Home
last modified time | relevance | path

Searched full:status (Results 1 – 25 of 239) sorted by relevance

12345678910

/openthread-2.7.6/third_party/mbedtls/repo/programs/psa/
Dcrypto_examples.c69 psa_status_t status; in cipher_operation() local
79 status = psa_cipher_update( operation, input + bytes_written, in cipher_operation()
82 ASSERT_STATUS( status, PSA_SUCCESS ); in cipher_operation()
88 status = psa_cipher_finish( operation, output + *output_len, in cipher_operation()
90 ASSERT_STATUS( status, PSA_SUCCESS ); in cipher_operation()
94 return( status ); in cipher_operation()
108 psa_status_t status; in cipher_encrypt() local
113 status = psa_cipher_encrypt_setup( &operation, key, alg ); in cipher_encrypt()
114 ASSERT_STATUS( status, PSA_SUCCESS ); in cipher_encrypt()
116 status = psa_cipher_generate_iv( &operation, iv, iv_size, &iv_len ); in cipher_encrypt()
[all …]
Dkey_ladder_demo.c92 status = DEMO_ERROR; \
102 status = ( expr ); \
103 if( status != PSA_SUCCESS ) \
106 (int) status, \
175 psa_status_t status = PSA_SUCCESS; in save_key() local
191 return( status ); in save_key()
201 psa_status_t status = PSA_SUCCESS; in generate() local
217 return( status ); in generate()
230 psa_status_t status = PSA_SUCCESS; in import_key_from_file() local
244 status = DEMO_ERROR; in import_key_from_file()
[all …]
/openthread-2.7.6/third_party/mbedtls/repo/tests/suites/
Dtest_suite_psa_crypto_entropy.function46 psa_status_t status;
66 status = remove_seed_file( );
67 TEST_ASSERT( ( status == PSA_SUCCESS ) ||
68 ( status == PSA_ERROR_DOES_NOT_EXIST ) );
69 status = mbedtls_psa_inject_entropy( seed, seed_length_a );
70 TEST_EQUAL( status, expected_status_a );
71 status = mbedtls_psa_inject_entropy( seed, seed_length_b );
72 TEST_EQUAL( status, expected_status_b );
87 psa_status_t status;
95 status = remove_seed_file( );
[all …]
Dtest_suite_psa_crypto_driver_wrappers.function297 psa_status_t status;
352 status = psa_cipher_finish( &operation,
362 TEST_EQUAL( status, expected_status );
562 psa_status_t status;
617 status = psa_cipher_finish( &operation,
626 TEST_EQUAL( status, expected_status );
651 psa_status_t status;
675 status = psa_cipher_encrypt_setup( &operation, key, alg );
678 TEST_EQUAL( status, test_driver_cipher_hooks.forced_status );
680 status = psa_cipher_set_iv( &operation, iv->x, iv->len );
[all …]
Dtest_suite_psa_crypto_init.function139 psa_status_t status;
143 status = psa_crypto_init( );
144 PSA_ASSERT( status );
145 status = psa_crypto_init( );
146 PSA_ASSERT( status );
168 psa_status_t status;
173 status = psa_crypto_init( );
174 PSA_ASSERT( status );
177 status = psa_generate_random( random, sizeof( random ) );
178 TEST_EQUAL( status, PSA_ERROR_BAD_STATE );
[all …]
Dtest_suite_psa_crypto_se_driver_hal.function56 * In case of error, this macro sets `status` and jumps to the
66 status = PSA_ERROR_DETECTED_BY_DRIVER; \
76 * status, call test_fail() then jump to `exit`.
