Home
last modified time | relevance | path

Searched +full:check +full:- +full:size (Results 1 – 25 of 245) sorted by relevance

12345678910

/openthread-latest/third_party/mbedtls/repo/tests/suites/
Dtest_suite_alignment.function7 #pragma clang diagnostic ignored "-Wunreachable-code"
11 * Convert a string of the form "abcd" (case-insensitive) to a uint64_t.
23 *result |= ((uint64_t) raw[i]) << ((olen - i - 1) * 8);
31 void mbedtls_unaligned_access(int size, int offset)
33 /* Define 64-bit aligned raw byte array */
42 TEST_ASSERT(size == 16 || size == 32 || size == 64);
45 switch (size) {
62 memcpy(&raw_aligned_64, ((uint8_t *) &raw) + offset, size / 8);
65 switch (size) {
80 for (size_t i = 0; i < (size_t) (size / 8); i++) {
[all …]
Dtest_suite_psa_crypto_storage_format.function31 PSA_ASSERT(psa_import_key(attributes, material->x, material->len,
36 /* Check that the key is represented as expected. */
38 TEST_EQUAL(storage_info.size, expected_representation->len);
39 TEST_CALLOC(actual_representation, storage_info.size);
40 PSA_ASSERT(psa_its_get(uid, 0, storage_info.size,
42 TEST_MEMORY_COMPARE(expected_representation->x, expected_representation->len,
52 /** Check if a key is exportable. */
105 * Hash-and-sign algorithms where the asymmetric part doesn't use
139 /** Write a key with the given representation to storage, then check
159 PSA_ASSERT(psa_its_set(uid, representation->len, representation->x, 0));
[all …]
Dtest_suite_rsa.data4 RSA init-free-free
7 RSA init-free-init-free
152 # The following tests check whether the use of reduced length encodings (as mandated for DER in con…
153 # the verification of PKCS1 v1.5 signatures - this is relevant to prevent Bleichenbacher signature …
155 # to `mbedtls_rsa_rsassa_pkcs1_v15_encode` to force the use of non-reduced encodings in different p…
157 # Correct signature with DER-compliant reduced length encodings
162 # Non-reduced 1-byte length encoding in `DigestInfo` ASN.1 element
163 RSA PKCS1 Verify v1.5 non-reduced length encoding #1
167 # Non-reduced 2-byte length encoding for `digestAlgorithm` ASN.1 element
168 RSA PKCS1 Verify v1.5 non-reduced length encoding #2
[all …]
Dtest_suite_dhm.function21 /* Sanity checks on a Diffie-Hellman parameter: check the length-value
22 * syntax and check that the value is the expected one (taken from the
26 size_t size,
36 TEST_ASSERT(size >= *offset + 2);
42 TEST_ASSERT(size >= *offset + n);
53 /* Sanity checks on Diffie-Hellman parameters: syntax, range, and comparison
61 /* Check that ctx->X and ctx->GX are within range. */
62 TEST_ASSERT(mbedtls_mpi_cmp_int(&ctx->X, 1) > 0);
63 TEST_ASSERT(mbedtls_mpi_cmp_mpi(&ctx->X, &ctx->P) < 0);
64 TEST_ASSERT(mbedtls_mpi_size(&ctx->X) <= x_size);
[all …]
