Home
last modified time | relevance | path

Searched refs:buffer (Results 1 – 25 of 168) sorted by relevance

1234567

/openthread-latest/third_party/mbedtls/repo/programs/psa/
Dpsa_constant_names_generated.c90 static int psa_snprint_key_type(char *buffer, size_t buffer_size, in psa_snprint_key_type() argument
95 …case PSA_KEY_TYPE_AES: append(&buffer, buffer_size, &required_size, "PSA_KEY_TYPE_AES", 16); break; in psa_snprint_key_type()
96 …case PSA_KEY_TYPE_ARIA: append(&buffer, buffer_size, &required_size, "PSA_KEY_TYPE_ARIA", 17); bre… in psa_snprint_key_type()
97 …case PSA_KEY_TYPE_CAMELLIA: append(&buffer, buffer_size, &required_size, "PSA_KEY_TYPE_CAMELLIA", … in psa_snprint_key_type()
98 …case PSA_KEY_TYPE_CATEGORY_FLAG_PAIR: append(&buffer, buffer_size, &required_size, "PSA_KEY_TYPE_C… in psa_snprint_key_type()
99 …case PSA_KEY_TYPE_CATEGORY_KEY_PAIR: append(&buffer, buffer_size, &required_size, "PSA_KEY_TYPE_CA… in psa_snprint_key_type()
100 …case PSA_KEY_TYPE_CATEGORY_PUBLIC_KEY: append(&buffer, buffer_size, &required_size, "PSA_KEY_TYPE_… in psa_snprint_key_type()
101 …case PSA_KEY_TYPE_CATEGORY_RAW: append(&buffer, buffer_size, &required_size, "PSA_KEY_TYPE_CATEGOR… in psa_snprint_key_type()
102 …case PSA_KEY_TYPE_CATEGORY_SYMMETRIC: append(&buffer, buffer_size, &required_size, "PSA_KEY_TYPE_C… in psa_snprint_key_type()
103 …case PSA_KEY_TYPE_CHACHA20: append(&buffer, buffer_size, &required_size, "PSA_KEY_TYPE_CHACHA20", … in psa_snprint_key_type()
[all …]
Dpsa_constant_names.c43 static void append(char **buffer, size_t buffer_size, in append() argument
49 memcpy(*buffer, string, length); in append()
50 *buffer += length; in append()
54 static void append_integer(char **buffer, size_t buffer_size, in append_integer() argument
59 size_t n = snprintf(*buffer, buffer_size - *required_size, format, value); in append_integer()
61 *buffer += n; in append_integer()
71 static void append_with_curve(char **buffer, size_t buffer_size, in append_with_curve() argument
77 append(buffer, buffer_size, required_size, string, length); in append_with_curve()
78 append(buffer, buffer_size, required_size, "(", 1); in append_with_curve()
80 append(buffer, buffer_size, required_size, in append_with_curve()
[all …]
/openthread-latest/tests/unit/
Dtest_frame_builder.cpp49 uint8_t buffer[kMaxBufferSize]; in TestFrameBuilder() local
64 memset(buffer, 0, sizeof(buffer)); in TestFrameBuilder()
67 frameBuilder.Init(buffer, sizeof(buffer)); in TestFrameBuilder()
69 VerifyOrQuit(frameBuilder.GetBytes() == buffer); in TestFrameBuilder()
71 VerifyOrQuit(frameBuilder.GetMaxLength() == sizeof(buffer)); in TestFrameBuilder()
72 VerifyOrQuit(memcmp(buffer, zeroBuffer, sizeof(buffer)) == 0); in TestFrameBuilder()
73 VerifyOrQuit(frameBuilder.CanAppend(sizeof(buffer))); in TestFrameBuilder()
74 VerifyOrQuit(!frameBuilder.CanAppend(sizeof(buffer) + 1)); in TestFrameBuilder()
77 VerifyOrQuit(frameBuilder.GetBytes() == buffer); in TestFrameBuilder()
80 VerifyOrQuit(memcmp(buffer, zeroBuffer, sizeof(buffer)) == 0); in TestFrameBuilder()