126 psa_status_t status;
145 return( validate_slot_number_directions.status );
294 psa_status_t status;
306 status = ram_create_common( context, slot_number, attributes,
308 return( status );
319 psa_status_t status = ram_create_common( context, slot_number, attributes,
321 if( status != PSA_SUCCESS )
[all …]
Dtest_suite_psa_crypto.function263 psa_status_t status = psa_get_key_slot_number( &attributes, &slot_number );
269 TEST_EQUAL( status, 0 );
274 TEST_EQUAL( status, PSA_ERROR_INVALID_ARGUMENT );
309 psa_status_t *status )
319 *status = psa_mac_sign_setup( operation, key, alg );
324 if( *status != PSA_SUCCESS )
326 TEST_EQUAL( psa_mac_sign_setup( operation, key, alg ), *status );
342 psa_status_t *status )
352 *status = psa_cipher_encrypt_setup( operation, key, alg );
357 if( *status != PSA_SUCCESS )
[all …]
/openthread-2.7.6/third_party/mbedtls/repo/library/
Dpsa_crypto.c523 psa_status_t status; in psa_check_rsa_key_byte_aligned() local
525 status = mbedtls_to_psa_error( in psa_check_rsa_key_byte_aligned()
527 if( status == PSA_SUCCESS ) in psa_check_rsa_key_byte_aligned()
530 status = PSA_ERROR_NOT_SUPPORTED; in psa_check_rsa_key_byte_aligned()
533 return( status ); in psa_check_rsa_key_byte_aligned()
551 psa_status_t status; in psa_load_rsa_representation() local
558 status = mbedtls_to_psa_error( in psa_load_rsa_representation()
561 status = mbedtls_to_psa_error( in psa_load_rsa_representation()
563 if( status != PSA_SUCCESS ) in psa_load_rsa_representation()
570 status = PSA_ERROR_INVALID_ARGUMENT; in psa_load_rsa_representation()
[all …]
Dpsa_crypto_slot_management.c105 psa_status_t status = PSA_ERROR_CORRUPTION_DETECTED; in psa_get_and_lock_key_slot_in_memory() local
122 status = mbedtls_svc_key_id_equal( key, slot->attr.id ) ? in psa_get_and_lock_key_slot_in_memory()
127 status = psa_validate_key_id( key, 1 ); in psa_get_and_lock_key_slot_in_memory()
128 if( status != PSA_SUCCESS ) in psa_get_and_lock_key_slot_in_memory()
129 return( status ); in psa_get_and_lock_key_slot_in_memory()
137 status = ( slot_idx < PSA_KEY_SLOT_COUNT ) ? in psa_get_and_lock_key_slot_in_memory()
141 if( status == PSA_SUCCESS ) in psa_get_and_lock_key_slot_in_memory()
143 status = psa_lock_key_slot( slot ); in psa_get_and_lock_key_slot_in_memory()
144 if( status == PSA_SUCCESS ) in psa_get_and_lock_key_slot_in_memory()
148 return( status ); in psa_get_and_lock_key_slot_in_memory()
[all …]
Dpsa_crypto_storage.c100 psa_status_t status; in psa_crypto_storage_load() local
105 status = psa_its_get_info( data_identifier, &data_identifier_info ); in psa_crypto_storage_load()
106 if( status != PSA_SUCCESS ) in psa_crypto_storage_load()
107 return( status ); in psa_crypto_storage_load()
109 status = psa_its_get( data_identifier, 0, (uint32_t) data_size, data, &data_length ); in psa_crypto_storage_load()
113 return( status ); in psa_crypto_storage_load()
149 psa_status_t status; in psa_crypto_storage_store() local
156 status = psa_its_set( data_identifier, (uint32_t) data_length, data, 0 ); in psa_crypto_storage_store()
157 if( status != PSA_SUCCESS ) in psa_crypto_storage_store()
162 status = psa_its_get_info( data_identifier, &data_identifier_info ); in psa_crypto_storage_store()
[all …]
Dpsa_crypto_driver_wrappers.c93 psa_status_t status = PSA_ERROR_INVALID_ARGUMENT; in psa_driver_wrapper_sign_hash() local
105 status = test_transparent_signature_sign_hash( &attributes, in psa_driver_wrapper_sign_hash()
115 if( status != PSA_ERROR_NOT_SUPPORTED ) in psa_driver_wrapper_sign_hash()
116 return( status ); in psa_driver_wrapper_sign_hash()
135 return( status ); in psa_driver_wrapper_sign_hash()
184 psa_status_t status = PSA_ERROR_INVALID_ARGUMENT; in psa_driver_wrapper_verify_hash() local
196 status = test_transparent_signature_verify_hash( &attributes, in psa_driver_wrapper_verify_hash()
205 if( status != PSA_ERROR_NOT_SUPPORTED ) in psa_driver_wrapper_verify_hash()
206 return( status ); in psa_driver_wrapper_verify_hash()
224 return( status ); in psa_driver_wrapper_verify_hash()
[all …]
Dpsa_its_file.c130 psa_status_t status; in psa_its_get_info() local
132 status = psa_its_read_file( uid, p_info, &stream ); in psa_its_get_info()
135 return( status ); in psa_its_get_info()
144 psa_status_t status; in psa_its_get() local
149 status = psa_its_read_file( uid, &info, &stream ); in psa_its_get()
150 if( status != PSA_SUCCESS ) in psa_its_get()
152 status = PSA_ERROR_INVALID_ARGUMENT; in psa_its_get()
162 status = PSA_ERROR_STORAGE_FAILURE; in psa_its_get()
176 status = PSA_SUCCESS; in psa_its_get()
183 return( status ); in psa_its_get()
[all …]
Dpsa_crypto_se.c145 psa_status_t status; in psa_load_se_persistent_data() local
149 status = psa_get_se_driver_its_file_uid( driver, &uid ); in psa_load_se_persistent_data()
150 if( status != PSA_SUCCESS ) in psa_load_se_persistent_data()
151 return( status ); in psa_load_se_persistent_data()
169 psa_status_t status; in psa_save_se_persistent_data() local
172 status = psa_get_se_driver_its_file_uid( driver, &uid ); in psa_save_se_persistent_data()
173 if( status != PSA_SUCCESS ) in psa_save_se_persistent_data()
174 return( status ); in psa_save_se_persistent_data()
200 psa_status_t status; in psa_find_se_slot_for_key() local
222 status = p_validate_slot_number( &driver->u.context, in psa_find_se_slot_for_key()
[all …]
/openthread-2.7.6/third_party/mbedtls/repo/docs/
Dgetting_started.md77 psa_status_t status;
85 status = psa_crypto_init();
86 if (status != PSA_SUCCESS) {
98 status = psa_import_key(&attributes, key, key_len, &key);
99 if (status != PSA_SUCCESS) {
130 psa_status_t status;
144 status = psa_crypto_init();
145 if (status != PSA_SUCCESS) {
157 status = psa_import_key(&attributes, key, key_len, &key);
158 if (status != PSA_SUCCESS) {
[all …]
/openthread-2.7.6/src/lib/spinel/
Dspinel_encoder.hpp110 …* property fails and the property key should be switched to `LAST_STATUS` with an error status, th…
130 * `SPINEL_PROP_LAST_STATUS` and writes the given spinel status error.
