Lines Matching defs:len

315                                    size_t len,
529 static size_t ssl_compute_padding_length(size_t len,
532 return (granularity - (len + 1) % granularity) % granularity;
570 size_t len = *content_size;
576 content[len] = rec_type;
577 len++;
583 memset(content + len, 0, pad);
584 len += pad;
587 *content_size = len;
2148 size_t len;
2232 len = in_buf_len - (size_t) (ssl->in_hdr - ssl->in_buf);
2243 ret = ssl->f_recv_timeout(ssl->p_bio, ssl->in_hdr, len,
2246 ret = ssl->f_recv(ssl->p_bio, ssl->in_hdr, len);
2300 len = nb_want - ssl->in_left;
2307 ssl->in_hdr + ssl->in_left, len,
2311 ssl->in_hdr + ssl->in_left, len);
2328 if ((size_t) ret > len) {
2332 ret, len));
2437 msg->len = ssl->out_msglen;
2587 memcpy(ssl->out_msg, cur->p, cur->len);
2588 ssl->out_msglen = cur->len;
2592 ssl->handshake->cur_msg_p += cur->len;
2595 const size_t hs_len = cur->len - 12;
2627 * Handshake headers: type(1) len(3) seq(2) f_off(3) f_len(3) */
2650 if (ssl->handshake->cur_msg_p >= cur->p + cur->len) {
2765 * - ssl->out_msglen: 4 + actual handshake message len
2940 size_t len = ssl->out_msglen;
2967 MBEDTLS_PUT_UINT16_BE(len, ssl->out_len, 0);
3002 ssl->out_msglen = len = rec.data_len;
3006 protected_record_size = len + mbedtls_ssl_out_hdr_len(ssl);
3030 ssl->out_hdr[2], len));
3135 static void ssl_bitmask_set(unsigned char *mask, size_t offset, size_t len)
3144 if (len <= start_bits) {
3145 for (; len != 0; len--) {
3146 mask[first_byte_idx] |= 1 << (start_bits - len);
3149 /* Avoid potential issues with offset or len becoming invalid */
3154 len -= start_bits;
3161 end_bits = len % 8;
3163 size_t last_byte_idx = (offset + len) / 8;
3165 len -= end_bits; /* Now len % 8 == 0 */
3172 memset(mask + offset / 8, 0xFF, len / 8);
3179 static int ssl_bitmask_check(unsigned char *mask, size_t len)
3183 for (i = 0; i < len / 8; i++) {
3189 for (i = 0; i < len % 8; i++) {
3190 if ((mask[len / 8] & (1 << (7 - i))) == 0) {
3501 * 59-xx SessionID session_id; 1 byte len + sid_len content
3502 * 60+ opaque cookie<0..2^8-1>; 1 byte len + content
3630 size_t len = 0;
3645 ssl->out_buf, MBEDTLS_SSL_OUT_CONTENT_LEN, &len);
3653 ssl->out_buf, len);
3657 send_ret = ssl->f_send(ssl->p_bio, ssl->out_buf, len);
3713 size_t len,
3754 if (len < rec_hdr_len_offset + rec_hdr_len_len) {
3758 (unsigned) len,
3794 if (len < rec_hdr_len_offset + rec_hdr_len_len) {
3798 (unsigned) len,
3803 /* configured CID len is guaranteed at most 255, see
3886 if (len < rec->data_offset + rec->data_len) {
3890 (unsigned) len,
3938 * fact that the record header len is 13 instead.
4710 hs->buffering.future_record.len;
4738 rec_len = hs->buffering.future_record.len;
4819 hs->buffering.future_record.len = rec->buf_len;
4822 mbedtls_calloc(1, hs->buffering.future_record.len);
5042 MBEDTLS_SSL_DEBUG_MSG(1, ("invalid CCS message, len: %" MBEDTLS_PRINTF_SIZET,
5087 MBEDTLS_SSL_DEBUG_MSG(1, ("invalid alert message, len: %" MBEDTLS_PRINTF_SIZET,
5730 * brief Read at most 'len' application data bytes from the input
5738 * param len maximum number of bytes to read
5746 mbedtls_ssl_context *ssl, unsigned char *buf, size_t len)
5748 size_t n = (len < ssl->in_msglen) ? len : ssl->in_msglen;
5750 if (len != 0) {
5774 int mbedtls_ssl_read(mbedtls_ssl_context *ssl, unsigned char *buf, size_t len)
5940 ret = ssl_read_application_data(ssl, buf, len);
5949 unsigned char *buf, size_t len)
5964 return ssl_read_application_data(ssl, buf, len);
5982 const unsigned char *buf, size_t len)
5992 if (len > max_len) {
5998 len, max_len));
6002 len = max_len;
6022 ssl->out_msglen = len;
6024 if (len > 0) {
6025 memcpy(ssl->out_msg, buf, len);
6034 return (int) len;
6040 int mbedtls_ssl_write(mbedtls_ssl_context *ssl, const unsigned char *buf, size_t len)
6064 ret = ssl_write_real(ssl, buf, len);
6073 const unsigned char *buf, size_t len)
6161 if (len > remaining) {
6162 len = remaining;
6165 ret = ssl_write_real(ssl, buf, len);