Lines Matching defs:length

271   lidentity.length = identity ? identity_len : 0;
275 (int)lidentity.length, (const char *)lidentity.s);
292 mbedtls_ssl_set_hs_psk(ssl, psk_key->s, psk_key->length);
401 "The certificate has a short RSA length", cn ? cn : "?", depth);
574 size_t length;
579 length = setup_data->pki_key.key.pem_buf.public_cert_len;
580 if (setup_data->pki_key.key.pem_buf.public_cert[length-1] != '\000') {
582 buffer = mbedtls_malloc(length + 1);
587 memcpy(buffer, setup_data->pki_key.key.pem_buf.public_cert, length);
588 buffer[length] = '\000';
589 length++;
590 ret = mbedtls_x509_crt_parse(public_cert, buffer, length);
603 length = setup_data->pki_key.key.pem_buf.private_key_len;
604 if (setup_data->pki_key.key.pem_buf.private_key[length-1] != '\000') {
606 buffer = mbedtls_malloc(length + 1);
611 memcpy(buffer, setup_data->pki_key.key.pem_buf.private_key, length);
612 buffer[length] = '\000';
613 length++;
615 ret = mbedtls_pk_parse_key(private_key, buffer, length, NULL, 0);
617 ret = mbedtls_pk_parse_key(private_key, buffer, length,
654 size_t length;
657 length = setup_data->pki_key.key.pem_buf.ca_cert_len;
658 if (setup_data->pki_key.key.pem_buf.ca_cert[length-1] != '\000') {
660 buffer = mbedtls_malloc(length + 1);
665 memcpy(buffer, setup_data->pki_key.key.pem_buf.ca_cert, length);
666 buffer[length] = '\000';
667 length++;
668 ret = mbedtls_x509_crt_parse(cacert, buffer, length);
936 m_context->psk_sni_entry_list[i].psk_info.key.length);
1010 * Configure CID max length.
1161 psk_key->length, psk_identity->s,
1162 psk_identity->length)) != 0) {
2105 "returned -0x%x: '%s' (length %zd)\n",
2443 "returned -0x%x: '%s' (length %zd)\n",
2697 C(mbedtls_md_update(&ctx, (const unsigned char *)data->s, data->length));
2794 according to its key length */
2855 ccm->key.length,
2864 laad.length = 0;
2872 laad.length, /* ad */
2874 data->length, /* input */
2894 laad.length, /* ad */
2896 data->length, /* input */
2940 ccm->key.length,
2945 if (data->length < ccm->tag_len) {
2946 coap_log_err("coap_decrypt: invalid tag length\n");
2954 laad.length = 0;
2958 tag = data->s + data->length - ccm->tag_len;
2963 laad.length, /* ad */
2965 data->length - ccm->tag_len, /* input */
2976 laad.length, /* ad */
2978 // data->length - ccm->tag_len, /* input */
2979 data->length, /* input */
3025 C(mbedtls_md_hmac_starts(&ctx, key->s, key->length));
3026 C(mbedtls_md_hmac_update(&ctx, (const unsigned char *)data->s, data->length));