[all …]
Dtest_data.cpp47 uint8_t buffer[sizeof(kData) + 1]; in TestData() local
65 memset(buffer, 0, sizeof(buffer)); in TestData()
66 data.CopyBytesTo(buffer); in TestData()
67 VerifyOrQuit(memcmp(buffer, kData, sizeof(kData)) == 0); in TestData()
68 VerifyOrQuit(buffer[sizeof(kData)] == 0); in TestData()
69 VerifyOrQuit(data.MatchesBytesIn(buffer)); in TestData()
103 memset(buffer, 0xaa, sizeof(buffer)); in TestData()
104 data.CopyBytesTo(buffer); in TestData()
105 VerifyOrQuit(buffer[0] == 0xaa); in TestData()
130 uint8_t buffer[kMaxSize]; in TestMutableData() local
[all …]
Dtest_tlv.cpp50 uint8_t buffer[4]; in TestTlv() local
61 VerifyOrQuit(Tlv::ReadTlvValue(*message, 0, buffer, 1) == kErrorParse); in TestTlv()
74 SuccessOrQuit(Tlv::ReadTlvValue(*message, offset, buffer, 0)); in TestTlv()
75 VerifyOrQuit(Tlv::ReadTlvValue(*message, offset, buffer, 1) == kErrorParse); in TestTlv()
88 SuccessOrQuit(Tlv::ReadTlvValue(*message, offset, buffer, 0)); in TestTlv()
89 VerifyOrQuit(Tlv::ReadTlvValue(*message, offset, buffer, 1) == kErrorParse); in TestTlv()
103 SuccessOrQuit(Tlv::ReadTlvValue(*message, offset, buffer, 1)); in TestTlv()
104 VerifyOrQuit(buffer[0] == 0x0ff); in TestTlv()
105 VerifyOrQuit(Tlv::ReadTlvValue(*message, offset, buffer, 2) == kErrorParse); in TestTlv()
120 SuccessOrQuit(Tlv::ReadTlvValue(*message, offset, buffer, 1)); in TestTlv()
[all …]
Dtest_network_name.cpp55 char buffer[sizeof(kTooLongName) + 2]; in TestNetworkName() local
91 memset(buffer, 'a', sizeof(buffer)); in TestNetworkName()
92 len = networkName.GetAsData().CopyTo(buffer, 1); in TestNetworkName()
94 VerifyOrQuit(buffer[0] == kName1[0], "NameData::CopyTo() failed"); in TestNetworkName()
95 VerifyOrQuit(buffer[1] == 'a', "NameData::CopyTo() failed"); in TestNetworkName()
97 memset(buffer, 'a', sizeof(buffer)); in TestNetworkName()
98 len = networkName.GetAsData().CopyTo(buffer, sizeof(kName1) - 1); in TestNetworkName()
100 VerifyOrQuit(memcmp(buffer, kName1, sizeof(kName1) - 1) == 0, "NameData::CopyTo() failed"); in TestNetworkName()
101 VerifyOrQuit(buffer[sizeof(kName1)] == 'a', "NameData::CopyTo() failed"); in TestNetworkName()
103 memset(buffer, 'a', sizeof(buffer)); in TestNetworkName()
[all …]
Dtest_cmd_line_parser.cpp254 uint8_t buffer[sizeof(kEvenParsedArray)]; in TestParsingHexStrings() local
262 buffer[0] = 0xff; in TestParsingHexStrings()
263 SuccessOrQuit(ParseAsHexString("0", buffer, 1)); in TestParsingHexStrings()
264 VerifyOrQuit(buffer[0] == 0, "ParseAsHexString() parsed incorrectly"); in TestParsingHexStrings()
266 buffer[0] = 0; in TestParsingHexStrings()
267 SuccessOrQuit(ParseAsHexString("7e", buffer, 1)); in TestParsingHexStrings()
268 VerifyOrQuit(buffer[0] == 0x7e, "ParseAsHexString() parsed incorrectly"); in TestParsingHexStrings()
270 …VerifyOrQuit(ParseAsHexString("123", buffer, 1) != OT_ERROR_NONE, "ParseAsHexString() passed with … in TestParsingHexStrings()
271 SuccessOrQuit(ParseAsHexString("123", buffer, 2)); in TestParsingHexStrings()
