Searched refs:buf1 (Results 1 – 4 of 4) sorted by relevance
| /openthread-latest/third_party/mbedtls/repo/library/ |
| D | entropy.c | 550 unsigned char buf1[2 * sizeof(unsigned long long int)]; in mbedtls_entropy_source_self_test() local 557 memset(buf1, 0x00, sizeof(buf1)); in mbedtls_entropy_source_self_test() 562 if ((ret = mbedtls_entropy_source_self_test_gather(buf1, sizeof(buf1))) != 0) { in mbedtls_entropy_source_self_test() 570 if ((ret = mbedtls_entropy_source_self_test_check_bits(buf1, sizeof(buf1))) != 0) { in mbedtls_entropy_source_self_test() 576 ret = memcmp(buf0, buf1, sizeof(buf0)) == 0; in mbedtls_entropy_source_self_test()
|
| /openthread-latest/third_party/mbedtls/repo/tests/suites/ |
| D | test_suite_ssl_decrypt.function | 98 const uint8_t buf1[1] = { 'a' }; 100 /* We won't write to buf1[0] since it's out of range, so we can cast 102 rec.buf = (uint8_t *) buf1;
|
| D | test_suite_pk.function | 351 unsigned char buf1[RSA_WRITE_PUBKEY_MAX_SIZE]; 352 unsigned char *p1 = buf1 + sizeof(buf1); 353 int len1 = mbedtls_rsa_write_pubkey(rsa1, buf1, &p1); 380 unsigned char buf1[ECP_WRITE_PUBKEY_MAX_SIZE]; 384 &len1, buf1, sizeof(buf1)), 0); 390 TEST_MEMORY_COMPARE(buf1, len1, buf2, len2);
|
| D | test_suite_ssl.function | 2158 unsigned char *buf1 = NULL, *buf2 = NULL; 2196 buf1 = mbedtls_calloc(1, len0); 2197 TEST_ASSERT(buf1 != NULL); 2200 TEST_ASSERT(mbedtls_ssl_session_save(&session, buf1, len0, &len1) 2206 TEST_ASSERT(mbedtls_ssl_session_load(&session, buf1, len1) == 0); 2216 TEST_ASSERT(memcmp(buf1, buf2, len1) == 0); 2220 mbedtls_free(buf1);
|