Lines Matching refs:need
485 * that need it (e.g. for RENEGOTIATION_INFO the server already knows because
497 * \param need Needed space in bytes.
504 const uint8_t *end, size_t need)
506 return (cur > end) || (need > (size_t) (end - cur));
512 size_t need;
516 const uint8_t *cur, const uint8_t *end, size_t need);
523 const uint8_t *end, size_t need)
525 if ((cur > end) || (need > (size_t) (end - cur))) {
526 mbedtls_ssl_set_chk_buf_ptr_fail_args(cur, end, need);
540 * \param need Needed space in bytes.
543 #define MBEDTLS_SSL_CHK_BUF_PTR(cur, end, need) \
545 if (mbedtls_ssl_chk_buf_ptr((cur), (end), (need)) != 0) \
562 * \param need Needed length in bytes.
565 #define MBEDTLS_SSL_CHK_BUF_READ_PTR(cur, end, need) \
567 if (mbedtls_ssl_chk_buf_ptr((cur), (end), (need)) != 0) \
678 * From the start of the handshake, we need to define a current protocol
1166 /* We need the Hello random bytes in order to re-derive keys from the
1206 * encrypted content would need to be shifted afterwards to
1222 * need to perform arithmetic on this, but do
1223 * need it as a Byte array for the purpose of
1421 * of (D)TLS on top of it without the need to know anything