/openthread-latest/third_party/mbedtls/repo/tests/suites/ |
D | test_suite_alignment.function | 7 #pragma clang diagnostic ignored "-Wunreachable-code" 11 * Convert a string of the form "abcd" (case-insensitive) to a uint64_t. 23 *result |= ((uint64_t) raw[i]) << ((olen - i - 1) * 8); 31 void mbedtls_unaligned_access(int size, int offset) 33 /* Define 64-bit aligned raw byte array */ 42 TEST_ASSERT(size == 16 || size == 32 || size == 64); 45 switch (size) { 62 memcpy(&raw_aligned_64, ((uint8_t *) &raw) + offset, size / 8); 65 switch (size) { 80 for (size_t i = 0; i < (size_t) (size / 8); i++) { [all …]
|
D | test_suite_psa_crypto_storage_format.function | 31 PSA_ASSERT(psa_import_key(attributes, material->x, material->len, 36 /* Check that the key is represented as expected. */ 38 TEST_EQUAL(storage_info.size, expected_representation->len); 39 TEST_CALLOC(actual_representation, storage_info.size); 40 PSA_ASSERT(psa_its_get(uid, 0, storage_info.size, 42 TEST_MEMORY_COMPARE(expected_representation->x, expected_representation->len, 52 /** Check if a key is exportable. */ 105 * Hash-and-sign algorithms where the asymmetric part doesn't use 139 /** Write a key with the given representation to storage, then check 159 PSA_ASSERT(psa_its_set(uid, representation->len, representation->x, 0)); [all …]
|
D | test_suite_rsa.data | 4 RSA init-free-free 7 RSA init-free-init-free 152 # The following tests check whether the use of reduced length encodings (as mandated for DER in con… 153 # the verification of PKCS1 v1.5 signatures - this is relevant to prevent Bleichenbacher signature … 155 # to `mbedtls_rsa_rsassa_pkcs1_v15_encode` to force the use of non-reduced encodings in different p… 157 # Correct signature with DER-compliant reduced length encodings 162 # Non-reduced 1-byte length encoding in `DigestInfo` ASN.1 element 163 RSA PKCS1 Verify v1.5 non-reduced length encoding #1 167 # Non-reduced 2-byte length encoding for `digestAlgorithm` ASN.1 element 168 RSA PKCS1 Verify v1.5 non-reduced length encoding #2 [all …]
|
D | test_suite_dhm.function | 21 /* Sanity checks on a Diffie-Hellman parameter: check the length-value 22 * syntax and check that the value is the expected one (taken from the 26 size_t size, 36 TEST_ASSERT(size >= *offset + 2); 42 TEST_ASSERT(size >= *offset + n); 53 /* Sanity checks on Diffie-Hellman parameters: syntax, range, and comparison 61 /* Check that ctx->X and ctx->GX are within range. */ 62 TEST_ASSERT(mbedtls_mpi_cmp_int(&ctx->X, 1) > 0); 63 TEST_ASSERT(mbedtls_mpi_cmp_mpi(&ctx->X, &ctx->P) < 0); 64 TEST_ASSERT(mbedtls_mpi_size(&ctx->X) <= x_size); [all …]
|
/openthread-latest/src/cli/ |
D | README_COAPS.md | 1 # OpenThread CLI - CoAPS Example 13 CoAPS uses DTLS to establish a secure, end-to-end connection. 17 - TLS_PSK_WITH_AES_128_CCM_8 20 > coaps psk <your-psk> <your-psk-id> 24 - TLS_ECDHE_ECDSA_WITH_AES_128_CCM_8 33 On node 1, setup CoAPS server with resource `test-resource`. 38 > coaps resource test-resource 47 > coaps connect <peer-ip6-address> 50 > coaps get test-resource 53 > coaps put test-resource con payload [all …]
|
/openthread-latest/examples/platforms/utils/ |
D | uart_rtt.h | 37 #include "openthread-core-config.h" 73 * RTT up buffer size used for the uart. Only used if UART_RTT_BUFFER_INDEX 74 * is not 0. To configure buffer #0 size, check the BUFFER_SIZE_UP definition 84 * RTT down buffer size used for the uart. Only used if UART_RTT_BUFFER_INDEX 85 * is not 0. To configure buffer #0 size, check the BUFFER_SIZE_DOWN definition 95 * Size of the temporary buffer used when reading from the RTT channel. It will be
|
/openthread-latest/third_party/mbedtls/repo/include/mbedtls/ |
D | pk.h | 8 * SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later 36 #define MBEDTLS_ERR_PK_ALLOC_FAILED -0x3F80 38 #define MBEDTLS_ERR_PK_TYPE_MISMATCH -0x3F00 40 #define MBEDTLS_ERR_PK_BAD_INPUT_DATA -0x3E80 42 #define MBEDTLS_ERR_PK_FILE_IO_ERROR -0x3E00 44 #define MBEDTLS_ERR_PK_KEY_INVALID_VERSION -0x3D80 46 #define MBEDTLS_ERR_PK_KEY_INVALID_FORMAT -0x3D00 48 #define MBEDTLS_ERR_PK_UNKNOWN_PK_ALG -0x3C80 50 #define MBEDTLS_ERR_PK_PASSWORD_REQUIRED -0x3C00 52 #define MBEDTLS_ERR_PK_PASSWORD_MISMATCH -0x3B80 [all …]
