Searched refs:user_len (Results 1 – 6 of 6) sorted by relevance
/mbedtls-latest/library/ |
D | psa_crypto_pake.c | 159 size_t user_len = 0, peer_len = 0, password_len = 0; in mbedtls_psa_pake_setup() local 169 status = psa_crypto_driver_pake_get_user_len(inputs, &user_len); in mbedtls_psa_pake_setup() 190 user = mbedtls_calloc(1, user_len); in mbedtls_psa_pake_setup() 209 user_len, &actual_user_len); in mbedtls_psa_pake_setup()
|
D | psa_crypto.c | 8418 size_t *user_len) argument 8420 if (inputs->user_len == 0) { 8424 *user_len = inputs->user_len; 8433 if (inputs->user_len == 0) { 8437 if (user_id_size < inputs->user_len) { 8441 memcpy(user_id, inputs->user, inputs->user_len); 8442 *user_id_len = inputs->user_len; 8602 if (operation->data.inputs.user_len != 0) { 8616 operation->data.inputs.user_len = user_id_len; 8744 if (inputs.user_len == 0 || inputs.peer_len == 0) {
|
D | ssl_tls.c | 1960 size_t user_len = 0; in mbedtls_ssl_set_hs_ecjpake_password_common() local 1977 user_len = sizeof(jpake_server_id); in mbedtls_ssl_set_hs_ecjpake_password_common() 1982 user_len = sizeof(jpake_client_id); in mbedtls_ssl_set_hs_ecjpake_password_common() 1987 status = psa_pake_set_user(&ssl->handshake->psa_pake_ctx, user, user_len); in mbedtls_ssl_set_hs_ecjpake_password_common()
|
/mbedtls-latest/tests/suites/ |
D | test_suite_psa_crypto_pake.function | 612 size_t user_len = strlen(user_arg); 637 TEST_EQUAL(psa_pake_set_user(&operation, user, user_len), 668 SETUP_ALWAYS_CHECK_STEP(psa_pake_set_user(&operation, user, user_len), 674 SETUP_CONDITIONAL_CHECK_STEP(psa_pake_set_user(&operation, user, user_len), 1100 uint8_t user_len = strlen(users[i]); 1114 PSA_ASSERT(psa_pake_set_user(&operation, user, user_len)); 1119 TEST_EQUAL(user_len_ret, user_len); 1133 TEST_MEMORY_COMPARE(user_ret, buffer_len_ret, user, user_len);
|
/mbedtls-latest/include/psa/ |
D | crypto_extra.h | 1113 size_t *user_len); 1801 size_t MBEDTLS_PRIVATE(user_len);
|
/mbedtls-latest/docs/proposed/ |
D | psa-driver-interface.md | 645 size_t *user_len);
|