/openthread-2.7.6/third_party/mbedtls/repo/programs/psa/ |
D | crypto_examples.c | 69 psa_status_t status; in cipher_operation() local 79 status = psa_cipher_update( operation, input + bytes_written, in cipher_operation() 82 ASSERT_STATUS( status, PSA_SUCCESS ); in cipher_operation() 88 status = psa_cipher_finish( operation, output + *output_len, in cipher_operation() 90 ASSERT_STATUS( status, PSA_SUCCESS ); in cipher_operation() 94 return( status ); in cipher_operation() 108 psa_status_t status; in cipher_encrypt() local 113 status = psa_cipher_encrypt_setup( &operation, key, alg ); in cipher_encrypt() 114 ASSERT_STATUS( status, PSA_SUCCESS ); in cipher_encrypt() 116 status = psa_cipher_generate_iv( &operation, iv, iv_size, &iv_len ); in cipher_encrypt() [all …]
|
D | key_ladder_demo.c | 92 status = DEMO_ERROR; \ 102 status = ( expr ); \ 103 if( status != PSA_SUCCESS ) \ 106 (int) status, \ 175 psa_status_t status = PSA_SUCCESS; in save_key() local 191 return( status ); in save_key() 201 psa_status_t status = PSA_SUCCESS; in generate() local 217 return( status ); in generate() 230 psa_status_t status = PSA_SUCCESS; in import_key_from_file() local 244 status = DEMO_ERROR; in import_key_from_file() [all …]
|
/openthread-2.7.6/third_party/mbedtls/repo/tests/suites/ |
D | test_suite_psa_crypto_entropy.function | 46 psa_status_t status; 66 status = remove_seed_file( ); 67 TEST_ASSERT( ( status == PSA_SUCCESS ) || 68 ( status == PSA_ERROR_DOES_NOT_EXIST ) ); 69 status = mbedtls_psa_inject_entropy( seed, seed_length_a ); 70 TEST_EQUAL( status, expected_status_a ); 71 status = mbedtls_psa_inject_entropy( seed, seed_length_b ); 72 TEST_EQUAL( status, expected_status_b ); 87 psa_status_t status; 95 status = remove_seed_file( ); [all …]
|
D | test_suite_psa_crypto_driver_wrappers.function | 297 psa_status_t status; 352 status = psa_cipher_finish( &operation, 362 TEST_EQUAL( status, expected_status ); 562 psa_status_t status; 617 status = psa_cipher_finish( &operation, 626 TEST_EQUAL( status, expected_status ); 651 psa_status_t status; 675 status = psa_cipher_encrypt_setup( &operation, key, alg ); 678 TEST_EQUAL( status, test_driver_cipher_hooks.forced_status ); 680 status = psa_cipher_set_iv( &operation, iv->x, iv->len ); [all …]
|
D | test_suite_psa_crypto_init.function | 139 psa_status_t status; 143 status = psa_crypto_init( ); 144 PSA_ASSERT( status ); 145 status = psa_crypto_init( ); 146 PSA_ASSERT( status ); 168 psa_status_t status; 173 status = psa_crypto_init( ); 174 PSA_ASSERT( status ); 177 status = psa_generate_random( random, sizeof( random ) ); 178 TEST_EQUAL( status, PSA_ERROR_BAD_STATE ); [all …]
|
D | test_suite_psa_crypto_se_driver_hal.function | 56 * In case of error, this macro sets `status` and jumps to the 66 status = PSA_ERROR_DETECTED_BY_DRIVER; \ 76 * status, call test_fail() then jump to `exit`. 126 psa_status_t status; 145 return( validate_slot_number_directions.status ); 294 psa_status_t status; 306 status = ram_create_common( context, slot_number, attributes, 308 return( status ); 319 psa_status_t status = ram_create_common( context, slot_number, attributes, 321 if( status != PSA_SUCCESS ) [all …]
|
D | test_suite_psa_crypto.function | 263 psa_status_t status = psa_get_key_slot_number( &attributes, &slot_number ); 269 TEST_EQUAL( status, 0 ); 274 TEST_EQUAL( status, PSA_ERROR_INVALID_ARGUMENT ); 309 psa_status_t *status ) 319 *status = psa_mac_sign_setup( operation, key, alg ); 324 if( *status != PSA_SUCCESS ) 326 TEST_EQUAL( psa_mac_sign_setup( operation, key, alg ), *status ); 342 psa_status_t *status ) 352 *status = psa_cipher_encrypt_setup( operation, key, alg ); 357 if( *status != PSA_SUCCESS ) [all …]
