Lines Matching defs:length
113 /* Check verify-data in constant-time. The length OTOH is no secret */
127 MBEDTLS_SSL_DEBUG_MSG(1, ("non-zero length renegotiation info"));
487 MBEDTLS_SSL_DEBUG_MSG(3, ("ticket length: %" MBEDTLS_PRINTF_SIZET, len));
552 /*! 2 bytes for profile length and 1 byte for mki len */
574 * Min length is 5: at least one protection profile(2 bytes)
575 * and length(2 bytes) + srtp_mki length(1 byte)
576 * Check here that we have at least 2 bytes of protection profiles length
577 * and one of srtp_mki length
587 /* first 2 bytes are protection profile length(in bytes) */
591 /* The profile length cannot be bigger than input buffer size - lengths fields */
593 profile_length % 2 != 0) { /* profiles are 2 bytes long, so the length must be even */
627 buf += profile_length; /* buf points to the mki length */
949 * 3 . 4 message length
1042 * 1 . 3 handshake length
1045 * 9 . 11 DTLS only: fragment length
1109 * fragment_offset == 0 and fragment_length == length
1111 size_t fragment_offset, fragment_length, length;
1114 length = MBEDTLS_GET_UINT24_BE(ssl->in_msg, 1);
1116 4, ("fragment_offset=%u fragment_length=%u length=%u",
1118 (unsigned) length));
1119 if (fragment_offset != 0 || length != fragment_length) {
1134 * 34 . 34 session id length (1 byte)
1135 * 35 . 34+x session id, where x = session id length from byte 34
1136 * 35+x . 35+x DTLS only: cookie length (1 byte)
1138 * .. . .. ciphersuite list length (2 bytes)
1140 * .. . .. compression alg. list length (1 byte)
1142 * .. . .. extensions length (2 bytes, optional)
1147 * Minimal length (with everything empty and extensions omitted) is
1149 * read at least up to session id length without worrying.
1181 * Check the session ID length and save session ID
1186 sess_len + 34 + 2 > msg_len) { /* 2 for cipherlist length field */
1202 * Check the cookie length and content
1248 * Check the ciphersuitelist length (will be parsed later)
1270 * Check the compression algorithm's length.
1292 * Check the extension length
1411 MBEDTLS_SSL_DEBUG_MSG(3, ("found max fragment length extension"));
2002 * - 2 bytes for the protection profile length
2004 * - 1 byte for the mki length
2005 * + the actual mki length
2015 * total length 5 and mki value: only one profile(2 bytes)
2016 * and length(2 bytes) and srtp_mki )
2021 /* protection profile length: 2 */
2069 /* Skip length byte until we know the length */
2183 * 1 . 3 handshake length
2288 * 38 . 38 session id length
2292 * 42+n . 43+n extensions length
2314 * First write extensions, then the total length
2375 MBEDTLS_SSL_DEBUG_MSG(3, ("server hello, total extension length: %" MBEDTLS_PRINTF_SIZET,
2419 uint16_t dn_size, total_dn_size; /* excluding length bytes */
2420 size_t ct_len, sa_len; /* including length bytes */
2445 * 1 . 3 handshake length
2448 * m .. m+1 sig alg length (TLS 1.2 only)
2450 * n .. n+1 length of all DNs
2451 * n+2 .. n+3 length of DN 1
2453 * ... .. ... length of DN 2, etc.
2507 * length). Thus the offset of each element is the length of the
2514 /* Fill in list length. */
2551 /* It follows from RFC 5280 A.1 that this length
2625 * order to extract its type and length (in bits). */
2766 * signature length which will be added in ssl_write_server_key_exchange
2814 ssl->out_msglen = 4; /* header (type:1, length:3) to be written later */
2995 // data length(1)
3043 * First byte is data length.
3044 * It will be filled later. p holds now the data length location.
3048 * Make one byte space for the length.
3066 /* Store the length of the exported public key. */
3069 /* Determine full message length. */
3215 * signature length which will be added in ssl_write_server_key_exchange
3303 /* If there is a signature, write its length.
3738 * We must have at least two bytes (1 for length, at least 1 for data)
3741 MBEDTLS_SSL_DEBUG_MSG(1, ("Invalid buffer length: %" MBEDTLS_PRINTF_SIZET,
3747 MBEDTLS_SSL_DEBUG_MSG(1, ("Invalid data length: %" MBEDTLS_PRINTF_SIZET
3755 MBEDTLS_SSL_DEBUG_MSG(1, ("Invalid public key length: %" MBEDTLS_PRINTF_SIZET
3893 /* Write length only when we know the actual value */
3964 * - a uint16 containing the length (in octets) of the ECDH computation
3966 * - a uint16 containing the length (in octets) of the PSK
3972 /* uint16 to store length (in octets) of the ECDH computation */
3994 /* Write the ECDH computation length before the ECDH computation */