Searched refs:input_len (Results 1 – 8 of 8) sorted by relevance
/openthread-3.4.0/third_party/mbedtls/repo/tests/suites/ |
D | test_suite_chachapoly.function | 78 size_t input_len = sizeof( input ); 116 input_len, nonce, 121 input_len, nonce, 153 input_len, nonce, 158 input_len, nonce, 180 mbedtls_chachapoly_update( NULL, input_len, 183 mbedtls_chachapoly_update( &ctx, input_len, 186 mbedtls_chachapoly_update( &ctx, input_len, 209 size_t input_len = sizeof( input ); 225 TEST_ASSERT( mbedtls_chachapoly_update( &ctx, input_len, input, output ) [all …]
|
D | test_suite_ssl.function | 153 * Puts \p input_len bytes from the \p input buffer into the ring buffer \p buf. 158 * \retval \p input_len, if the data fits. 159 * \retval 0 <= value < \p input_len, if the data does not fit. 160 * \retval -1, if \p buf is NULL, it hasn't been set up or \p input_len is not 164 const unsigned char *input, size_t input_len ) 171 /* Reduce input_len to a number that fits in the buffer. */ 172 if ( ( buf->content_length + input_len ) > buf->capacity ) 174 input_len = buf->capacity - buf->content_length; 179 return ( input_len == 0 ) ? 0 : -1; 189 if( buf->start + buf->content_length + input_len [all …]
|
/openthread-3.4.0/third_party/mbedtls/repo/library/ |
D | pkcs11.c | 133 size_t input_len, output_len; in mbedtls_pkcs11_decrypt() local 141 output_len = input_len = ctx->len; in mbedtls_pkcs11_decrypt() 143 if( input_len < 16 || input_len > output_max_len ) in mbedtls_pkcs11_decrypt() 148 input_len, NULL, &output_len ) != CKR_OK ) in mbedtls_pkcs11_decrypt() 157 input_len, output, &output_len ) != CKR_OK ) in mbedtls_pkcs11_decrypt()
|
D | cipher.c | 739 static int get_pkcs_padding( unsigned char *input, size_t input_len, in get_pkcs_padding() argument 748 padding_len = input[input_len - 1]; in get_pkcs_padding() 749 *data_len = input_len - padding_len; in get_pkcs_padding() 752 bad |= padding_len > input_len; in get_pkcs_padding() 757 pad_idx = input_len - padding_len; in get_pkcs_padding() 758 for( i = 0; i < input_len; i++ ) in get_pkcs_padding() 780 static int get_one_and_zeros_padding( unsigned char *input, size_t input_len, in get_one_and_zeros_padding() argument 791 for( i = input_len; i > 0; i-- ) in get_one_and_zeros_padding() 819 static int get_zeros_and_len_padding( unsigned char *input, size_t input_len, in get_zeros_and_len_padding() argument 828 padding_len = input[input_len - 1]; in get_zeros_and_len_padding() [all …]
|
D | ssl_tls13_keys.c | 290 const unsigned char *input, size_t input_len, in mbedtls_ssl_tls1_3_evolve_secret() argument 322 memcpy( tmp_input, input, input_len ); in mbedtls_ssl_tls1_3_evolve_secret() 323 ilen = input_len; in mbedtls_ssl_tls1_3_evolve_secret()
|
D | ssl_tls13_keys.h | 271 const unsigned char *input, size_t input_len,
|
/openthread-3.4.0/third_party/mbedtls/repo/programs/ssl/ |
D | ssl_server2.c | 1031 size_t input_len; member 1040 size_t input_len ) in ssl_async_start() argument 1080 if( input_len > SSL_ASYNC_INPUT_MAX_SIZE ) in ssl_async_start() 1089 memcpy( ctx->input, input, input_len ); in ssl_async_start() 1090 ctx->input_len = input_len; in ssl_async_start() 1114 size_t input_len ) in ssl_async_decrypt() argument 1118 input, input_len ) ); in ssl_async_decrypt() 1145 ctx->input, ctx->input_len, in ssl_async_resume() 1152 ctx->input, ctx->input_len, in ssl_async_resume()
|
/openthread-3.4.0/third_party/mbedtls/repo/include/mbedtls/ |
D | ssl.h | 840 size_t input_len );
|