1
0
mirror of https://github.com/Mbed-TLS/mbedtls.git synced 2025-07-30 22:43:08 +03:00

De-abbreviate "len" -> "length"

Signed-off-by: David Horstmann <david.horstmann@arm.com>
This commit is contained in:
David Horstmann
2023-11-20 12:54:09 +00:00
parent 232ab25bcd
commit 48ffb93d7f
3 changed files with 32 additions and 32 deletions

View File

@ -5583,7 +5583,7 @@ psa_status_t psa_crypto_input_copy_alloc(const uint8_t *input, size_t input_len,
psa_status_t status;
input_copy->buffer = NULL;
input_copy->len = 0;
input_copy->length = 0;
if (input_len == 0) {
return PSA_SUCCESS;
@ -5597,10 +5597,10 @@ psa_status_t psa_crypto_input_copy_alloc(const uint8_t *input, size_t input_len,
}
/* From now on, we must free input_copy->buffer on error. */
input_copy->len = input_len;
input_copy->length = input_len;
status = psa_crypto_copy_input(input, input_len,
input_copy->buffer, input_copy->len);
input_copy->buffer, input_copy->length);
if (status != PSA_SUCCESS) {
goto error;
}
@ -5610,7 +5610,7 @@ psa_status_t psa_crypto_input_copy_alloc(const uint8_t *input, size_t input_len,
error:
mbedtls_free(input_copy->buffer);
input_copy->buffer = NULL;
input_copy->len = 0;
input_copy->length = 0;
return status;
}
@ -5618,7 +5618,7 @@ void psa_crypto_input_copy_free(psa_crypto_input_copy_t *input_copy)
{
mbedtls_free(input_copy->buffer);
input_copy->buffer = NULL;
input_copy->len = 0;
input_copy->length = 0;
}
psa_status_t psa_crypto_output_copy_alloc(uint8_t *output, size_t output_len,
@ -5626,7 +5626,7 @@ psa_status_t psa_crypto_output_copy_alloc(uint8_t *output, size_t output_len,
{
output_copy->original = NULL;
output_copy->buffer = NULL;
output_copy->len = 0;
output_copy->length = 0;
if (output_len == 0) {
return PSA_SUCCESS;
@ -5637,7 +5637,7 @@ psa_status_t psa_crypto_output_copy_alloc(uint8_t *output, size_t output_len,
* a NULL return value means a failure of allocation. */
return PSA_ERROR_INSUFFICIENT_MEMORY;
}
output_copy->len = output_len;
output_copy->length = output_len;
output_copy->original = output;
return PSA_SUCCESS;
@ -5648,7 +5648,7 @@ psa_status_t psa_crypto_output_copy_free(psa_crypto_output_copy_t *output_copy)
psa_status_t status;
if (output_copy->buffer == NULL) {
output_copy->len = 0;
output_copy->length = 0;
return PSA_SUCCESS;
}
if (output_copy->original == NULL) {
@ -5656,15 +5656,15 @@ psa_status_t psa_crypto_output_copy_free(psa_crypto_output_copy_t *output_copy)
return PSA_ERROR_CORRUPTION_DETECTED;
}
status = psa_crypto_copy_output(output_copy->buffer, output_copy->len,
output_copy->original, output_copy->len);
status = psa_crypto_copy_output(output_copy->buffer, output_copy->length,
output_copy->original, output_copy->length);
if (status != PSA_SUCCESS) {
return status;
}
mbedtls_free(output_copy->buffer);
output_copy->buffer = NULL;
output_copy->len = 0;
output_copy->length = 0;
return PSA_SUCCESS;
}

View File

@ -517,7 +517,7 @@ psa_status_t psa_verify_hash_builtin(
typedef struct psa_crypto_input_copy_s {
uint8_t *buffer;
size_t len;
size_t length;
} psa_crypto_input_copy_t;
#define PSA_CRYPTO_INPUT_COPY_INIT { NULL, 0 }
@ -547,7 +547,7 @@ void psa_crypto_input_copy_free(psa_crypto_input_copy_t *input_copy);
typedef struct psa_crypto_output_copy_s {
uint8_t *original;
uint8_t *buffer;
size_t len;
size_t length;
} psa_crypto_output_copy_t;
#define PSA_CRYPTO_OUTPUT_COPY_INIT { NULL, NULL, 0 }