Home
last modified time | relevance | path

Searched refs:input_len (Results 1 – 8 of 8) sorted by relevance

/openthread-3.4.0/third_party/mbedtls/repo/tests/suites/
Dtest_suite_chachapoly.function78 size_t input_len = sizeof( input );
116 input_len, nonce,
121 input_len, nonce,
153 input_len, nonce,
158 input_len, nonce,
180 mbedtls_chachapoly_update( NULL, input_len,
183 mbedtls_chachapoly_update( &ctx, input_len,
186 mbedtls_chachapoly_update( &ctx, input_len,
209 size_t input_len = sizeof( input );
225 TEST_ASSERT( mbedtls_chachapoly_update( &ctx, input_len, input, output )
[all …]
Dtest_suite_ssl.function153 * Puts \p input_len bytes from the \p input buffer into the ring buffer \p buf.
158 * \retval \p input_len, if the data fits.
159 * \retval 0 <= value < \p input_len, if the data does not fit.
160 * \retval -1, if \p buf is NULL, it hasn't been set up or \p input_len is not
164 const unsigned char *input, size_t input_len )
171 /* Reduce input_len to a number that fits in the buffer. */
172 if ( ( buf->content_length + input_len ) > buf->capacity )
174 input_len = buf->capacity - buf->content_length;
179 return ( input_len == 0 ) ? 0 : -1;
189 if( buf->start + buf->content_length + input_len
[all …]
/openthread-3.4.0/third_party/mbedtls/repo/library/
Dpkcs11.c133 size_t input_len, output_len; in mbedtls_pkcs11_decrypt() local
141 output_len = input_len = ctx->len; in mbedtls_pkcs11_decrypt()
143 if( input_len < 16 || input_len > output_max_len ) in mbedtls_pkcs11_decrypt()
148 input_len, NULL, &output_len ) != CKR_OK ) in mbedtls_pkcs11_decrypt()
157 input_len, output, &output_len ) != CKR_OK ) in mbedtls_pkcs11_decrypt()
Dcipher.c739 static int get_pkcs_padding( unsigned char *input, size_t input_len, in get_pkcs_padding() argument
748 padding_len = input[input_len - 1]; in get_pkcs_padding()
749 *data_len = input_len - padding_len; in get_pkcs_padding()
752 bad |= padding_len > input_len; in get_pkcs_padding()
757 pad_idx = input_len - padding_len; in get_pkcs_padding()
758 for( i = 0; i < input_len; i++ ) in get_pkcs_padding()
780 static int get_one_and_zeros_padding( unsigned char *input, size_t input_len, in get_one_and_zeros_padding() argument
791 for( i = input_len; i > 0; i-- ) in get_one_and_zeros_padding()
819 static int get_zeros_and_len_padding( unsigned char *input, size_t input_len, in get_zeros_and_len_padding() argument
828 padding_len = input[input_len - 1]; in get_zeros_and_len_padding()
[all …]
Dssl_tls13_keys.c290 const unsigned char *input, size_t input_len, in mbedtls_ssl_tls1_3_evolve_secret() argument
322 memcpy( tmp_input, input, input_len ); in mbedtls_ssl_tls1_3_evolve_secret()
323 ilen = input_len; in mbedtls_ssl_tls1_3_evolve_secret()
Dssl_tls13_keys.h271 const unsigned char *input, size_t input_len,
/openthread-3.4.0/third_party/mbedtls/repo/programs/ssl/
Dssl_server2.c1031 size_t input_len; member
1040 size_t input_len ) in ssl_async_start() argument
1080 if( input_len > SSL_ASYNC_INPUT_MAX_SIZE ) in ssl_async_start()
1089 memcpy( ctx->input, input, input_len ); in ssl_async_start()
1090 ctx->input_len = input_len; in ssl_async_start()
1114 size_t input_len ) in ssl_async_decrypt() argument
1118 input, input_len ) ); in ssl_async_decrypt()
1145 ctx->input, ctx->input_len, in ssl_async_resume()
1152 ctx->input, ctx->input_len, in ssl_async_resume()
/openthread-3.4.0/third_party/mbedtls/repo/include/mbedtls/
Dssl.h840 size_t input_len );