Lines Matching refs:data_len
700 * ciphertext length from the inner plaintext length rec->data_len via
763 size_t ad_len_field = rec->data_len;
944 || rec->buf_len - rec->data_offset < rec->data_len
956 post_avail = rec->buf_len - (rec->data_len + rec->data_offset);
958 data, rec->data_len);
960 if (rec->data_len > MBEDTLS_SSL_OUT_CONTENT_LEN) {
963 rec->data_len,
973 * Note that this changes `rec->data_len`, and hence
983 ssl_compute_padding_length(rec->data_len,
986 &rec->data_len,
1007 ssl_compute_padding_length(rec->data_len,
1013 * Note that this changes `rec->data_len`, and hence
1017 &rec->data_len,
1028 post_avail = rec->buf_len - (rec->data_len + rec->data_offset);
1065 status = psa_mac_update(&operation, data, rec->data_len);
1081 ret = mbedtls_md_hmac_update(&transform->md_ctx_enc, data, rec->data_len);
1095 memcpy(data + rec->data_len, mac, transform->maclen);
1098 MBEDTLS_SSL_DEBUG_BUF(4, "computed mac", data + rec->data_len,
1101 rec->data_len += transform->maclen;
1128 rec->data_len, 0));
1191 rec->data_len));
1201 data, rec->data_len,
1203 &rec->data_len);
1214 data, rec->data_len, /* src */
1216 &rec->data_len,
1224 data + rec->data_len - transform->taglen,
1240 rec->data_len += dynamic_iv_len;
1260 padlen = transform->ivlen - (rec->data_len + 1) % transform->ivlen;
1272 data[rec->data_len + i] = (unsigned char) padlen;
1275 rec->data_len += padlen + 1;
1308 rec->data_len, transform->ivlen,
1331 data, rec->data_len,
1332 data, rec->data_len, &olen);
1342 data + olen, rec->data_len - olen,
1357 data, rec->data_len,
1364 if (rec->data_len != olen) {
1371 rec->data_len += transform->ivlen;
1408 status = psa_mac_update(&operation, data, rec->data_len);
1426 data, rec->data_len);
1440 memcpy(data + rec->data_len, mac, transform->maclen);
1442 rec->data_len += transform->maclen;
1514 rec->buf_len - rec->data_offset < rec->data_len) {
1534 if (rec->data_len < transform->maclen) {
1538 rec->data_len, transform->maclen));
1565 if (rec->data_len < dynamic_iv_len) {
1568 rec->data_len,
1576 rec->data_len -= dynamic_iv_len;
1582 if (rec->data_len < transform->taglen) {
1585 rec->data_len,
1589 rec->data_len -= transform->taglen;
1612 * bytes following data + data_len. This justifies
1617 MBEDTLS_SSL_DEBUG_BUF(4, "TAG used", data + rec->data_len,
1628 data, rec->data_len + transform->taglen,
1642 data, rec->data_len + transform->taglen, /* src */
1658 if (olen != rec->data_len) {
1703 if (rec->data_len < minlen + transform->ivlen ||
1704 rec->data_len < minlen + transform->maclen + 1) {
1709 rec->data_len,
1728 /* Update data_len in tandem with add_data.
1731 * data_len >= minlen + maclen + 1.
1733 * Afterwards, we know that data + data_len is followed by at
1737 * Further, we still know that data_len > minlen */
1738 rec->data_len -= transform->maclen;
1758 status = psa_mac_update(&operation, data, rec->data_len);
1764 status = psa_mac_verify_finish(&operation, data + rec->data_len,
1776 data, rec->data_len);
1789 MBEDTLS_SSL_DEBUG_BUF(4, "message mac", data + rec->data_len,
1795 if (mbedtls_ct_memcmp(data + rec->data_len, mac_expect,
1827 /* We know from above that data_len > minlen >= 0,
1829 * data_len >= minlen + ivlen ( = minlen or 2 * minlen ). */
1830 if (rec->data_len % transform->ivlen != 0) {
1833 rec->data_len, transform->ivlen));
1841 /* Safe because data_len >= minlen + ivlen = 2 * ivlen. */
1846 rec->data_len -= transform->ivlen;
1849 /* We still have data_len % ivlen == 0 and data_len >= ivlen here. */
1870 data, rec->data_len,
1871 data, rec->data_len, &olen);
1880 data + olen, rec->data_len - olen,
1894 data, rec->data_len, data, &olen)) != 0) {
1901 if (rec->data_len != olen) {
1906 /* Safe since data_len >= minlen + maclen + 1, so after having
1908 * data_len > 0 (because of data_len % ivlen == 0, it's actually
1910 padlen = data[rec->data_len - 1];
1914 rec->data_len,
1920 if (rec->data_len < transform->maclen + padlen + 1) {
1924 rec->data_len,
1930 rec->data_len,
1939 * we have data_len >= padlen here. */
1953 size_t const padding_idx = rec->data_len - padlen;
1954 size_t const num_checks = rec->data_len <= 256 ? rec->data_len : 256;
1955 size_t const start_idx = rec->data_len - num_checks;
1958 for (idx = start_idx; idx < rec->data_len; idx++) {
1982 * data_len >= padlen still holds. */
1983 rec->data_len -= padlen;
1993 data, rec->data_len);
2006 * data_len < maclen + padlen + 1, then padlen
2008 * data_len >= minlen + maclen + 1
2010 * have at least data_len >= maclen.
2013 * data_len >= maclen + padlen + 1, then we have
2016 * hence data_len >= maclen in any case.
2019 * data_len >= maclen.
2021 rec->data_len -= transform->maclen;
2029 * data_len over all padlen values.
2032 * data_len -= padlen.
2037 const size_t max_len = rec->data_len + padlen;
2044 data, rec->data_len, min_len, max_len,
2049 data, rec->data_len, min_len, max_len,
2058 rec->data_len,
2102 ret = ssl_parse_inner_plaintext(data, &rec->data_len,
2113 ret = ssl_parse_inner_plaintext(data, &rec->data_len,
2974 rec.data_len = ssl->out_msglen;
3002 ssl->out_msglen = len = rec.data_len;
3003 MBEDTLS_PUT_UINT16_BE(rec.data_len, ssl->out_len, 0);
3854 rec->data_len = MBEDTLS_GET_UINT16_BE(buf, rec_hdr_len_offset);
3859 rec->type, (unsigned) tls_version, rec->data_len));
3862 rec->buf_len = rec->data_offset + rec->data_len;
3864 if (rec->data_len == 0) {
3886 if (len < rec->data_offset + rec->data_len) {
3891 (unsigned) (rec->data_offset + rec->data_len)));
4009 ret = mbedtls_ssl_tls13_check_early_data_len(ssl, rec->data_len);
4053 rec->buf + rec->data_offset, rec->data_len);
4069 if (rec->data_len == 0) {
4137 ret = mbedtls_ssl_tls13_check_early_data_len(ssl, rec->data_len);
4160 if (rec->data_len > MBEDTLS_SSL_IN_CONTENT_LEN) {
4542 hs_buf->data_len = reassembly_buf_sz;
4892 ssl->in_msglen = rec.data_len;
5021 ssl->in_msglen = rec.data_len;
5022 MBEDTLS_PUT_UINT16_BE(rec.data_len, ssl->in_len, 0);
6273 hs->buffering.total_bytes_buffered -= hs_buf->data_len;
6274 mbedtls_zeroize_and_free(hs_buf->data, hs_buf->data_len);