Lines Matching refs:buffer
573 uint8_t *buffer;
582 buffer = mbedtls_malloc(length + 1);
583 if (!buffer) {
587 memcpy(buffer, setup_data->pki_key.key.pem_buf.public_cert, length);
588 buffer[length] = '\000';
590 ret = mbedtls_x509_crt_parse(public_cert, buffer, length);
591 mbedtls_free(buffer);
606 buffer = mbedtls_malloc(length + 1);
607 if (!buffer) {
611 memcpy(buffer, setup_data->pki_key.key.pem_buf.private_key, length);
612 buffer[length] = '\000';
615 ret = mbedtls_pk_parse_key(private_key, buffer, length, NULL, 0);
617 ret = mbedtls_pk_parse_key(private_key, buffer, length,
620 mbedtls_free(buffer);
653 uint8_t *buffer;
660 buffer = mbedtls_malloc(length + 1);
661 if (!buffer) {
665 memcpy(buffer, setup_data->pki_key.key.pem_buf.ca_cert, length);
666 buffer[length] = '\000';
668 ret = mbedtls_x509_crt_parse(cacert, buffer, length);
669 mbedtls_free(buffer);
2793 uint8_t key[COAP_CRYPTO_MAX_KEY_SIZE]; /* buffer for normalizing the key
2880 /* check if buffer is sufficient to hold tag */
2882 coap_log_err("coap_encrypt: buffer too small\n");