/openthread-latest/src/cli/
DREADME_COAPS.md1 # OpenThread CLI - CoAPS Example
13 CoAPS uses DTLS to establish a secure, end-to-end connection.
17 - TLS_PSK_WITH_AES_128_CCM_8
20 > coaps psk <your-psk> <your-psk-id>
24 - TLS_ECDHE_ECDSA_WITH_AES_128_CCM_8
33 On node 1, setup CoAPS server with resource `test-resource`.
38 > coaps resource test-resource
47 > coaps connect <peer-ip6-address>
50 > coaps get test-resource
53 > coaps put test-resource con payload
[all …]
/openthread-latest/examples/platforms/utils/
Duart_rtt.h37 #include "openthread-core-config.h"
73 * RTT up buffer size used for the uart. Only used if UART_RTT_BUFFER_INDEX
74 * is not 0. To configure buffer #0 size, check the BUFFER_SIZE_UP definition
84 * RTT down buffer size used for the uart. Only used if UART_RTT_BUFFER_INDEX
85 * is not 0. To configure buffer #0 size, check the BUFFER_SIZE_DOWN definition
95 * Size of the temporary buffer used when reading from the RTT channel. It will be
/openthread-latest/third_party/mbedtls/repo/include/mbedtls/
Dpk.h8 * SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later
36 #define MBEDTLS_ERR_PK_ALLOC_FAILED -0x3F80
38 #define MBEDTLS_ERR_PK_TYPE_MISMATCH -0x3F00
40 #define MBEDTLS_ERR_PK_BAD_INPUT_DATA -0x3E80
42 #define MBEDTLS_ERR_PK_FILE_IO_ERROR -0x3E00
44 #define MBEDTLS_ERR_PK_KEY_INVALID_VERSION -0x3D80
46 #define MBEDTLS_ERR_PK_KEY_INVALID_FORMAT -0x3D00
48 #define MBEDTLS_ERR_PK_UNKNOWN_PK_ALG -0x3C80
50 #define MBEDTLS_ERR_PK_PASSWORD_REQUIRED -0x3C00
52 #define MBEDTLS_ERR_PK_PASSWORD_MISMATCH -0x3B80
[all …]
Dx509.h8 * SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later
31 * That is, maximum length of the chain, excluding the end-entity certificate
45 #define MBEDTLS_ERR_X509_FEATURE_UNAVAILABLE -0x2080
47 #define MBEDTLS_ERR_X509_UNKNOWN_OID -0x2100
49 #define MBEDTLS_ERR_X509_INVALID_FORMAT -0x2180
51 #define MBEDTLS_ERR_X509_INVALID_VERSION -0x2200
53 #define MBEDTLS_ERR_X509_INVALID_SERIAL -0x2280
55 #define MBEDTLS_ERR_X509_INVALID_ALG -0x2300
57 #define MBEDTLS_ERR_X509_INVALID_NAME -0x2380
59 #define MBEDTLS_ERR_X509_INVALID_DATE -0x2400
[all …]
Dpsa_util.h8 * SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later
46 * large. It is guaranteed to accept any output size
48 * maximum request size depends on the library
79 * \param[out] bits On success the bit size of the curve; 0 on failure.
94 * \param bits The bit-length of a private key on \p curve.
115 * \warning This function does not check if the algorithm is
132 * \warning This function does not check if the algorithm is
148 * \param bits Size of each coordinate in bits.
154 * \param der_size Size of \p der in bytes. It is enough if \p der_size
155 * is at least the size of the actual output. (The size
[all …]
Decp.h9 * <em>RFC-4492: Elliptic Curve Cryptography (ECC) Cipher Suites
12 * <em>RFC-2409: The Internet Key Exchange (IKE)</em> defines ECP
19 * SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later
35 #define MBEDTLS_ERR_ECP_BAD_INPUT_DATA -0x4F80
37 #define MBEDTLS_ERR_ECP_BUFFER_TOO_SMALL -0x4F00
39 #define MBEDTLS_ERR_ECP_FEATURE_UNAVAILABLE -0x4E80
41 #define MBEDTLS_ERR_ECP_VERIFY_FAILED -0x4E00
43 #define MBEDTLS_ERR_ECP_ALLOC_FAILED -0x4D80
45 #define MBEDTLS_ERR_ECP_RANDOM_FAILED -0x4D00
47 #define MBEDTLS_ERR_ECP_INVALID_KEY -0x4C80
[all …]
/openthread-latest/src/core/common/
Dstring.hpp37 #include "openthread-core-config.h"
51 * @addtogroup core-string
69 * Represents string encoding check when copying string.
73 kStringNoEncodingCheck, ///< Do not check the string encoding.
74 kStringCheckUtf8Encoding, ///< Validate that string follows UTF-8 encoding.
91 * Finds the first occurrence of a given character in a null-terminated string.
101 * Finds the first occurrence of a given sub-string in a null-terminated string.
104 * @param[in] aSubString A sub-string to search for.
113 * Checks whether a null-terminated string starts with a given prefix string.
125 * Checks whether a null-terminated string ends with a given character.
[all …]
Darray.hpp37 #include "openthread-core-config.h"
65 * Returns a pointer to end of a given array (pointing to the past-the-end element).
67 …* Note that the past-the-end element is a theoretical element that would follow the last element i…
75 * @returns Pointer to the past-the-end element.
83 * Returns a pointer to end of a given array (pointing to the past-the-end element).
85 …* Note that the past-the-end element is a theoretical element that would follow the last element i…
93 * @returns Pointer to the past-the-end element.
101 * Represents an array of elements with a fixed max size.
104 * @tparam kMaxSize Specifies the max array size (maximum number of elements in the array).
105 …* @tparam SizeType The type to be used for array size, length, and index. If not specified, a d…
[all …]
/openthread-latest/third_party/mbedtls/repo/tests/include/test/
Dpsa_exercise_key.h1 /** Code to exercise a PSA key object, i.e. validate that it seems well-formed
6 * SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later
41 * in RSA PKCS#1v1.5 signatures. A RIPEMD160-only configuration would be
51 * For simplicity's sake, stick to block ciphers with 16-byte blocks.
68 * a block cipher-based MAC with #KNOWN_SUPPORTED_BLOCK_CIPHER.
