Home
last modified time | relevance | path

Searched refs:length (Results 1 – 25 of 89) sorted by relevance

1234

/mbedtls-development/tests/suites/
A Dtest_suite_asn1parse.data61 length=0 (1 length byte)
64 length=0 (2 length bytes)
70 length=1 (1 length byte)
73 length=1 (2 length bytes)
76 length=1 (3 length bytes)
79 length=1 (4 length bytes)
85 length=2 (1 length byte)
88 length=2 (2 length bytes)
91 length=2 (3 length bytes)
94 length=2 (4 length bytes)
[all …]
A Dtest_suite_asn1write.data130 ASN.1 Write OCTET STRING: length=0
133 ASN.1 Write OCTET STRING: length=1
136 ASN.1 Write OCTET STRING: length=2
151 ASN.1 Write UTF8 STRING: length=0
154 ASN.1 Write UTF8 STRING: length=1
157 ASN.1 Write UTF8 STRING: length=128
169 ASN.1 Write IA5 STRING: length=0
172 ASN.1 Write IA5 STRING: length=1
175 ASN.1 Write IA5 STRING: length=128
187 ASN.1 Write OID: length=0
[all …]
A Dtest_suite_psa_crypto_metadata.function233 /* Tag length */
250 size_t length = length_arg;
284 /* Hash length */
296 size_t length = length_arg;
325 * length of the outer truncation (even if the outer length is smaller
346 * length of the outer truncation (even if the outer length is smaller
358 * inner length). */
442 * the length of the outer truncation (even if the outer length is
453 * gives the length of the outer truncation (even if the outer length is
475 * gives the length of the outer truncation (even if the outer length is
[all …]
A Dtest_suite_ecjpake.data25 ECJPAKE round one: KKP1: length of first point too small
28 ECJPAKE round one: KKP1: length of first point too big
43 ECJPAKE round one: KKP1: length of second point too small
46 ECJPAKE round one: KKP1: length of second point too big
58 ECJPAKE round one: KKP1: zero-length r
73 ECJPAKE round one: KKP2: length of first point too small
76 ECJPAKE round one: KKP2: length of first point too big
94 ECJPAKE round one: KKP2: length of second point too big
106 ECJPAKE round one: KKP2: zero-length r
172 ECJPAKE round two client: zero-length r
[all …]
A Dtest_suite_entropy.data25 Entropy output length: 0
28 Entropy output length: 1
31 Entropy output length: 2
34 Entropy output length: 31
37 Entropy output length: 65 > BLOCK_SIZE
A Dtest_suite_cipher.function428 TEST_ASSERT( total_len == length ||
430 total_len < length &&
440 TEST_ASSERT( total_len == length ||
442 total_len > length &&
449 TEST_ASSERT( total_len == length ||
451 total_len < length &&
462 TEST_ASSERT( total_len == length );
479 size_t length = length_val;
678 TEST_ASSERT( totaloutlen == length ||
685 TEST_ASSERT( totaloutlen == length ||
[all …]
A Dtest_suite_aes.rest.data7 AES-256-CBC Encrypt (Invalid input length)
10 AES-256-CBC Decrypt (Invalid input length)
A Dtest_suite_x509parse.data980 X509 CRT ASN1 (inv Certificate, no length)
995 X509 CRT ASN1 (inv TBS, length missing)
998 X509 CRT ASN1 (inv TBS, invalid length encoding)
1001 X509 CRT ASN1 (inv TBS, length data incomplete)
1004 X509 CRT ASN1 (inv TBS, length out of bounds)
1064 X509 CRT ASN1 (TBS, inv serial, length missing)
1513 X509 CRT ASN1 (TBS, inv IssuerID, length missing)
1581 X509 CRT ASN1 (TBS, inv v3Ext, outer length 0)
1861 X509 CRT ASN1 (inv Signature, length missing)
1899 X509 CRT ASN1 (inv Signature, length mismatch)
[all …]
/mbedtls-development/programs/psa/
A Dpsa_constant_names.c59 *required_size += length; in append()
62 *buffer += length; in append()
143 size_t length = strlen(name); in psa_snprint_status() local
144 if (length < buffer_size) { in psa_snprint_status()
146 return (int) length; in psa_snprint_status()
