in_len; i++) { 103 TEST_CF_SECRET(&in_len, sizeof(in_len)); 107 data, in_len, 112 data, in_len, 116 TEST_CF_PUBLIC(&in_len, sizeof(in_len)); 125 data, in_len)); 132 TEST_EQUAL(0, mbedtls_md_hmac_update(&ref_ctx, data, in_len));
|
D | test_suite_nist_kw.function | 146 void nist_kw_plaintext_lengths(int in_len, int out_len, int mode, int res) 158 if (in_len != 0) { 159 plaintext = mbedtls_calloc(1, in_len); 171 TEST_ASSERT(mbedtls_nist_kw_wrap(&ctx, mode, plaintext, in_len, 176 TEST_ASSERT(output_len == (size_t) in_len + 8 - 177 (in_len % 8) + 8); 179 TEST_ASSERT(output_len == (size_t) in_len + 8); 193 void nist_kw_ciphertext_lengths(int in_len, int out_len, int mode, int res) 210 if (in_len != 0) { 211 ciphertext = mbedtls_calloc(1, in_len); [all …]
|
/mbedtls-latest/include/mbedtls/ |
D | nist_kw.h | 121 const unsigned char *input, size_t in_len, 148 const unsigned char *input, size_t in_len,
|
D | cmac.h | 221 const unsigned char *input, size_t in_len,
|
D | ssl.h | 1797 unsigned char *MBEDTLS_PRIVATE(in_len); /*!< two-bytes message length field */
|