Lines Matching refs:len
19 size_t n2 = input->len - n1;
20 size_t n2_add = add->len - n1_add;
24 TEST_ASSERT( n1 <= input->len );
25 TEST_ASSERT( n1_add <= add->len );
26 TEST_EQUAL( input->len, expected_output->len );
29 iv->x, iv->len ) );
52 ASSERT_ALLOC( output, tag->len );
53 TEST_EQUAL( 0, mbedtls_gcm_finish( ctx, NULL, 0, &olen, output, tag->len ) );
55 ASSERT_COMPARE( output, tag->len, tag->x, tag->len );
78 TEST_EQUAL( input->len, expected_output->len );
81 iv->x, iv->len ) );
91 ASSERT_ALLOC( output, input->len );
93 TEST_EQUAL( 0, mbedtls_gcm_update( ctx, input->x, input->len, output, input->len, &olen ) );
94 TEST_EQUAL( input->len, olen );
95 ASSERT_COMPARE( output, olen, expected_output->x, input->len );
99 ASSERT_ALLOC( output, tag->len );
100 TEST_EQUAL( 0, mbedtls_gcm_finish( ctx, NULL, 0, &olen, output, tag->len ) );
102 ASSERT_COMPARE( output, tag->len, tag->x, tag->len );
119 TEST_EQUAL( 0, mbedtls_gcm_starts( ctx, mode, iv->x, iv->len ) );
120 TEST_EQUAL( 0, mbedtls_gcm_update_ad( ctx, add->x, add->len ) );
129 ASSERT_ALLOC( output_tag, tag->len );
131 output_tag, tag->len ) );
133 ASSERT_COMPARE( output_tag, tag->len, tag->x, tag->len );
148 iv->x, iv->len ) );
149 ASSERT_ALLOC( output, tag->len );
150 TEST_EQUAL( 0, mbedtls_gcm_finish( ctx, NULL, 0, &olen, output, tag->len ) );
152 ASSERT_COMPARE( output, tag->len, tag->x, tag->len );
181 TEST_ASSERT( mbedtls_gcm_setkey( &ctx, cipher_id, key_str->x, key_str->len * 8 ) == 0 );
182 TEST_ASSERT( mbedtls_gcm_crypt_and_tag( &ctx, direction, src_str->len, iv_str->x, iv_str->len,
183 … add_str->x, add_str->len, src_str->x, output, tag_len, tag_output ) == gcm_result );
210 … TEST_ASSERT( mbedtls_gcm_setkey( &ctx, cipher_id, key_str->x, key_str->len * 8 ) == init_result );
213 …rypt_and_tag( &ctx, MBEDTLS_GCM_ENCRYPT, src_str->len, iv_str->x, iv_str->len, add_str->x, add_str…
215 ASSERT_COMPARE( output, src_str->len, dst->x, dst->len );
216 ASSERT_COMPARE( tag_output, tag_len, tag->x, tag->len );
218 for( n1 = 0; n1 <= src_str->len; n1 += 1 )
220 for( n1_add = 0; n1_add <= add_str->len; n1_add += 1 )
256 … TEST_ASSERT( mbedtls_gcm_setkey( &ctx, cipher_id, key_str->x, key_str->len * 8 ) == init_result );
259 …ret = mbedtls_gcm_auth_decrypt( &ctx, src_str->len, iv_str->x, iv_str->len, add_str->x, add_str->l…
268 ASSERT_COMPARE( output, src_str->len, pt_result->x, pt_result->len );
270 for( n1 = 0; n1 <= src_str->len; n1 += 1 )
272 for( n1_add = 0; n1_add <= add_str->len; n1_add += 1 )
302 TEST_ASSERT( mbedtls_gcm_setkey( &ctx, cipher_id, key_str->x, key_str->len * 8 ) == 0 );
324 TEST_ASSERT( mbedtls_gcm_setkey( &ctx, cipher_id, key_str->x, key_str->len * 8 ) == 0 );
343 TEST_ASSERT( mbedtls_gcm_setkey( &ctx, cipher_id, key_str->x, key_str->len * 8 ) == 0 );
363 TEST_ASSERT( mbedtls_gcm_setkey( &ctx, cipher_id, key_str->x, key_str->len * 8 ) == 0 );
386 TEST_ASSERT( mbedtls_gcm_setkey( &ctx, cipher_id, key_str->x, key_str->len * 8 ) == 0 );
406 TEST_ASSERT( mbedtls_gcm_setkey( &ctx, cipher_id, key_str->x, key_str->len * 8 ) == 0 );
442 size_t output_len = input->len - 1;
445 TEST_EQUAL( mbedtls_gcm_setkey( &ctx, cipher_id, key_str->x, key_str->len * 8 ), 0 );
446 TEST_EQUAL( 0, mbedtls_gcm_starts( &ctx, mode, iv->x, iv->len ) );
449 …TEST_EQUAL( MBEDTLS_ERR_GCM_BUFFER_TOO_SMALL, mbedtls_gcm_update( &ctx, input->x, input->len, outp…