Lines Matching defs:length
119 MBEDTLS_SSL_DEBUG_MSG(3, ("CID length %u does not match CID length %u in config",
144 /* We report MBEDTLS_SSL_CID_DISABLED in case the CID length is
202 * Convert max_fragment_length codes to length.
1167 size_t length;
1170 for (length = 0; (curve_list[length] != MBEDTLS_ECP_DP_NONE); length++) {
1174 uint16_t *group_list = mbedtls_calloc(length + 1, sizeof(uint16_t));
1179 for (size_t i = 0; i < length; i++) {
1189 group_list[length] = 0;
2709 * Set the minimum length for Diffie-Hellman parameters
3173 /* Check if a smaller max length was negotiated */
3201 /* Check if a smaller max length was negotiated */
3270 * above is the maximum length of the TLSInnerPlaintext structure that
3273 * in mbedtls_ssl_encrypt_buf(), compute the maximum length for
3466 used += 1 /* type */ + 1 /* length */ + session->peer_cert_digest_len;
3777 + 1; /* resumption_key length */
4187 * opaque ticket<0..2^24-1>; // length 0 means no ticket
4198 * opaque master[48]; // fixed length in the standard
4201 * opaque peer_cert<0..2^24-1>; // length 0 means no peer cert
5110 * Session (length + data)
6656 ("Signature algorithms extension length misaligned"));
6767 * and for this use case it makes sense to have a 0-length "secret".
6768 * Since the key API doesn't allow importing a key of length 0,
6770 * to mean a 0-length "secret" input. */
7015 * "The master secret is always exactly 48 bytes in length." */
7092 * length of the other key.
7095 /* For RSA-PSK other key length is always 48 bytes. */
7455 /* Write length only when we know the actual value */
7623 * 1 . 3 handshake length
7624 * 4 . 6 length of all certs
7625 * 7 . 9 length of cert. 1
7627 * n . n+2 length of cert. 2
7780 /* Check that there's room for the next CRT's length fields. */
7798 /* Read length of the next CRT in the chain. */
8540 * RFC 5246 7.4.9 (Page 63) says 12 is the default length and ciphersuites
8937 * Determine the appropriate key, IV and MAC length.
8953 /* All modes haves 96-bit IVs, but the length of the static parts vary
8977 /* Minimum length of encrypted record */
8993 /* Get MAC length */
9003 /* Get MAC length */
9008 /* IV length */
9015 /* Minimum length */
9259 size_t length = buf[input_offset];
9262 if (input_offset + length > len) {
9267 buf + input_offset, length);
9272 input_offset += length;
9303 * For each step, prepend 1 byte with the length of the data as
9595 /* Check if we have space for header and length field:
9818 * 2 . 3 ext length
9819 * 4 . 5 protocol list length
9820 * 6 . 6 protocol name length
9829 /* Note: the length of the chosen protocol has been checked to be less