160 size_t length = strlen(name); in psa_snprint_ecc_curve() local
161 if (length < buffer_size) { in psa_snprint_ecc_curve()
163 return (int) length; in psa_snprint_ecc_curve()
177 size_t length = strlen(name); in psa_snprint_dh_group() local
178 if (length < buffer_size) { in psa_snprint_dh_group()
[all …]
/mbedtls-development/library/
A Dcipher_wrap.h53 int (*cbc_func)( void *ctx, mbedtls_operation_t mode, size_t length,
60 int (*cfb_func)( void *ctx, mbedtls_operation_t mode, size_t length, size_t *iv_off,
67 int (*ofb_func)( void *ctx, size_t length, size_t *iv_off,
75 int (*ctr_func)( void *ctx, size_t length, size_t *nc_off,
82 int (*xts_func)( void *ctx, mbedtls_operation_t mode, size_t length,
89 int (*stream_func)( void *ctx, size_t length,
A Dchachapoly.c280 size_t length, in chachapoly_crypt_and_tag() argument
298 ret = mbedtls_chachapoly_update( ctx, length, input, output ); in chachapoly_crypt_and_tag()
309 size_t length, in mbedtls_chachapoly_encrypt_and_tag() argument
321 CHACHAPOLY_VALIDATE_RET( length == 0 || input != NULL ); in mbedtls_chachapoly_encrypt_and_tag()
322 CHACHAPOLY_VALIDATE_RET( length == 0 || output != NULL ); in mbedtls_chachapoly_encrypt_and_tag()
325 length, nonce, aad, aad_len, in mbedtls_chachapoly_encrypt_and_tag()
330 size_t length, in mbedtls_chachapoly_auth_decrypt() argument
346 CHACHAPOLY_VALIDATE_RET( length == 0 || input != NULL ); in mbedtls_chachapoly_auth_decrypt()
347 CHACHAPOLY_VALIDATE_RET( length == 0 || output != NULL ); in mbedtls_chachapoly_auth_decrypt()
350 MBEDTLS_CHACHAPOLY_DECRYPT, length, nonce, in mbedtls_chachapoly_auth_decrypt()
[all …]
A Dcipher_wrap.c136 size_t length, size_t *iv_off, unsigned char *iv, in aes_crypt_cfb128_wrap() argument
165 size_t length, in aes_crypt_xts_wrap() argument
185 return mbedtls_aes_crypt_xts( xts_ctx, mode, length, in aes_crypt_xts_wrap()
690 size_t length, unsigned char *iv, in camellia_crypt_cbc_wrap() argument
700 size_t length, size_t *iv_off, unsigned char *iv, in camellia_crypt_cfb128_wrap() argument
1099 size_t length, unsigned char *iv, in aria_crypt_cbc_wrap() argument
1109 size_t length, size_t *iv_off, unsigned char *iv, in aria_crypt_cfb128_wrap() argument
1782 static int chacha20_stream_wrap( void *ctx, size_t length, in chacha20_stream_wrap() argument
1788 ret = mbedtls_chacha20_update( ctx, length, input, output ); in chacha20_stream_wrap()
1925 static int null_crypt_stream( void *ctx, size_t length, in null_crypt_stream() argument
[all …]
A Dcamellia.c546 size_t length, in mbedtls_camellia_crypt_cbc() argument
560 if( length % 16 ) in mbedtls_camellia_crypt_cbc()
565 while( length > 0 ) in mbedtls_camellia_crypt_cbc()
577 length -= 16; in mbedtls_camellia_crypt_cbc()
582 while( length > 0 ) in mbedtls_camellia_crypt_cbc()
592 length -= 16; in mbedtls_camellia_crypt_cbc()
606 size_t length, in mbedtls_camellia_crypt_cfb128() argument
628 while( length-- ) in mbedtls_camellia_crypt_cfb128()
642 while( length-- ) in mbedtls_camellia_crypt_cfb128()
664 size_t length, in mbedtls_camellia_crypt_ctr() argument
[all …]
A Dccm.c488 static int ccm_auth_crypt( mbedtls_ccm_context *ctx, int mode, size_t length, in ccm_auth_crypt() argument
506 if( ( ret = mbedtls_ccm_update( ctx, input, length, in ccm_auth_crypt()
507 output, length, &olen ) ) != 0 ) in ccm_auth_crypt()
529 int mbedtls_ccm_encrypt_and_tag( mbedtls_ccm_context *ctx, size_t length, in mbedtls_ccm_encrypt_and_tag() argument
535 return( ccm_auth_crypt( ctx, MBEDTLS_CCM_ENCRYPT, length, iv, iv_len, in mbedtls_ccm_encrypt_and_tag()