272 VerifyOrQuit(buffer[0] == 1 && buffer[1] == 0x23, "ParseAsHexString() parsed incorrectly"); in TestParsingHexStrings()
[all …]
Dtest_message.cpp348 uint8_t buffer[kMaxBufferSize]; in TestAppender() local
350 Appender bufAppender(buffer, sizeof(buffer)); in TestAppender()
361 memset(buffer, 0, sizeof(buffer)); in TestAppender()
366 VerifyOrQuit(bufAppender.GetBufferStart() == buffer); in TestAppender()
370 DumpBuffer("Data1", buffer, sizeof(buffer)); in TestAppender()
372 VerifyOrQuit(bufAppender.GetBufferStart() == buffer); in TestAppender()
373 VerifyOrQuit(memcmp(buffer, kData1, sizeof(kData1)) == 0); in TestAppender()
374 VerifyOrQuit(memcmp(buffer + sizeof(kData1), zeroBuffer, sizeof(buffer) - sizeof(kData1)) == 0); in TestAppender()
377 DumpBuffer("Data1+Data2", buffer, sizeof(buffer)); in TestAppender()
379 VerifyOrQuit(bufAppender.GetBufferStart() == buffer); in TestAppender()
[all …]
Dtest_toolchain.cpp129 uint8_t buffer[sizeof(PackedStruct) * 2 + 1]; in test_packed_alignment() local
139 uint8_t *ptr = &buffer[start]; in test_packed_alignment()
141 memset(buffer, 0, sizeof(buffer)); in test_packed_alignment()
147 VerifyOrQuit(buffer[i] == 0, "OT_TOOL_PACKED alignment failed - pre-size write"); in test_packed_alignment()
152 for (size_t i = start + sizeof(packedStruct); i < sizeof(buffer); i++) in test_packed_alignment()
154 VerifyOrQuit(buffer[i] == 0, "OT_TOOL_PACKED alignment failed - post-size write"); in test_packed_alignment()
Dtest_spinel_decoder.cpp45 uint8_t buffer[kTestBufferSize]; in TestDecoder() local
102 memset(buffer, 0, sizeof(buffer)); in TestDecoder()
108 buffer, sizeof(buffer), in TestDecoder()
119 DumpBuffer("Packed Spinel Frame", buffer, static_cast<uint16_t>(frameLen)); in TestDecoder()
121 decoder.Init(buffer, static_cast<uint16_t>(frameLen)); in TestDecoder()
123 VerifyOrQuit(decoder.GetFrame() == &buffer[0]); in TestDecoder()
197 VerifyOrQuit(decoder.GetFrame() == &buffer[0]); in TestDecoder()
289 decoder.Init(buffer, static_cast<uint16_t>(frameLen)); in TestDecoder()
297 frameLen = spinel_datatype_pack(buffer, sizeof(buffer), in TestDecoder()
305 DumpBuffer("Packed Spinel Frame (single struct)", buffer, static_cast<uint16_t>(frameLen)); in TestDecoder()
[all …]
/openthread-latest/third_party/tcplp/lib/
Dlbuf.c36 void lbuf_init(struct lbufhead* buffer) { in lbuf_init() argument
37 memset(buffer, 0x00, sizeof(struct lbufhead)); in lbuf_init()
40 void lbuf_append(struct lbufhead* buffer, otLinkedBuffer* newentry) { in lbuf_append() argument
41 otLinkedBuffer* tail = buffer->tail; in lbuf_append()
43 buffer->head = newentry; in lbuf_append()
44 buffer->tail = newentry; in lbuf_append()
45 buffer->offset = 0; in lbuf_append()
46 buffer->length = newentry->mLength; in lbuf_append()
50 buffer->tail = newentry; in lbuf_append()
51 buffer->length += newentry->mLength; in lbuf_append()
[all …]
Dlbuf.h48 void lbuf_init(struct lbufhead* buffer);
52 static inline struct otLinkedBuffer* lbuf_head(struct lbufhead* buffer) { in lbuf_head() argument