132 * @param[in] aStatus Spinel error status
144 * does nothing and returns error status `OT_ERROR_INVALID_STATE`.
146 … no buffer space is available, this method will discard and clear the frame and return error status
163 * method does nothing and returns error status `OT_ERROR_INVALID_STATE`.
166 * error status `OT_ERROR_NO_BUFS`.
181 * method does nothing and returns error status `OT_ERROR_INVALID_STATE`.
184 * error status `OT_ERROR_NO_BUFS`.
199 * method does nothing and returns error status `OT_ERROR_INVALID_STATE`.
[all …]
/openthread-2.7.6/third_party/mbedtls/repo/tests/src/drivers/
Dkey_management.c108 psa_status_t status = mbedtls_to_psa_error( in test_transparent_generate_key() local
111 if( status == PSA_SUCCESS ) in test_transparent_generate_key()
121 return( status ); in test_transparent_generate_key()
160 psa_status_t status = PSA_ERROR_CORRUPTION_DETECTED; in test_transparent_validate_key() local
207 status = mbedtls_to_psa_error( in test_transparent_validate_key()
209 if( status != PSA_SUCCESS ) in test_transparent_validate_key()
216 status = mbedtls_to_psa_error( in test_transparent_validate_key()
220 if( status != PSA_SUCCESS ) in test_transparent_validate_key()
224 status = mbedtls_to_psa_error( in test_transparent_validate_key()
230 status = mbedtls_to_psa_error( in test_transparent_validate_key()
[all …]
Dcipher.c39 * status is not overridden through the hooks) is to take care of all AES-CTR
323 psa_status_t status; in test_transparent_cipher_generate_iv() local
341 status = mbedtls_to_psa_error( in test_transparent_cipher_generate_iv()
345 if( status != PSA_SUCCESS ) in test_transparent_cipher_generate_iv()
346 return( status ); in test_transparent_cipher_generate_iv()
349 status = test_transparent_cipher_set_iv( operation, iv, *iv_length ); in test_transparent_cipher_generate_iv()
351 return( status ); in test_transparent_cipher_generate_iv()
359 psa_status_t status; in test_transparent_cipher_set_iv() local
375 status = mbedtls_to_psa_error( in test_transparent_cipher_set_iv()
378 if( status == PSA_SUCCESS ) in test_transparent_cipher_set_iv()
[all …]
Dsignature.c67 psa_status_t status = PSA_ERROR_NOT_SUPPORTED; in test_transparent_signature_sign_hash() local
99 status = PSA_ERROR_GENERIC_ERROR; in test_transparent_signature_sign_hash()
116 status = PSA_ERROR_BUFFER_TOO_SMALL; in test_transparent_signature_sign_hash()
128 status = mbedtls_to_psa_error( ret ); in test_transparent_signature_sign_hash()
132 if( status == PSA_SUCCESS ) in test_transparent_signature_sign_hash()
145 return( status ); in test_transparent_signature_sign_hash()
179 psa_status_t status = PSA_ERROR_NOT_SUPPORTED; in test_transparent_signature_verify_hash() local
211 status = PSA_ERROR_GENERIC_ERROR; in test_transparent_signature_verify_hash()
227 status = PSA_ERROR_BUFFER_TOO_SMALL; in test_transparent_signature_verify_hash()
253 status = mbedtls_to_psa_error( ret ); in test_transparent_signature_verify_hash()
[all …]
/openthread-2.7.6/src/core/diags/
DREADME.md21 Show diagnostics mode status.
