| /lib/mbedtls/external/mbedtls/tests/suites/ |
| A D | test_suite_common.data | 1 Block xor, length 0 4 Block xor, length 1 7 Block xor, length 3 10 Block xor, length 4 13 Block xor, length 7 16 Block xor, length 8 19 Block xor, length 16 22 Block xor, length 64 25 Block xor, length 256 28 Block xor, length 257 [all …]
|
| A D | test_suite_asn1parse.data | 61 length=0 (1 length byte) 64 length=0 (2 length bytes) 70 length=1 (1 length byte) 73 length=1 (2 length bytes) 76 length=1 (3 length bytes) 79 length=1 (4 length bytes) 85 length=2 (1 length byte) 88 length=2 (2 length bytes) 91 length=2 (3 length bytes) 94 length=2 (4 length bytes) [all …]
|
| A D | test_suite_pkcs7.data | 181 PKCS7 Parse Failure Invalid ASN1: Change length from 9 to 10 #26.0 185 PKCS7 Parse Failure Invalid ASN1: Change length from 9 to 8 #27.0 225 PKCS7 Parse Failure Invalid ASN1: Change length from 1 to 2 #37.0 229 PKCS7 Parse Failure Invalid ASN1: Change length from 1 to 0 #38.0 273 PKCS7 Parse Failure Invalid ASN1: Change length from 9 to 8 #49.0 281 PKCS7 Parse Failure Invalid ASN1: Change length from 0 to 1 #51.0 309 PKCS7 Parse Failure Invalid ASN1: Change length from 9 to 8 #58.0 365 PKCS7 Parse Failure Invalid ASN1: Change length from 3 to 4 #72.0 373 PKCS7 Parse Failure Invalid ASN1: Change length from 3 to 2 #74.0 381 PKCS7 Parse Failure Invalid ASN1: Change length from 1 to 2 #76.0 [all …]
|
| A D | test_suite_psa_crypto_low_hash.function | 32 size_t length = SIZE_MAX; 39 ASSERT_COMPARE(expected->x, expected->len, output, length); 49 ASSERT_COMPARE(expected->x, expected->len, output, length); 70 size_t length = SIZE_MAX; 99 ASSERT_COMPARE(expected2->x, expected2->len, output, length); 108 ASSERT_COMPARE(expected1->x, expected1->len, output, length); 117 ASSERT_COMPARE(expected2->x, expected2->len, output, length); 172 size_t length = SIZE_MAX; 182 ASSERT_COMPARE(expected->x, expected->len, output, length); 191 ASSERT_COMPARE(expected->x, expected->len, output, length); [all …]
|
| A D | test_suite_psa_crypto_metadata.function | 237 /* Tag length */ 254 size_t length = length_arg; 288 /* Hash length */ 300 size_t length = length_arg; 328 * length of the outer truncation (even if the outer length is smaller 348 * length of the outer truncation (even if the outer length is smaller 360 * inner length). */ 442 * the length of the outer truncation (even if the outer length is 453 * gives the length of the outer truncation (even if the outer length is 475 * gives the length of the outer truncation (even if the outer length is [all …]
|
| A D | test_suite_asn1write.data | 139 ASN.1 Write OCTET STRING: length=0 142 ASN.1 Write OCTET STRING: length=1 145 ASN.1 Write OCTET STRING: length=2 160 ASN.1 Write UTF8 STRING: length=0 163 ASN.1 Write UTF8 STRING: length=1 166 ASN.1 Write UTF8 STRING: length=128 178 ASN.1 Write IA5 STRING: length=0 181 ASN.1 Write IA5 STRING: length=1 184 ASN.1 Write IA5 STRING: length=128 196 ASN.1 Write OID: length=0 [all …]
|
| A D | test_suite_psa_crypto_memory.function | 120 local_input.length = input_len; 126 TEST_EQUAL(local_input.length, 0); 131 local_input.length = 0; 154 TEST_EQUAL(local_input.length, 0); 174 TEST_EQUAL(local_output.length, output_len); 181 local_output.length = 0; 201 local_output.length = output_len; 204 if (local_output.length != 0) { 215 TEST_EQUAL(local_output.length, 0); 224 local_output.length = 0; [all …]
|