568 if( ( ret = ccm_auth_crypt( ctx, mode, length, in ccm_auth_decrypt()
577 mbedtls_platform_zeroize( output, length ); in ccm_auth_decrypt()
584 int mbedtls_ccm_star_auth_decrypt( mbedtls_ccm_context *ctx, size_t length, in mbedtls_ccm_star_auth_decrypt() argument
590 return ccm_auth_decrypt( ctx, MBEDTLS_CCM_STAR_DECRYPT, length, in mbedtls_ccm_star_auth_decrypt()
595 int mbedtls_ccm_auth_decrypt( mbedtls_ccm_context *ctx, size_t length, in mbedtls_ccm_auth_decrypt() argument
[all …]
A Daria.c593 size_t length, in mbedtls_aria_crypt_cbc() argument
608 if( length % MBEDTLS_ARIA_BLOCKSIZE ) in mbedtls_aria_crypt_cbc()
613 while( length > 0 ) in mbedtls_aria_crypt_cbc()
625 length -= MBEDTLS_ARIA_BLOCKSIZE; in mbedtls_aria_crypt_cbc()
630 while( length > 0 ) in mbedtls_aria_crypt_cbc()
640 length -= MBEDTLS_ARIA_BLOCKSIZE; in mbedtls_aria_crypt_cbc()
654 size_t length, in mbedtls_aria_crypt_cfb128() argument
681 while( length-- ) in mbedtls_aria_crypt_cfb128()
695 while( length-- ) in mbedtls_aria_crypt_cfb128()
717 size_t length, in mbedtls_aria_crypt_ctr() argument
[all …]
A Ddes.c640 size_t length, in mbedtls_des_crypt_cbc() argument
649 if( length % 8 ) in mbedtls_des_crypt_cbc()
654 while( length > 0 ) in mbedtls_des_crypt_cbc()
666 length -= 8; in mbedtls_des_crypt_cbc()
671 while( length > 0 ) in mbedtls_des_crypt_cbc()
685 length -= 8; in mbedtls_des_crypt_cbc()
755 if( length % 8 ) in mbedtls_des3_crypt_cbc()
760 while( length > 0 ) in mbedtls_des3_crypt_cbc()
772 length -= 8; in mbedtls_des3_crypt_cbc()
777 while( length > 0 ) in mbedtls_des3_crypt_cbc()
[all …]
/mbedtls-development/include/mbedtls/
A Daes.h308 size_t length,
353 size_t length,
402 size_t length,
447 size_t length,
501 size_t length,
588 size_t length,
A Dccm.h179 int mbedtls_ccm_encrypt_and_tag( mbedtls_ccm_context *ctx, size_t length,
228 int mbedtls_ccm_star_encrypt_and_tag( mbedtls_ccm_context *ctx, size_t length,
265 int mbedtls_ccm_auth_decrypt( mbedtls_ccm_context *ctx, size_t length,
311 int mbedtls_ccm_star_auth_decrypt( mbedtls_ccm_context *ctx, size_t length,
A Dcamellia.h164 size_t length,
210 size_t length,
293 size_t length,
A Daria.h201 size_t length,
251 size_t length,
337 size_t length,
/mbedtls-development/tests/include/test/
A Dmacros.h112 #define ASSERT_ALLOC( pointer, length ) \ argument
116 if( ( length ) != 0 ) \
119 ( length ) ); \
130 #define ASSERT_ALLOC_WEAK( pointer, length ) \ argument
134 if( ( length ) != 0 ) \
137 ( length ) ); \
/mbedtls-development/ChangeLog.d/
A Dpsa_alg_rsa_pss.txt2 * Fix PSA_ALG_RSA_PSS verification accepting an arbitrary salt length.
3 This algorithm now accepts only the same salt length for verification
5 PSA_ALG_RSA_PSS_ANY_SALT to accept any salt length. Fixes #4946.
A Dpsa_gcm_buffer_limitation.txt6 * Move GCM's update output buffer length verification from PSA AEAD to
15 the length of the provided output buffers and to return the
16 MBEDTLS_ERR_GCM_BUFFER_TOO_SMALL in case the buffer length is too small.
/mbedtls-development/scripts/mbedtls_dev/
A Dcrypto_knowledge.py134 length = bits // 8
138 return des3[:length]
139 return b''.join([self.DATA_BLOCK] * (length // len(self.DATA_BLOCK)) +
140 [self.DATA_BLOCK[:length % len(self.DATA_BLOCK)]])
/mbedtls-development/tests/src/
A Drandom.c85 if( len > info->length ) in mbedtls_test_rnd_buffer_rand()
86 use_len = info->length; in mbedtls_test_rnd_buffer_rand()
92 info->length -= use_len; in mbedtls_test_rnd_buffer_rand()

Completed in 38 milliseconds

1234