|
D | x509.h | 8 * SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later 31 * That is, maximum length of the chain, excluding the end-entity certificate 45 #define MBEDTLS_ERR_X509_FEATURE_UNAVAILABLE -0x2080 47 #define MBEDTLS_ERR_X509_UNKNOWN_OID -0x2100 49 #define MBEDTLS_ERR_X509_INVALID_FORMAT -0x2180 51 #define MBEDTLS_ERR_X509_INVALID_VERSION -0x2200 53 #define MBEDTLS_ERR_X509_INVALID_SERIAL -0x2280 55 #define MBEDTLS_ERR_X509_INVALID_ALG -0x2300 57 #define MBEDTLS_ERR_X509_INVALID_NAME -0x2380 59 #define MBEDTLS_ERR_X509_INVALID_DATE -0x2400 [all …]
|
D | psa_util.h | 8 * SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later 46 * large. It is guaranteed to accept any output size 48 * maximum request size depends on the library 79 * \param[out] bits On success the bit size of the curve; 0 on failure. 94 * \param bits The bit-length of a private key on \p curve. 115 * \warning This function does not check if the algorithm is 132 * \warning This function does not check if the algorithm is 148 * \param bits Size of each coordinate in bits. 154 * \param der_size Size of \p der in bytes. It is enough if \p der_size 155 * is at least the size of the actual output. (The size [all …]
|
D | ecp.h | 9 * <em>RFC-4492: Elliptic Curve Cryptography (ECC) Cipher Suites 12 * <em>RFC-2409: The Internet Key Exchange (IKE)</em> defines ECP 19 * SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later 35 #define MBEDTLS_ERR_ECP_BAD_INPUT_DATA -0x4F80 37 #define MBEDTLS_ERR_ECP_BUFFER_TOO_SMALL -0x4F00 39 #define MBEDTLS_ERR_ECP_FEATURE_UNAVAILABLE -0x4E80 41 #define MBEDTLS_ERR_ECP_VERIFY_FAILED -0x4E00 43 #define MBEDTLS_ERR_ECP_ALLOC_FAILED -0x4D80 45 #define MBEDTLS_ERR_ECP_RANDOM_FAILED -0x4D00 47 #define MBEDTLS_ERR_ECP_INVALID_KEY -0x4C80 [all …]
|
/openthread-latest/src/core/common/ |
D | string.hpp | 37 #include "openthread-core-config.h" 51 * @addtogroup core-string 69 * Represents string encoding check when copying string. 73 kStringNoEncodingCheck, ///< Do not check the string encoding. 74 kStringCheckUtf8Encoding, ///< Validate that string follows UTF-8 encoding. 91 * Finds the first occurrence of a given character in a null-terminated string. 101 * Finds the first occurrence of a given sub-string in a null-terminated string. 104 * @param[in] aSubString A sub-string to search for. 113 * Checks whether a null-terminated string starts with a given prefix string. 125 * Checks whether a null-terminated string ends with a given character. [all …]
|
D | array.hpp | 37 #include "openthread-core-config.h" 65 * Returns a pointer to end of a given array (pointing to the past-the-end element). 67 …* Note that the past-the-end element is a theoretical element that would follow the last element i… 75 * @returns Pointer to the past-the-end element. 83 * Returns a pointer to end of a given array (pointing to the past-the-end element). 85 …* Note that the past-the-end element is a theoretical element that would follow the last element i… 93 * @returns Pointer to the past-the-end element. 101 * Represents an array of elements with a fixed max size. 104 * @tparam kMaxSize Specifies the max array size (maximum number of elements in the array). 105 …* @tparam SizeType The type to be used for array size, length, and index. If not specified, a d… [all …]
|
/openthread-latest/third_party/mbedtls/repo/tests/include/test/ |
D | psa_exercise_key.h | 1 /** Code to exercise a PSA key object, i.e. validate that it seems well-formed 6 * SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later 41 * in RSA PKCS#1v1.5 signatures. A RIPEMD160-only configuration would be 51 * For simplicity's sake, stick to block ciphers with 16-byte blocks. 68 * a block cipher-based MAC with #KNOWN_SUPPORTED_BLOCK_CIPHER. 113 * - HKDF: salt, info. 114 * - TKS 1.2 PRF, TLS 1.2 PSK-to-MS: seed, label. 115 * - PBKDF2: input cost, salt. 127 * or the key being destroyed mid-operation will only 143 * The result is discarded. The purpose of this function is to smoke-test a key. [all …]
|
/openthread-latest/tests/scripts/thread-cert/ |
