Lines Matching refs:buffer

36 /** Test if a buffer contains a constant byte value.
38 * `mem_is_char(buffer, c, size)` is true after `memset(buffer, c, size)`.
40 * \param buffer Pointer to the beginning of the buffer.
42 * \param size Size of the buffer in bytes.
44 * \return 1 if the buffer is all-bits-zero.
47 static int mem_is_char( void *buffer, unsigned char c, size_t size )
52 if( ( (unsigned char *) buffer )[i] != c )
84 static int construct_fake_rsa_key( unsigned char *buffer,
110 *p = buffer + buffer_size;
114 asn1_write_10x( p, buffer, half_bits, 1 ) );
116 asn1_write_10x( p, buffer, half_bits, 1 ) );
118 asn1_write_10x( p, buffer, half_bits, 1 ) );
120 asn1_write_10x( p, buffer, half_bits, 1 ) );
122 asn1_write_10x( p, buffer, half_bits, 3 ) );
124 asn1_write_10x( p, buffer, bits, 1 ) );
127 asn1_write_10x( p, buffer, 17, 1 ) );
129 asn1_write_10x( p, buffer, bits, 1 ) );
132 mbedtls_asn1_write_int( p, buffer, 0 ) );
133 MBEDTLS_ASN1_CHK_ADD( len, mbedtls_asn1_write_len( p, buffer, len ) );
137 MBEDTLS_ASN1_CHK_ADD( len, mbedtls_asn1_write_tag( p, buffer, tag ) );
213 uint8_t buffer[1];
233 TEST_EQUAL( psa_export_key( key, buffer, sizeof( buffer ), &length ),
236 buffer, sizeof( buffer ), &length ),
377 /* Tag gets written at end of buffer. */
715 uint8_t *buffer = NULL;
721 ASSERT_ALLOC_WEAK( buffer, buffer_size );
722 memset( buffer, 'K', byte_size );
729 status = psa_import_key( &attributes, buffer, byte_size, &key );
740 memset( buffer, 0, byte_size + 1 );
741 PSA_ASSERT( psa_export_key( key, buffer, byte_size, &n ) );
743 TEST_EQUAL( buffer[n], 'K' );
745 TEST_EQUAL( buffer[n], 0 );
757 mbedtls_free( buffer );
772 unsigned char *buffer = NULL;
779 ASSERT_ALLOC( buffer, buffer_size );
781 TEST_ASSERT( ( ret = construct_fake_rsa_key( buffer, buffer_size, &p,
794 mbedtls_free( buffer );
1308 unsigned char *buffer = NULL;
1328 ASSERT_ALLOC( buffer, buffer_length );
1333 buffer, buffer_length,
1342 memset( buffer, 0, buffer_length );
1344 buffer, buffer_length,
1346 buffer, buffer_length,
1363 mbedtls_free( buffer );
1890 /* Compute with tight buffer */
1898 /* Compute with larger buffer */
2090 /* psa_hash_finish with a smaller hash buffer than expected */
2664 uint8_t buffer[PSA_BLOCK_CIPHER_BLOCK_LENGTH(PSA_KEY_TYPE_AES)] = { 0 };
2694 buffer, sizeof( buffer ),
2702 buffer, sizeof( buffer ),
2706 buffer, sizeof( buffer ),
2718 buffer, sizeof( buffer ),
2744 buffer, sizeof( buffer ),
2754 buffer, sizeof( buffer ),
2764 buffer, sizeof( buffer ),
2776 buffer, sizeof( buffer ), &length ) );
2779 buffer, sizeof( buffer ),
2786 buffer, sizeof( buffer ), &length ),
2792 /* Not calling update means we are encrypting an empty buffer, which is OK
2796 buffer, sizeof( buffer ), &length ),
2807 buffer, sizeof( buffer ), &length ) );
2809 buffer, sizeof( buffer ), &length ),
3300 /* Allocate input buffer and copy the iv and the plaintext */
3348 /* Allocate input buffer and copy the iv and the plaintext */
4165 /* -1 == zero length and valid buffer, 0 = zero length and NULL buffer. */
4168 /* Arbitrary size buffer, to test zero length valid buffer. */
5065 /* Allocate a buffer which has the size advertized by the
5129 * checking the error code then they don't overflow a buffer. */
5164 /* Allocate a buffer which has the size advertized by the
5364 * checking the error code then they don't overflow a buffer. */
5945 uint8_t buffer[1];
5948 buffer, sizeof( buffer ) );
5972 uint8_t buffer[42];
5973 size_t capacity = sizeof( buffer );
6000 PSA_ASSERT( psa_key_derivation_output_bytes( &operation, buffer, capacity ) );
6002 TEST_EQUAL( psa_key_derivation_output_bytes( &operation, buffer, capacity ),
6678 * the output buffer. */