| A D | test_suite_ecjpake.data | 25 ECJPAKE round one: KKP1: length of first point too small 28 ECJPAKE round one: KKP1: length of first point too big 43 ECJPAKE round one: KKP1: length of second point too small 46 ECJPAKE round one: KKP1: length of second point too big 58 ECJPAKE round one: KKP1: zero-length r 73 ECJPAKE round one: KKP2: length of first point too small 76 ECJPAKE round one: KKP2: length of first point too big 94 ECJPAKE round one: KKP2: length of second point too big 106 ECJPAKE round one: KKP2: zero-length r 172 ECJPAKE round two client: zero-length r [all …]
|
| A D | test_suite_psa_crypto_op_fail.function | 52 size_t length = SIZE_MAX; 60 output, sizeof(output), &length)); 83 size_t length = SIZE_MAX; 103 output, sizeof(output), &length)); 129 size_t length = SIZE_MAX; 175 size_t length = SIZE_MAX; 223 size_t length = SIZE_MAX; 298 size_t length = SIZE_MAX; 317 &length)); 324 &length)); [all …]
|
| A D | test_suite_psa_crypto_util.data | 65 ECDSA DER -> Raw, 256bit, Invalid sequence length 73 ECDSA DER -> Raw, 256bit, Wrong r integer length (1 byte smaller than the actual size) 77 ECDSA DER -> Raw, 256bit, Wrong r integer length (1 byte larger than the actual size) 85 ECDSA DER -> Raw, 256bit, Wrong s integer length (1 byte larger than the actual size) 113 ECDSA DER -> Raw, 256bit, Invalid 0-length r 117 ECDSA DER -> Raw, 256bit, Invalid 0-length s 133 # 512/521 bit sizes are useful to test sequence's length encoded with 2 bytes. 138 # 512/521 bit sizes are useful to test sequence's length encoded with 2 bytes. 143 # 512/521 bit sizes are useful to test sequence's length encoded with 2 bytes. 148 # 512/521 bit sizes are useful to test sequence's length encoded with 2 bytes. [all …]
|
| /lib/ |
| A D | lz4.c | 195 size_t length; in LZ4_decompress_generic() local 221 if ((endOnInput ? length != RUN_MASK : length <= 8) in LZ4_decompress_generic() 230 op += length; ip += length; in LZ4_decompress_generic() 274 length += s; in LZ4_decompress_generic() 344 ip += length; in LZ4_decompress_generic() 345 op += length; in LZ4_decompress_generic() 353 ip += length; in LZ4_decompress_generic() 392 length += s; in LZ4_decompress_generic() 411 length = min(length, (size_t)(oend - op)); in LZ4_decompress_generic() 420 length); in LZ4_decompress_generic() [all …]
|
| A D | tpm-common.c | 25 size_t offset = 0, length = 0; in pack_byte_string() local 35 length = 1; in pack_byte_string() 40 length = 2; in pack_byte_string() 45 length = 4; in pack_byte_string() 50 length = va_arg(args, u32); in pack_byte_string() 58 if (offset + length > size) { in pack_byte_string() 97 length = 1; in unpack_byte_string() 102 length = 2; in unpack_byte_string() 107 length = 4; in unpack_byte_string() 112 length = va_arg(args, u32); in unpack_byte_string() [all …]
|
| /lib/efi_loader/ |
| A D | efi_var_mem.c | 153 efi_var_buf->length - in efi_var_mem_del() 178 var->length = size1 + size2; in efi_var_mem_ins() 191 efi_var_buf->length - in efi_var_mem_ins() 280 hdr.length += len; in efi_var_collect_mem() 282 if (buf && hdr.length <= *lenp) { in efi_var_collect_mem() 290 *lenp = hdr.length; in efi_var_collect_mem() 294 if (!buf || hdr.length > *lenp) { in efi_var_collect_mem() 295 *lenp = hdr.length; in efi_var_collect_mem() 302 *lenp = hdr.length; in efi_var_collect_mem() 339 *data_size = var->length; in efi_get_variable_mem() [all …]
|