D | run_cert_suite.py | 45 _BACKBONE_TESTS_DIR = 'tests/scripts/thread-cert/backbone' 53 '%(asctime)s - %(levelname)s - %(message)s') 56 def bash(cmd: str, check=True, stdout=None): argument 57 subprocess.run(cmd, shell=True, check=check, stdout=stdout) 85 logging.error("Run test %s failed, please check the log file: %s", test_name, logfile) 100 bash(f'docker rm -f $(docker ps -a -q -f "name=otbr_") 2>/dev/null || true') 101 bash(f'docker network rm $(docker network ls -q -f "name=backbone") 2>/dev/null || true') 117 parser.add_argument('--multiply', type=int, default=1, help='run each test for multiple times') 118 …parser.add_argument('--run-directory', type=str, default=None, help='run each test in the specifie… 140 def __init__(self, size: int): [all …]
|
/openthread-latest/.github/workflows/ |
D | size.yml | 29 name: Size 33 branches-ignore: 34 - 'dependabot/**' 37 - 'main' 40 …group: ${{ github.workflow }}-${{ github.event.pull_request.number || (github.repository == 'opent… 41 cancel-in-progress: true 48 size-report: 49 runs-on: ubuntu-24.04 51 - name: Harden Runner 52 uses: step-security/harden-runner@0080882f6c36860b6ba35c610c98ce87d4e2f26f # v2.10.2 [all …]
|
/openthread-latest/src/lib/spinel/ |
D | spi_frame.hpp | 46 * Each SPI frame starts with a 5-byte frame header: 48 * +---------+-----+----------+----------+ 50 * +---------+-----+----------+----------+ 52 * +---------+-----+----------+----------+ 54 * - "HDR": The first byte is the header byte (defined below) 55 * - "RECV_LEN": The second and third bytes indicate the largest frame 56 * size that that device is ready to receive. If zero, then the 58 * - "DATA_LEN": The fourth and fifth bytes indicate the size of the 60 * is equal-to or less-than the number of bytes that the other device 67 * +---+---+---+---+---+---+---+---+ [all …]
|
/openthread-latest/third_party/mbedtls/repo/library/ |
D | mps_reader.c | 5 * SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later 28 * and significantly increases the C-code line count, but 29 * should not increase the size of generated assembly. 41 * on failure - this in turn has two benefits: 48 * and/or non-sensical calls. 49 * Moreover, it might even reduce code-size because 59 if (rd->acc == NULL) { in mps_reader_is_accumulating() 63 acc_remaining = rd->acc_share.acc_remaining; in mps_reader_is_accumulating() 70 unsigned char *frag = rd->frag; in mps_reader_is_producing() 83 unsigned char *acc = rd->acc; in mps_reader_get_fragment_offset() [all …]
|
D | x509_crt.c | 5 * SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later 8 * The ITU-T X.509 standard defines a certificate format for PKI. 14 * http://www.itu.int/ITU-T/studygroups/com17/languages/X.680-0207.pdf 15 * http://www.itu.int/ITU-T/studygroups/com17/languages/X.690-0207.pdf 17 * [SIRO] https://cabforum.org/wp-content/uploads/Chunghwatelecom201503cabforumV4.pdf 81 * Max size of verification chain: end-entity + intermediates + trusted root 89 /* Hashes from SHA-256 and above. Note that this selection 96 /* Curves at or above 128-bit security level. Note that this selection 111 /* Next-generation profile. Currently identical to the default, but may 115 /* Hashes from SHA-256 and above. */ [all …]
|
D | psa_crypto_core.h | 6 * SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later 13 * Include the build-time configuration information header. Here, we do not 16 * TF-PSA-Crypto repository which has a different build system and 66 * docs/architecture/psa-thread-safety/psa-thread-safety.md. 80 * containing a given key ID, will only check slots whose state variable is 95 * A function must call psa_key_slot_has_readers(slot) to check if 106 * . In case of a multi-threaded application where one thread asks to close 163 * If multi-threading is enabled, the caller must hold the 172 return slot->registered_readers > 0; in psa_key_slot_has_readers() 185 return *((psa_key_slot_number_t *) (slot->key.data)); in psa_key_slot_get_slot_number() [all …]
|
/openthread-latest/third_party/mbedtls/repo/scripts/ |