53 return buffer->head; in lbuf_head()
58 void lbuf_append(struct lbufhead* buffer, struct otLinkedBuffer* newentry);
61 void lbuf_extend(struct lbufhead* buffer, size_t numbytes);
68 size_t lbuf_pop(struct lbufhead* buffer, size_t numbytes, uint32_t* ntraversed);
81 int lbuf_getrange(struct lbufhead* buffer, size_t offset, size_t numbytes,
86 size_t lbuf_used_space(const struct lbufhead* buffer);
/openthread-latest/third_party/mbedtls/repo/tests/suites/
Dtest_suite_psa_crypto_memory.data1 PSA input buffer copy: straightforward copy
4 PSA input buffer copy: copy buffer larger than required
7 PSA input buffer copy: copy buffer too small
10 PSA input buffer copy: zero-length source buffer
13 PSA input buffer copy: zero-length both buffers
16 PSA output buffer copy: straightforward copy
19 PSA output buffer copy: output buffer larger than required
22 PSA output buffer copy: output buffer too small
25 PSA output buffer copy: zero-length source buffer
28 PSA output buffer copy: zero-length both buffers
[all …]
Dtest_suite_debug.function14 struct buffer_data *buffer = (struct buffer_data *) data;
15 char *p = buffer->ptr;
45 buffer->ptr = p;
60 struct buffer_data buffer;
66 memset(buffer.buf, 0, 2000);
67 buffer.ptr = buffer.buf;
75 mbedtls_ssl_conf_dbg(&conf, string_debug, &buffer);
84 TEST_ASSERT(strcmp(buffer.buf, result_str) == 0);
99 struct buffer_data buffer;
105 memset(buffer.buf, 0, 2000);
[all …]
Dtest_suite_psa_crypto_memory.function14 /* Helper to fill a buffer with a data pattern. The pattern is not
17 static void fill_buffer_pattern(uint8_t *buffer, size_t len)
20 buffer[i] = (uint8_t) (i % 256);
47 /* Note: We compare the first src_len bytes of each buffer, as this is what was copied. */
74 /* Note: We compare the first src_len bytes of each buffer, as this is what was copied. */
91 local_input.buffer = NULL;
102 TEST_ASSERT(local_input.buffer != input);
105 local_input.buffer, local_input.length);
109 mbedtls_free(local_input.buffer);
119 local_input.buffer = NULL;
[all …]
Dtest_suite_memory_buffer_alloc.data1 Memory buffer alloc self test
4 Memory buffer alloc - free in middle, alloc at end
7 Memory buffer alloc - free in middle, realloc
10 Memory buffer alloc - free in middle, merge, realloc
13 Memory buffer alloc - free at end, merge, realloc
16 Memory buffer alloc - Out of Memory test
19 Memory buffer: heap too small (header verification should fail)
22 Memory buffer: attempt to allocate SIZE_MAX
Dtest_suite_base64.data7 Test case mbedtls_base64_encode #1 buffer just right
10 Test case mbedtls_base64_encode #2 buffer just right
13 Test case mbedtls_base64_encode #2 buffer too small
16 Test case mbedtls_base64_encode #3 buffer just right
19 Test case mbedtls_base64_encode #3 buffer too small
22 Test case mbedtls_base64_encode #4 buffer just right
25 Test case mbedtls_base64_encode #4 buffer too small
28 Test case mbedtls_base64_encode #5 buffer just right
31 Test case mbedtls_base64_encode #5 buffer too small
34 Test case mbedtls_base64_encode #6 buffer just right