| A D | efi_device_path.c | 30 .length = sizeof(EFI_DP_END), 69 ret = memcmp(&a->length, &b->length, sizeof(a->length)); in efi_dp_match() 195 sz += dp->length; in efi_dp_instance_size() 210 p = (void *)p + p->length; in efi_dp_size() 292 size_t sz = node->length; in efi_dp_append_node() 316 const u16 length) in efi_dp_create_device_node() argument 323 ret = efi_alloc(length); in efi_dp_create_device_node() 328 ret->length = length; in efi_dp_create_device_node() 1065 p->length = sizeof(*p); in efi_dp_split_file_path() 1151 len = dp->length; in efi_dp_check_length() [all …]
|
| /lib/lwip/lwip/src/apps/snmp/ |
| A D | snmp_pbuf_stream.c | 47 …_pbuf_stream_init(struct snmp_pbuf_stream *pbuf_stream, struct pbuf *p, u16_t offset, u16_t length) in snmp_pbuf_stream_init() argument 50 pbuf_stream->length = length; in snmp_pbuf_stream_init() 59 if (pbuf_stream->length == 0) { in snmp_pbuf_stream_read() 68 pbuf_stream->length--; in snmp_pbuf_stream_read() 82 if (pbuf_stream->length < buf_len) { in snmp_pbuf_stream_writebuf() 91 pbuf_stream->length -= buf_len; in snmp_pbuf_stream_writebuf() 103 if ((len > pbuf_stream->length) || (len > target_pbuf_stream->length)) { in snmp_pbuf_stream_writeto() 108 len = LWIP_MIN(pbuf_stream->length, target_pbuf_stream->length); in snmp_pbuf_stream_writeto() 128 pbuf_stream->length -= chunk_len; in snmp_pbuf_stream_writeto() 138 if (((pbuf_stream->offset + offset) < 0) || (offset > pbuf_stream->length)) { in snmp_pbuf_stream_seek() [all …]
|
| /lib/lwip/lwip/src/apps/mdns/ |
| A D | mdns_domain.c | 93 domain->length++; in mdns_domain_add_label_base() 113 domain->length += len; in mdns_domain_add_label() 131 domain->length--; in mdns_domain_add_label_pbuf() 134 domain->length += len; in mdns_domain_add_label_pbuf() 148 u16_t len = source->length; in mdns_domain_add_domain() 159 domain->length += len; in mdns_domain_add_domain() 163 domain->length++; in mdns_domain_add_domain() 310 if (a->length != b->length) { in mdns_domain_eq() 544 return domain->length; in mdns_compress_domain() 548 return domain->length; in mdns_compress_domain() [all …]
|
| /lib/lwip/lwip/test/unit/mdns/ |
| A D | test_mdns.c | 602 u16_t length; in START_TEST() local 637 u16_t length; in START_TEST() local 674 u16_t length; in START_TEST() local 709 u16_t length; in START_TEST() local 728 fail_unless(length == domain.length); in START_TEST() 743 u16_t length; in START_TEST() local 778 u16_t length; in START_TEST() local 815 u16_t length; in START_TEST() local 834 fail_unless(length == domain.length); in START_TEST() 855 u16_t length; in START_TEST() local [all …]
|
| /lib/mbedtls/external/mbedtls/programs/psa/ |
| A D | psa_constant_names.c | 47 *required_size += length; in append() 49 memcpy(*buffer, string, length); in append() 50 *buffer += length; in append() 133 size_t length = strlen(name); in psa_snprint_status() local 134 if (length < buffer_size) { in psa_snprint_status() 136 return (int) length; in psa_snprint_status() 150 size_t length = strlen(name); in psa_snprint_ecc_curve() local 151 if (length < buffer_size) { in psa_snprint_ecc_curve() 153 return (int) length; in psa_snprint_ecc_curve() 168 if (length < buffer_size) { in psa_snprint_dh_group() [all …]
|
| /lib/acpi/ |