D | code_size_compare.py | 4 This script is for comparing the size of the library files from two 12 # SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later 29 """Supported architecture for code size measurement.""" 32 ARMV8_M = 'armv8-m' 38 """Supported configuration for code size measurement.""" 40 TFM_MEDIUM = 'tfm-medium' 50 class CodeSizeDistinctInfo: # pylint: disable=too-few-public-methods 51 """Data structure to store possibly distinct information for code size 53 def __init__( #pylint: disable=too-many-arguments 61 ) -> None: [all …]
|
/openthread-latest/script/ |
D | check-size | 30 set -euo pipefail 32 OT_TMP_DIR=/tmp/ot-size-report 35 OT_SHA_NEW=${GITHUB_SHA:-$(git rev-parse HEAD)} 38 OT_SHA_OLD="$(git cat-file -p "${OT_SHA_NEW}" | grep 'parent ' | head -n1 | cut -d' ' -f2)" 47 OT_REPORTER="${OT_SIZE_REPORTER-}" 52 if arm-none-eabi-gcc --version | grep -q 'Arm Embedded Processors 7'; then 57 …wget --tries 4 --no-check-certificate --quiet https://developer.arm.com/-/media/Files/downloads/gn… 58 && tar xjf gcc-arm-none-eabi-7-2018-q2-update-linux.tar.bz2) 59 export PATH=/tmp/gcc-arm-none-eabi-7-2018-q2-update/bin:$PATH 61 arm-none-eabi-gcc --version [all …]
|
/openthread-latest/third_party/mbedtls/repo/ |
D | ChangeLog | 3 = Mbed TLS 3.6.0 branch released 2024-03-28 42 * Support Armv8-A Crypto Extension acceleration for SHA-256 43 when compiling for Thumb (T32) or 32-bit Arm (A32). 44 * AES-NI is now supported in Windows builds with clang and clang-cl. 50 This affects both the low-level modules and the high-level APIs 53 * Support use of Armv8-A Cryptographic Extensions for hardware acclerated 54 AES when compiling for Thumb (T32) or 32-bit Arm (A32). 56 library without the corresponding built-in implementation. Generally 58 or they'll both be built in. However, for CCM and GCM the built-in 61 docs/driver-only-builds.md for full details and current limitations. [all …]
|
/openthread-latest/third_party/tcplp/bsdtcp/ |
D | tcp_input.c | 1 /*- 4 * Copyright (c) 2007-2008,2010 6 * Copyright (c) 2009-2010 Lawrence Stewart <lstewart@freebsd.org> 8 * Copyright (c) 2010-2011 Juniper Networks, Inc. 52 * Determine a reasonable value for maxseg size. 53 * If the route is known, check route for mtu. 57 * size (usually 512 or the default IP max size, but no more than the mtu 61 * While looking at the routing entry, we also initialize other path-dependent 62 * parameters from pre-set or cached values in the routing entry. 118 tp->ccv->bytes_this_ack = BYTES_THIS_ACK(tp, th); in cc_ack_received() [all …]
|
/openthread-latest/third_party/mbedtls/repo/programs/test/ |
D | selftest.c | 2 * Self-test demonstration program 5 * SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later 52 /* Sanity check for malloc. This is not expected to fail, and is rather 63 unsigned int buffer_4_size = 4097; /* Allocate more than the usual page size */ in calloc_self_test() 73 mbedtls_printf(" CALLOC(0,1): failed (mix of NULL and non-NULL)\n"); in calloc_self_test() 78 mbedtls_printf(" CALLOC(0,1): passed (same non-null)\n"); in calloc_self_test() 83 mbedtls_printf(" CALLOC(0,1): passed (distinct non-null)\n"); in calloc_self_test() 98 mbedtls_printf(" CALLOC(1,0): failed (mix of NULL and non-NULL)\n"); in calloc_self_test() 103 mbedtls_printf(" CALLOC(1,0): passed (same non-null)\n"); in calloc_self_test() 108 mbedtls_printf(" CALLOC(1,0): passed (distinct non-null)\n"); in calloc_self_test() [all …]
|
/openthread-latest/third_party/mbedtls/repo/docs/ |
D | 3.0-migration-guide.md | 13 - Removal of many insecure or obsolete features 14 - Tidying up of configuration options (including removing some less useful options). 15 - Changing function signatures, e.g. adding return codes, adding extra parameters, or making some a… 16 - Removal of functions, macros, and types previously marked as deprecated. 29 So to generate the documentation, checkout the `mbedtls-2.28` branch and follow 30 …e [Documentation section of the README](https://github.com/Mbed-TLS/mbedtls/blob/mbedtls-2.28/READ… 36 [Rename mbedtls_*_ret...](#rename-mbedtls__ret-cryptography-functions-whose-deprecated-variants-hav… 66 …e public fields should be considered read-only, since modifying them may make the structure incons… 72 …lease open an [enhancement request against Mbed TLS](https://github.com/Mbed-TLS/mbedtls/issues/ne… 98 - In some functions that require a valid pointer, “parameter validation” checks [all …]
|