113 * - HKDF: salt, info.
114 * - TKS 1.2 PRF, TLS 1.2 PSK-to-MS: seed, label.
115 * - PBKDF2: input cost, salt.
127 * or the key being destroyed mid-operation will only
143 * The result is discarded. The purpose of this function is to smoke-test a key.
[all …]
/openthread-latest/tests/scripts/thread-cert/
Drun_cert_suite.py45 _BACKBONE_TESTS_DIR = 'tests/scripts/thread-cert/backbone'
53 '%(asctime)s - %(levelname)s - %(message)s')
56 def bash(cmd: str, check=True, stdout=None): argument
57 subprocess.run(cmd, shell=True, check=check, stdout=stdout)
85 logging.error("Run test %s failed, please check the log file: %s", test_name, logfile)
100 bash(f'docker rm -f $(docker ps -a -q -f "name=otbr_") 2>/dev/null || true')
101 bash(f'docker network rm $(docker network ls -q -f "name=backbone") 2>/dev/null || true')
117 parser.add_argument('--multiply', type=int, default=1, help='run each test for multiple times')
118 …parser.add_argument('--run-directory', type=str, default=None, help='run each test in the specifie…
140 def __init__(self, size: int):
[all …]
/openthread-latest/.github/workflows/
Dsize.yml29 name: Size
33 branches-ignore:
34 - 'dependabot/**'
37 - 'main'
40 …group: ${{ github.workflow }}-${{ github.event.pull_request.number || (github.repository == 'opent…
41 cancel-in-progress: true
48 size-report:
49 runs-on: ubuntu-24.04
51 - name: Harden Runner
52 uses: step-security/harden-runner@0080882f6c36860b6ba35c610c98ce87d4e2f26f # v2.10.2
[all …]
/openthread-latest/src/lib/spinel/
Dspi_frame.hpp46 * Each SPI frame starts with a 5-byte frame header:
48 * +---------+-----+----------+----------+
50 * +---------+-----+----------+----------+
52 * +---------+-----+----------+----------+
54 * - "HDR": The first byte is the header byte (defined below)
55 * - "RECV_LEN": The second and third bytes indicate the largest frame
56 * size that that device is ready to receive. If zero, then the
58 * - "DATA_LEN": The fourth and fifth bytes indicate the size of the
60 * is equal-to or less-than the number of bytes that the other device
67 * +---+---+---+---+---+---+---+---+
[all …]
/openthread-latest/third_party/mbedtls/repo/library/
Dmps_reader.c5 * SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later
28 * and significantly increases the C-code line count, but
29 * should not increase the size of generated assembly.
41 * on failure - this in turn has two benefits:
48 * and/or non-sensical calls.
49 * Moreover, it might even reduce code-size because
59 if (rd->acc == NULL) { in mps_reader_is_accumulating()
63 acc_remaining = rd->acc_share.acc_remaining; in mps_reader_is_accumulating()
70 unsigned char *frag = rd->frag; in mps_reader_is_producing()
83 unsigned char *acc = rd->acc; in mps_reader_get_fragment_offset()
[all …]
Dx509_crt.c5 * SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later
8 * The ITU-T X.509 standard defines a certificate format for PKI.
14 * http://www.itu.int/ITU-T/studygroups/com17/languages/X.680-0207.pdf
15 * http://www.itu.int/ITU-T/studygroups/com17/languages/X.690-0207.pdf
17 * [SIRO] https://cabforum.org/wp-content/uploads/Chunghwatelecom201503cabforumV4.pdf
81 * Max size of verification chain: end-entity + intermediates + trusted root
89 /* Hashes from SHA-256 and above. Note that this selection
96 /* Curves at or above 128-bit security level. Note that this selection
111 /* Next-generation profile. Currently identical to the default, but may
115 /* Hashes from SHA-256 and above. */
[all …]
Dpsa_crypto_core.h6 * SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later
13 * Include the build-time configuration information header. Here, we do not
16 * TF-PSA-Crypto repository which has a different build system and
66 * docs/architecture/psa-thread-safety/psa-thread-safety.md.
80 * containing a given key ID, will only check slots whose state variable is
95 * A function must call psa_key_slot_has_readers(slot) to check if
106 * . In case of a multi-threaded application where one thread asks to close
163 * If multi-threading is enabled, the caller must hold the
172 return slot->registered_readers > 0; in psa_key_slot_has_readers()
185 return *((psa_key_slot_number_t *) (slot->key.data)); in psa_key_slot_get_slot_number()
[all …]
/openthread-latest/third_party/mbedtls/repo/scripts/
Dcode_size_compare.py4 This script is for comparing the size of the library files from two
12 # SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later
29 """Supported architecture for code size measurement."""
32 ARMV8_M = 'armv8-m'
38 """Supported configuration for code size measurement."""