[all …]
Dtest_suite_psa_its.function92 unsigned char *buffer = NULL;
95 TEST_CALLOC(buffer, data->len);
102 PSA_ASSERT(psa_its_get(uid, 0, data->len, buffer, &ret_len));
103 TEST_MEMORY_COMPARE(data->x, data->len, buffer, ret_len);
108 mbedtls_free(buffer);
122 unsigned char *buffer = NULL;
125 TEST_CALLOC(buffer, MAX(data1->len, data2->len));
131 PSA_ASSERT(psa_its_get(uid, 0, data1->len, buffer, &ret_len));
132 TEST_MEMORY_COMPARE(data1->x, data1->len, buffer, ret_len);
139 PSA_ASSERT(psa_its_get(uid, 0, data2->len, buffer, &ret_len));
[all …]
/openthread-latest/third_party/tcplp/lib/test/
Dtest_all.c48 uint8_t buffer[test_bmp_size]; in test_bmp() local
50 bmp_init(buffer, test_bmp_size); in test_bmp()
51 bmp_test("bmp_init", buffer, test_bmp_size, "0000000000000000"); in test_bmp()
53 bmp_setrange(buffer, 11, 7); in test_bmp()
54 bmp_test("bmp_setrange 1", buffer, test_bmp_size, "001FC00000000000"); in test_bmp()
56 bmp_setrange(buffer, 35, 3); in test_bmp()
57 bmp_test("bmp_setrange 2", buffer, test_bmp_size, "001FC0001C000000"); in test_bmp()
59 bmp_setrange(buffer, 47, 4); in test_bmp()
60 bmp_test("bmp_setrange 3", buffer, test_bmp_size, "001FC0001C01E000"); in test_bmp()
62 bmp_swap(buffer, 3, 36, 1); in test_bmp()
[all …]
/openthread-latest/third_party/mbedtls/repo/library/
Dpsa_crypto_pake.c312 operation->buffer, in mbedtls_psa_pake_output_internal()
313 sizeof(operation->buffer), in mbedtls_psa_pake_output_internal()
324 operation->buffer, in mbedtls_psa_pake_output_internal()
325 sizeof(operation->buffer), in mbedtls_psa_pake_output_internal()
354 length = operation->buffer[operation->buffer_offset]; in mbedtls_psa_pake_output_internal()
366 operation->buffer + operation->buffer_offset, in mbedtls_psa_pake_output_internal()
375 mbedtls_platform_zeroize(operation->buffer, sizeof(operation->buffer)); in mbedtls_psa_pake_output_internal()
448 sizeof(operation->buffer)) { in mbedtls_psa_pake_input_internal()
452 memcpy(operation->buffer + operation->buffer_length, in mbedtls_psa_pake_input_internal()
462 if (operation->buffer_length + input_length + 1 > sizeof(operation->buffer)) { in mbedtls_psa_pake_input_internal()
[all …]
/openthread-latest/src/posix/
Dclient.cpp285 char buffer[kLineBufferSize]; in main() local
290 for (const char *c = argv[i]; *c && count < sizeof(buffer);) in main()
294 buffer[count++] = '\\'; in main()
296 VerifyOrExit(count < sizeof(buffer), ret = OT_EXIT_INVALID_ARGUMENTS); in main()
299 buffer[count++] = *c++; in main()
302 VerifyOrExit(count < sizeof(buffer), ret = OT_EXIT_INVALID_ARGUMENTS); in main()
303 buffer[count++] = ' '; in main()
309 VerifyOrExit(DoWrite(sSessionFd, buffer, count), ret = OT_EXIT_FAILURE); in main()
327 char buffer[kLineBufferSize]; in main() local
358 VerifyOrExit(fgets(buffer, sizeof(buffer), stdin) != nullptr, ret = OT_EXIT_FAILURE); in main()
[all …]
/openthread-latest/src/lib/spinel/
Dspinel_driver.cpp105 uint8_t buffer[kMaxSpinelFrame]; in SendReset() local
