/mbedtls-development/tests/suites/ |
A D | test_suite_nist_kw.function | 25 size_t output_len, i; 47 TEST_ASSERT( output_len == sizeof( ciphertext1 ) ); 59 TEST_ASSERT( output_len == sizeof( plaintext ) ); 72 output_len = sizeof( ciphertext1 ); 102 TEST_ASSERT( output_len == sizeof( plaintext ) ); 114 TEST_ASSERT( output_len == sizeof( plaintext ) ); 155 size_t output_len = out_len; 189 TEST_ASSERT( output_len == 0 ); 207 size_t output_len = out_len; 215 plaintext = mbedtls_calloc( 1, output_len ); [all …]
|
A D | test_suite_pkcs1_v21.function | 64 size_t output_len; 94 &output_len, message_str->x, 102 &output_len, message_str->x, 107 ASSERT_COMPARE( output, output_len, result_str->x, result_str->len );
|
A D | test_suite_pkcs1_v15.function | 69 size_t output_len; 98 &output_len, message_str->x, 106 &output_len, message_str->x, 111 output_len,
|
A D | test_suite_gcm.function | 442 size_t output_len = input->len - 1; 448 ASSERT_ALLOC( output, output_len ); 449 …CM_BUFFER_TOO_SMALL, mbedtls_gcm_update( &ctx, input->x, input->len, output, output_len, &olen ) );
|
A D | test_suite_ssl.function | 234 if( output == NULL && output_len == 0 ) 237 if( buf->content_length < output_len ) 238 output_len = buf->content_length; 253 buf->content_length -= output_len; 256 return output_len; 2140 size_t output_len; 2182 output_len = 0; 2187 output_len += get_ret[j]; 2193 if( output_len == 0 ) 2194 output_len = 1; [all …]
|
A D | test_suite_rsa.function | 350 size_t output_len; 375 output_len = 0; 379 &output_len, message_str->x, output, 385 output_len,
|
/mbedtls-development/programs/psa/ |
A D | crypto_examples.c | 67 size_t *output_len ) in cipher_operation() argument 72 *output_len = 0; in cipher_operation() 85 *output_len += len; in cipher_operation() 91 *output_len += len; in cipher_operation() 106 size_t *output_len ) in cipher_encrypt() argument 137 size_t *output_len ) in cipher_decrypt() argument 171 size_t output_len = 0; in cipher_example_encrypt_decrypt_aes_cbc_nopad_1_block() local 195 encrypt, output_len, part_size, in cipher_example_encrypt_decrypt_aes_cbc_nopad_1_block() 221 size_t output_len = 0; in cipher_example_encrypt_decrypt_aes_cbc_pkcs7_multi() local 243 encrypt, output_len, part_size, in cipher_example_encrypt_decrypt_aes_cbc_pkcs7_multi() [all …]
|
/mbedtls-development/library/ |
A D | ssl_tls13_client.c | 210 size_t output_len = 0; in ssl_tls13_write_supported_groups_ext() local 234 p += output_len; in ssl_tls13_write_supported_groups_ext() 241 p += output_len; in ssl_tls13_write_supported_groups_ext() 733 p += output_len; in ssl_tls13_write_client_hello_body() 762 p += output_len; in ssl_tls13_write_client_hello_body() 772 p += output_len; in ssl_tls13_write_client_hello_body() 785 ret = ssl_tls13_write_key_share_ext( ssl, p, end, &output_len ); in ssl_tls13_write_client_hello_body() 788 p += output_len; in ssl_tls13_write_client_hello_body() 797 p += output_len; in ssl_tls13_write_client_hello_body() 803 ret = mbedtls_ssl_write_hostname_ext( ssl, p, end, &output_len ); in ssl_tls13_write_client_hello_body() [all …]
|
A D | ctr_drbg.c | 502 unsigned char *output, size_t output_len, in mbedtls_ctr_drbg_random_with_add() argument 513 if( output_len > MBEDTLS_CTR_DRBG_MAX_REQUEST ) in mbedtls_ctr_drbg_random_with_add() 539 while( output_len > 0 ) in mbedtls_ctr_drbg_random_with_add() 557 use_len = ( output_len > MBEDTLS_CTR_DRBG_BLOCKSIZE ) in mbedtls_ctr_drbg_random_with_add() 558 ? MBEDTLS_CTR_DRBG_BLOCKSIZE : output_len; in mbedtls_ctr_drbg_random_with_add() 564 output_len -= use_len; in mbedtls_ctr_drbg_random_with_add() 579 size_t output_len ) in mbedtls_ctr_drbg_random() argument 589 ret = mbedtls_ctr_drbg_random_with_add( ctx, output, output_len, NULL, 0 ); in mbedtls_ctr_drbg_random()