| A D | acpi_table.c | 64 header->length = sizeof(struct acpi_dmar); in acpi_create_dmar() 247 header->length = sizeof(struct acpi_fadt); in acpi_write_fadt() 415 acpi_inc_align(ctx, dbg2->header.length); in acpi_write_dbg2_pci_uart() 552 acpi_inc(ctx, spcr->header.length); in acpi_write_spcr() 582 node->length += sizeof(u32) * its_count; in acpi_iort_add_its_group() 588 ctx->current += node->length; in acpi_iort_add_its_group() 612 node->length += strlen(device_name) + 1; in acpi_iort_add_named_component() 622 ctx->current += node->length; in acpi_iort_add_named_component() 678 ctx->current += node->length; in acpi_iort_add_rc() 747 ctx->current += node->length; in acpi_iort_add_smmu_v3() [all …]
|
| /lib/mbedtls/external/mbedtls/tests/scripts/ |
| A D | generate_pkcs7_tests.py | 113 length = int(''.join(data[leng_i + 1: data_i]), 16) 115 length = int(data[leng_i], 16) 119 ", length = " + str(length)+ ":") 120 print(''.join(data[data_i:data_i+length])) 138 reasons.append("Change length from " + str(length) + " to " \ 139 + str(length + 1)) 144 data[data_i:data_i + length] + ["00"] + \ 145 data[data_i + length:]) 154 reasons.append("Change length from " + str(length) + " to " + str(length - 1)) 160 i = data_i + length
|
| /lib/efi_selftest/ |
| A D | efi_selftest_load_file.c | 51 size_t length; member 192 if (addr + len > img.length) in decompress() 193 len = img.length - addr; in decompress() 227 if (*buffer_size < img.length) { in load_file() 228 *buffer_size = img.length; in load_file() 231 memcpy(buffer, image, img.length); in load_file() 232 *buffer_size = img.length; in load_file() 267 if (*buffer_size < img.length) { in load_file2() 268 *buffer_size = img.length; in load_file2() 271 memcpy(buffer, image, img.length); in load_file2() [all …]
|
| A D | efi_selftest_loadimage.c | 44 size_t length; member 87 .length = sizeof(struct efi_device_path_vendor), 95 .length = sizeof(struct efi_device_path), 124 .length = sizeof(struct efi_device_path), 281 if (priv.file_pos >= img.length) in efi_st_read() 284 *buffer_size = img.length - priv.file_pos; in efi_st_read() 390 boottime->set_mem(buf, img.length, 0); in decompress() 397 if (addr + len > img.length) in decompress() 398 len = img.length - addr; in decompress() 402 priv.file_size = img.length; in decompress() [all …]
|
| A D | efi_selftest_exception.c | 53 size_t length; member 76 ret = boottime->allocate_pool(EFI_LOADER_DATA, img.length, in decompress() 82 boottime->set_mem(buf, img.length, 0); in decompress() 89 if (addr + len > img.length) in decompress() 90 len = img.length - addr; in decompress() 129 img.length, &handle); in execute()
|
| /lib/mbedtls/ |
| A D | sha512.c | 33 sha384_update(sha512_context *ctx, const uint8_t *input, uint32_t length) in sha384_update() argument 35 mbedtls_sha512_update(ctx, input, length); in sha384_update() 44 void sha384_csum_wd(const unsigned char *input, unsigned int length, in sha384_csum_wd() argument 47 mbedtls_sha512(input, length, output, 1); in sha384_csum_wd() 57 sha512_update(sha512_context *ctx, const uint8_t *input, uint32_t length) in sha512_update() argument 59 mbedtls_sha512_update(ctx, input, length); in sha512_update()
|
| /lib/mbedtls/external/mbedtls/library/ |
| A D | cipher_wrap.h | 84 int (*cbc_func)(void *ctx, mbedtls_operation_t mode, size_t length, 91 int (*cfb_func)(void *ctx, mbedtls_operation_t mode, size_t length, size_t *iv_off, 98 int (*ofb_func)(void *ctx, size_t length, size_t *iv_off, 106 int (*ctr_func)(void *ctx, size_t length, size_t *nc_off, 113 int (*xts_func)(void *ctx, mbedtls_operation_t mode, size_t length, 120 int (*stream_func)(void *ctx, size_t length,
|