40 TFM_MEDIUM = 'tfm-medium'
50 class CodeSizeDistinctInfo: # pylint: disable=too-few-public-methods
51 """Data structure to store possibly distinct information for code size
53 def __init__( #pylint: disable=too-many-arguments
61 ) -> None:
[all …]
/openthread-latest/script/
Dcheck-size30 set -euo pipefail
32 OT_TMP_DIR=/tmp/ot-size-report
35 OT_SHA_NEW=${GITHUB_SHA:-$(git rev-parse HEAD)}
38 OT_SHA_OLD="$(git cat-file -p "${OT_SHA_NEW}" | grep 'parent ' | head -n1 | cut -d' ' -f2)"
47 OT_REPORTER="${OT_SIZE_REPORTER-}"
52 if arm-none-eabi-gcc --version | grep -q 'Arm Embedded Processors 7'; then
57 …wget --tries 4 --no-check-certificate --quiet https://developer.arm.com/-/media/Files/downloads/gn…
58 && tar xjf gcc-arm-none-eabi-7-2018-q2-update-linux.tar.bz2)
59 export PATH=/tmp/gcc-arm-none-eabi-7-2018-q2-update/bin:$PATH
61 arm-none-eabi-gcc --version
[all …]
/openthread-latest/third_party/mbedtls/repo/
DChangeLog3 = Mbed TLS 3.6.0 branch released 2024-03-28
42 * Support Armv8-A Crypto Extension acceleration for SHA-256
43 when compiling for Thumb (T32) or 32-bit Arm (A32).
44 * AES-NI is now supported in Windows builds with clang and clang-cl.
50 This affects both the low-level modules and the high-level APIs
53 * Support use of Armv8-A Cryptographic Extensions for hardware acclerated
54 AES when compiling for Thumb (T32) or 32-bit Arm (A32).
56 library without the corresponding built-in implementation. Generally
58 or they'll both be built in. However, for CCM and GCM the built-in
61 docs/driver-only-builds.md for full details and current limitations.
[all …]
/openthread-latest/third_party/tcplp/bsdtcp/
Dtcp_input.c1 /*-
4 * Copyright (c) 2007-2008,2010
6 * Copyright (c) 2009-2010 Lawrence Stewart <lstewart@freebsd.org>
8 * Copyright (c) 2010-2011 Juniper Networks, Inc.
52 * Determine a reasonable value for maxseg size.
53 * If the route is known, check route for mtu.
57 * size (usually 512 or the default IP max size, but no more than the mtu
61 * While looking at the routing entry, we also initialize other path-dependent
62 * parameters from pre-set or cached values in the routing entry.
118 tp->ccv->bytes_this_ack = BYTES_THIS_ACK(tp, th); in cc_ack_received()
[all …]
/openthread-latest/third_party/mbedtls/repo/programs/test/
Dselftest.c2 * Self-test demonstration program
5 * SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later
52 /* Sanity check for malloc. This is not expected to fail, and is rather
63 unsigned int buffer_4_size = 4097; /* Allocate more than the usual page size */ in calloc_self_test()
73 mbedtls_printf(" CALLOC(0,1): failed (mix of NULL and non-NULL)\n"); in calloc_self_test()
78 mbedtls_printf(" CALLOC(0,1): passed (same non-null)\n"); in calloc_self_test()
83 mbedtls_printf(" CALLOC(0,1): passed (distinct non-null)\n"); in calloc_self_test()
98 mbedtls_printf(" CALLOC(1,0): failed (mix of NULL and non-NULL)\n"); in calloc_self_test()
103 mbedtls_printf(" CALLOC(1,0): passed (same non-null)\n"); in calloc_self_test()
108 mbedtls_printf(" CALLOC(1,0): passed (distinct non-null)\n"); in calloc_self_test()
[all …]
/openthread-latest/third_party/mbedtls/repo/docs/
D3.0-migration-guide.md13 - Removal of many insecure or obsolete features
14 - Tidying up of configuration options (including removing some less useful options).
15 - Changing function signatures, e.g. adding return codes, adding extra parameters, or making some a…
16 - Removal of functions, macros, and types previously marked as deprecated.
29 So to generate the documentation, checkout the `mbedtls-2.28` branch and follow
30 …e [Documentation section of the README](https://github.com/Mbed-TLS/mbedtls/blob/mbedtls-2.28/READ…
36 [Rename mbedtls_*_ret...](#rename-mbedtls__ret-cryptography-functions-whose-deprecated-variants-hav…
66 …e public fields should be considered read-only, since modifying them may make the structure incons…
72 …lease open an [enhancement request against Mbed TLS](https://github.com/Mbed-TLS/mbedtls/issues/ne…
98 - In some functions that require a valid pointer, “parameter validation” checks
[all …]

12345678910