|
A D | cipher.c | 795 size_t padding_len = output_len - data_len; in add_pkcs_padding() 835 size_t padding_len = output_len - data_len; in add_one_and_zeros_padding() 874 size_t padding_len = output_len - data_len; in add_zeros_and_len_padding() 879 output[output_len - 1] = (unsigned char) padding_len; in add_zeros_and_len_padding() 912 size_t output_len, size_t data_len ) in add_zeros_padding() argument 916 for( i = data_len; i < output_len; i++ ) in add_zeros_padding() 1539 unsigned char *output, size_t output_len, in mbedtls_cipher_auth_encrypt_ext() argument 1575 if( output_len < ilen + tag_len ) in mbedtls_cipher_auth_encrypt_ext() 1595 unsigned char *output, size_t output_len, in mbedtls_cipher_auth_decrypt_ext() argument 1602 CIPHER_VALIDATE_RET( output_len == 0 || output != NULL ); in mbedtls_cipher_auth_decrypt_ext() [all …]
|
A D | ccm.c | 343 size_t *output_len ) in mbedtls_ccm_update() argument 366 *output_len = input_len; in mbedtls_ccm_update()
|
/mbedtls-development/programs/fuzz/ |
A D | common.c | 56 int dummy_random( void *p_rng, unsigned char *output, size_t output_len ) in dummy_random() argument 63 ret = mbedtls_ctr_drbg_random(p_rng, output, output_len); in dummy_random() 68 for (i=0; i<output_len; i++) { in dummy_random()
|
A D | common.h | 16 int dummy_random( void *p_rng, unsigned char *output, size_t output_len );
|
/mbedtls-development/programs/ssl/ |
A D | ssl_test_lib.c | 174 int rng_get( void *p_rng, unsigned char *output, size_t output_len ) in rng_get() argument 179 output, output_len ) ); in rng_get() 184 return( mbedtls_ctr_drbg_random( &rng->drbg, output, output_len ) ); in rng_get() 186 return( mbedtls_hmac_drbg_random( &rng->drbg, output, output_len ) ); in rng_get()
|
A D | ssl_test_lib.h | 221 int rng_get( void *p_rng, unsigned char *output, size_t output_len );
|
A D | ssl_server2.c | 1141 size_t *output_len, in ssl_async_resume() argument 1164 output, output_len, output_size, in ssl_async_resume() 1171 output, output_size, output_len, in ssl_async_resume()
|
/mbedtls-development/include/mbedtls/ |
A D | ctr_drbg.h | 502 unsigned char *output, size_t output_len, 530 unsigned char *output, size_t output_len );
|
A D | hmac_drbg.h | 360 unsigned char *output, size_t output_len,
|
A D | ccm.h | 482 size_t *output_len );
|
A D | cipher.h | 1020 unsigned char *output, size_t output_len, 1076 unsigned char *output, size_t output_len,
|
A D | ssl.h | 1013 size_t *output_len,
|
/mbedtls-development/programs/test/ |
A D | selftest.c | 194 size_t output_len = 0; in create_entropy_seed_file() local 207 &output_len ); in create_entropy_seed_file() 211 if( MBEDTLS_ENTROPY_BLOCK_SIZE != output_len ) in create_entropy_seed_file()
|
/mbedtls-development/docs/ |
A D | getting_started.md | 215 size_t output_len; 254 output, sizeof(output), &output_len); 259 status = psa_cipher_finish(&operation, output + output_len, 260 sizeof(output) - output_len, &output_len); 300 size_t output_len; 338 output, sizeof(output), &output_len); 343 status = psa_cipher_finish(&operation, output + output_len, 344 sizeof(output) - output_len, &output_len);
|
/mbedtls-development/docs/architecture/ |
A D | tls13-experimental.md | 340 ret = ssl_tls13_write_client_hello_cipher_suites( ssl, buf, end, &output_len ); 343 buf += output_len;
|