109 …packed = spinel_datatype_pack(buffer, sizeof(buffer), SPINEL_DATATYPE_COMMAND_S SPINEL_DATATYPE_UI… in SendReset()
112 EXPECT(packed > 0 && static_cast<size_t>(packed) <= sizeof(buffer), error = OT_ERROR_NO_BUFS); in SendReset()
114 EXPECT_NO_ERROR(error = mSpinelInterface->SendFrame(buffer, static_cast<uint16_t>(packed))); in SendReset()
115 LogSpinelFrame(buffer, static_cast<uint16_t>(packed), true /* aTx */); in SendReset()
182 uint8_t buffer[kMaxSpinelFrame]; in SendCommand() local
187 …packed = spinel_datatype_pack(buffer, sizeof(buffer), "Cii", SPINEL_HEADER_FLAG | SPINEL_HEADER_II… in SendCommand()
190 EXPECT(packed > 0 && static_cast<size_t>(packed) <= sizeof(buffer), error = OT_ERROR_NO_BUFS); in SendCommand()
194 EXPECT_NO_ERROR(error = mSpinelInterface->SendFrame(buffer, offset)); in SendCommand()
195 LogSpinelFrame(buffer, offset, true /* aTx */); in SendCommand()
[all …]
/openthread-latest/third_party/jlink/SEGGER_RTT_V640/Syscalls/
DSEGGER_RTT_Syscalls_IAR.c83 size_t __write(int handle, const unsigned char * buffer, size_t size);
101 size_t __write(int handle, const unsigned char * buffer, size_t size) { in __write() argument
103 SEGGER_RTT_Write(0, (const char*)buffer, size); in __write()
117 size_t __write_buffered(int handle, const unsigned char * buffer, size_t size) { in __write_buffered() argument
119 SEGGER_RTT_Write(0, (const char*)buffer, size); in __write_buffered()
/openthread-latest/src/core/api/
Dtcp_ext_api.cpp113 const otLinkedBuffer *buffer; in otTcpMbedTlsSslRecvCallback() local
117 error = otTcpReceiveByReference(endpoint, &buffer); in otTcpMbedTlsSslRecvCallback()
119 while (bytes_read != aLen && buffer != nullptr) in otTcpMbedTlsSslRecvCallback()
121 size_t to_copy = OT_MIN(aLen - bytes_read, buffer->mLength); in otTcpMbedTlsSslRecvCallback()
122 memcpy(&aBuf[bytes_read], buffer->mData, to_copy); in otTcpMbedTlsSslRecvCallback()
124 buffer = buffer->mNext; in otTcpMbedTlsSslRecvCallback()
/openthread-latest/examples/platforms/simulation/
Dmdns_socket.c303 uint8_t buffer[MAX_BUFFER_SIZE]; in otPlatMdnsSendMulticast() local
309 length = otMessageRead(aMessage, 0, buffer, sizeof(buffer)); in otPlatMdnsSendMulticast()
320 bytes = sendto(sMdnsFd4, buffer, length, 0, (struct sockaddr *)&addr, sizeof(addr)); in otPlatMdnsSendMulticast()
333 bytes = sendto(sMdnsFd6, buffer, length, 0, (struct sockaddr *)&addr6, sizeof(addr6)); in otPlatMdnsSendMulticast()
347 uint8_t buffer[MAX_BUFFER_SIZE]; in otPlatMdnsSendUnicast() local
353 length = otMessageRead(aMessage, 0, buffer, sizeof(buffer)); in otPlatMdnsSendUnicast()
365 bytes = sendto(sMdnsFd4, buffer, length, 0, (struct sockaddr *)&addr, sizeof(addr)); in otPlatMdnsSendUnicast()
378 bytes = sendto(sMdnsFd6, buffer, length, 0, (struct sockaddr *)&addr6, sizeof(addr6)); in otPlatMdnsSendUnicast()
404 uint8_t buffer[MAX_BUFFER_SIZE]; in platformMdnsSocketProcess() local
412 … rval = recvfrom(sMdnsFd4, (char *)&buffer, sizeof(buffer), 0, (struct sockaddr *)&sockaddr, &len); in platformMdnsSocketProcess()
[all …]

1234567