35 status 0x00
54 status 0x00
73 status 0x00
85 status 0x00
97 status 0x00
107 status 0x00
117 status 0x00
127 status 0x00
172 status 0x00
/openthread-2.7.6/tests/scripts/thread-cert/
Dv1_2_LowPower_test_forward_tracking_series.py77 # Child should get a response with status 0 (SUCCESS).
82 # Child should get a response with status 2 (SERIES_ID_ALREADY_REGISTERED).
87 # Child should get a report with status 3 (SERIES_ID_NOT_RECOGNIZED).
92 # Child should get a report with status 4 (NO_MATCHING_FRAMES_RECEIVED).
97 # Child should get a response with status 3 (SERIES_ID_NOT_RECOGNIZED).
102 # Child should get a response with status 0 (SUCCESS).
108 # Child should get a response with status 0 (SUCCESS).
126 # 1. Child should get a response with status 0 (SUCCESS).
133 # 2. Child should get a response with status 2 (SERIES_ID_ALREADY_REGISTERED).
140 # 3. Child should get a report with status 3 (SERIES_ID_NOT_RECOGNIZED).
[all …]
Dnetwork_layer.py43 STATUS = 4 variable in TlvType
162 class Status(object): class
164 def __init__(self, status): argument
165 self._status = status
168 def status(self): member in Status
173 return self.status == other.status
176 return "Status(status={})".format(self.status)
182 status = StatusValues(ord(data.read(1)))
184 return Status(status)
Dtest_network_layer.py260 status = any_status()
262 status_obj = network_layer.Status(status)
265 actual_status = status_obj.status
268 self.assertEqual(status, actual_status)
272 status = any_status()
274 status_obj = network_layer.Status(status)
277 self.assertEqual(status_obj, network_layer.Status(status))
284 status = any_status()
288 data = bytearray([status])
294 self.assertTrue(isinstance(status_obj, network_layer.Status))
[all …]
/openthread-2.7.6/src/core/thread/
Dlink_metrics.cpp336 Error LinkMetrics::HandleManagementRequest(const Message &aMessage, Neighbor &aNeighbor, Status &aS… in HandleManagementRequest()
412 Status status; in HandleManagementResponse() local
427 VerifyOrExit(tlv.GetLength() == sizeof(status), error = kErrorParse); in HandleManagementResponse()
428 SuccessOrExit(aMessage.Read(offset + index + sizeof(tlv), status)); in HandleManagementResponse()
441 mMgmtResponseCallback(&aAddress, status, mMgmtResponseCallbackContext); in HandleManagementResponse()
461 Status status; in HandleReport() local
480 // There should be either: one Status TLV or some Report-Sub TLVs in HandleReport()
482 VerifyOrExit(tlv.GetLength() == sizeof(status), error = kErrorParse); in HandleReport()
483 SuccessOrExit(aMessage.Read(pos, status)); in HandleReport()
485 pos += sizeof(status); in HandleReport()
[all …]
/openthread-2.7.6/include/openthread/platform/
Dotns.h57 * This function exports status information to OTNS.
59 …* The status information is represented by a null-terminated string with format recognizable by OT…
61 * Each status contains key and value separated by '='.
62 * Status value can be further separated into multiple fields using ',',
69 * @param[in] aStatus The status string.
/openthread-2.7.6/src/core/backbone_router/
Dbbr_manager.cpp160 ThreadStatusTlv::MlrStatus status = ThreadStatusTlv::kMlrSuccess; in HandleMulticastListenerRegistration() local
181 ExitNow(status = mMlrResponseStatus); in HandleMulticastListenerRegistration()
185 VerifyOrExit(isPrimary, status = ThreadStatusTlv::kMlrBbrNotPrimary); in HandleMulticastListenerRegistration()
197 status = ThreadStatusTlv::kMlrGeneralFailure); in HandleMulticastListenerRegistration()
207 …VerifyOrExit(addressesLength % sizeof(Ip6::Address) == 0, status = ThreadStatusTlv::kMlrGeneralFai… in HandleMulticastListenerRegistration()
209 status = ThreadStatusTlv::kMlrGeneralFailure); in HandleMulticastListenerRegistration()
219 VerifyOrExit(timeout < UINT32_MAX, status = ThreadStatusTlv::kMlrNoPersistent); in HandleMulticastListenerRegistration()
255 if (status == ThreadStatusTlv::kMlrSuccess) in HandleMulticastListenerRegistration()
257 status = ThreadStatusTlv::kMlrInvalid; in HandleMulticastListenerRegistration()
261 if (status == ThreadStatusTlv::kMlrSuccess) in HandleMulticastListenerRegistration()
[all …]

12345678910