/mbedtls-development/library/ |
A D | ssl_msg.c | 712 if( rec->data_len != olen ) in mbedtls_ssl_encrypt_buf() 791 &rec->data_len, in mbedtls_ssl_encrypt_buf() 846 rec->data_len += padlen + 1; in mbedtls_ssl_encrypt_buf() 892 if( rec->data_len != olen ) in mbedtls_ssl_encrypt_buf() 1257 if( rec->data_len != olen ) in mbedtls_ssl_decrypt_buf() 1366 if( olen != rec->data_len ) in mbedtls_ssl_decrypt_buf() 1509 if( rec->data_len != olen ) in mbedtls_ssl_decrypt_buf() 1568 size_t const num_checks = rec->data_len <= 256 ? rec->data_len : 256; in mbedtls_ssl_decrypt_buf() 1596 rec->data_len -= padlen; in mbedtls_ssl_decrypt_buf() 3470 if( rec->data_len == 0 ) in ssl_parse_record_header() [all …]
|
A D | cipher.c | 793 size_t data_len ) in add_pkcs_padding() argument 803 size_t *data_len ) in get_pkcs_padding() argument 808 if( NULL == input || NULL == data_len ) in get_pkcs_padding() 812 *data_len = input_len - padding_len; in get_pkcs_padding() 838 output[data_len] = 0x80; in add_one_and_zeros_padding() 840 output[data_len + i] = 0x00; in add_one_and_zeros_padding() 853 *data_len = 0; in get_one_and_zeros_padding() 878 output[data_len + i - 1] = 0x00; in add_zeros_and_len_padding() 892 *data_len = input_len - padding_len; in get_zeros_and_len_padding() 929 *data_len = 0; in get_zeros_padding() [all …]
|
A D | pkcs12.c | 183 static void pkcs12_fill_buffer( unsigned char *data, size_t data_len, in pkcs12_fill_buffer() argument 189 while( data_len > 0 ) in pkcs12_fill_buffer() 191 use_len = ( data_len > fill_len ) ? fill_len : data_len; in pkcs12_fill_buffer() 194 data_len -= use_len; in pkcs12_fill_buffer()
|
A D | ctr_drbg.c | 126 const unsigned char *data, size_t data_len ) in block_cipher_df() argument 140 if( data_len > MBEDTLS_CTR_DRBG_MAX_SEED_INPUT ) in block_cipher_df() 155 MBEDTLS_PUT_UINT32_BE( data_len, p, 0); in block_cipher_df() 158 memcpy( p, data, data_len ); in block_cipher_df() 159 p[data_len] = 0x80; in block_cipher_df() 161 buf_len = MBEDTLS_CTR_DRBG_BLOCKSIZE + 8 + data_len + 1; in block_cipher_df()
|
A D | chacha20.c | 308 size_t data_len, in mbedtls_chacha20_crypt() argument 317 CHACHA20_VALIDATE_RET( data_len == 0 || input != NULL ); in mbedtls_chacha20_crypt() 318 CHACHA20_VALIDATE_RET( data_len == 0 || output != NULL ); in mbedtls_chacha20_crypt() 330 ret = mbedtls_chacha20_update( &ctx, data_len, input, output ); in mbedtls_chacha20_crypt()
|
A D | psa_crypto_storage.c | 246 uint8_t data_len[4]; member 266 MBEDTLS_PUT_UINT32_LE( data_length, storage_format->data_len, 0 ); in psa_format_key_data_for_storage() 300 *key_data_length = MBEDTLS_GET_UINT32_LE( storage_format->data_len, 0 ); in psa_parse_key_data_from_storage()
|
A D | ecdh.c | 815 size_t data_len; in ecdh_tls13_read_public_internal() local 820 data_len = MBEDTLS_GET_UINT16_BE( p, 0 ); in ecdh_tls13_read_public_internal() 823 if( data_len < 1 || data_len != ( buf_len - 2 ) ) in ecdh_tls13_read_public_internal() 827 &ctx->Qp, p, data_len ) ) != 0) in ecdh_tls13_read_public_internal()
|
A D | hmac_drbg.c | 112 const unsigned char *data, size_t data_len ) in mbedtls_hmac_drbg_seed_buf() argument 133 if( ( ret = mbedtls_hmac_drbg_update( ctx, data, data_len ) ) != 0 ) in mbedtls_hmac_drbg_seed_buf()
|
A D | ssl_misc.h | 655 size_t data_len; member 982 size_t data_len; /* Length of record content */ member 1413 unsigned char *data, size_t data_len,
|
A D | ecp.c | 865 unsigned char data_len; in mbedtls_ecp_tls_read_point() local 878 data_len = *(*buf)++; in mbedtls_ecp_tls_read_point() 879 if( data_len < 1 || data_len > buf_len - 1 ) in mbedtls_ecp_tls_read_point() 886 *buf += data_len; in mbedtls_ecp_tls_read_point() 888 return( mbedtls_ecp_point_read_binary( grp, pt, buf_start, data_len ) ); in mbedtls_ecp_tls_read_point()
|
A D | ssl_tls.c | 6925 unsigned char *data, size_t data_len, in mbedtls_ssl_get_key_exchange_md_tls1_2() argument 6949 data, data_len ) ) != PSA_SUCCESS ) in mbedtls_ssl_get_key_exchange_md_tls1_2() 6987 unsigned char *data, size_t data_len, in mbedtls_ssl_get_key_exchange_md_tls1_2() argument 7021 if( ( ret = mbedtls_md_update( &ctx, data, data_len ) ) != 0 ) in mbedtls_ssl_get_key_exchange_md_tls1_2()
|
/mbedtls-development/include/mbedtls/ |
A D | hmac_drbg.h | 236 const unsigned char *data, size_t data_len );
|
A D | cipher.h | 338 void (*MBEDTLS_PRIVATE(add_padding))( unsigned char *output, size_t olen, size_t data_len ); 339 int (*MBEDTLS_PRIVATE(get_padding))( unsigned char *input, size_t ilen, size_t *data_len );
|
/mbedtls-development/tests/suites/ |
A D | test_suite_ssl.function | 3231 rec.data_len = 1 + num_records; 3276 TEST_ASSERT( rec.data_len == rec_backup.data_len ); 3439 TEST_ASSERT( rec.data_len == rec_backup.data_len ); 3547 rec.data_len = plaintext_len; 3555 add_data[11] = ( rec.data_len >> 8 ) & 0xff; 3574 rec.data_len += t0.maclen; 3578 rec.data_len += padlen + 1; 3593 rec.data_len += t0.ivlen; 3619 rec.data_len += t0.ivlen; 3656 rec.data_len += t0.ivlen; [all …]
|
A D | test_suite_psa_crypto_persistent_key.function | 30 uint8_t data_len[4];
|