|
/openthread-2.7.6/third_party/mbedtls/repo/library/ |
D | psa_crypto.c | 523 psa_status_t status; in psa_check_rsa_key_byte_aligned() local 525 status = mbedtls_to_psa_error( in psa_check_rsa_key_byte_aligned() 527 if( status == PSA_SUCCESS ) in psa_check_rsa_key_byte_aligned() 530 status = PSA_ERROR_NOT_SUPPORTED; in psa_check_rsa_key_byte_aligned() 533 return( status ); in psa_check_rsa_key_byte_aligned() 551 psa_status_t status; in psa_load_rsa_representation() local 558 status = mbedtls_to_psa_error( in psa_load_rsa_representation() 561 status = mbedtls_to_psa_error( in psa_load_rsa_representation() 563 if( status != PSA_SUCCESS ) in psa_load_rsa_representation() 570 status = PSA_ERROR_INVALID_ARGUMENT; in psa_load_rsa_representation() [all …]
|
D | psa_crypto_slot_management.c | 105 psa_status_t status = PSA_ERROR_CORRUPTION_DETECTED; in psa_get_and_lock_key_slot_in_memory() local 122 status = mbedtls_svc_key_id_equal( key, slot->attr.id ) ? in psa_get_and_lock_key_slot_in_memory() 127 status = psa_validate_key_id( key, 1 ); in psa_get_and_lock_key_slot_in_memory() 128 if( status != PSA_SUCCESS ) in psa_get_and_lock_key_slot_in_memory() 129 return( status ); in psa_get_and_lock_key_slot_in_memory() 137 status = ( slot_idx < PSA_KEY_SLOT_COUNT ) ? in psa_get_and_lock_key_slot_in_memory() 141 if( status == PSA_SUCCESS ) in psa_get_and_lock_key_slot_in_memory() 143 status = psa_lock_key_slot( slot ); in psa_get_and_lock_key_slot_in_memory() 144 if( status == PSA_SUCCESS ) in psa_get_and_lock_key_slot_in_memory() 148 return( status ); in psa_get_and_lock_key_slot_in_memory() [all …]
|
D | psa_crypto_storage.c | 100 psa_status_t status; in psa_crypto_storage_load() local 105 status = psa_its_get_info( data_identifier, &data_identifier_info ); in psa_crypto_storage_load() 106 if( status != PSA_SUCCESS ) in psa_crypto_storage_load() 107 return( status ); in psa_crypto_storage_load() 109 status = psa_its_get( data_identifier, 0, (uint32_t) data_size, data, &data_length ); in psa_crypto_storage_load() 113 return( status ); in psa_crypto_storage_load() 149 psa_status_t status; in psa_crypto_storage_store() local 156 status = psa_its_set( data_identifier, (uint32_t) data_length, data, 0 ); in psa_crypto_storage_store() 157 if( status != PSA_SUCCESS ) in psa_crypto_storage_store() 162 status = psa_its_get_info( data_identifier, &data_identifier_info ); in psa_crypto_storage_store() [all …]
|
D | psa_crypto_driver_wrappers.c | 93 psa_status_t status = PSA_ERROR_INVALID_ARGUMENT; in psa_driver_wrapper_sign_hash() local 105 status = test_transparent_signature_sign_hash( &attributes, in psa_driver_wrapper_sign_hash() 115 if( status != PSA_ERROR_NOT_SUPPORTED ) in psa_driver_wrapper_sign_hash() 116 return( status ); in psa_driver_wrapper_sign_hash() 135 return( status ); in psa_driver_wrapper_sign_hash() 184 psa_status_t status = PSA_ERROR_INVALID_ARGUMENT; in psa_driver_wrapper_verify_hash() local 196 status = test_transparent_signature_verify_hash( &attributes, in psa_driver_wrapper_verify_hash() 205 if( status != PSA_ERROR_NOT_SUPPORTED ) in psa_driver_wrapper_verify_hash() 206 return( status ); in psa_driver_wrapper_verify_hash() 224 return( status ); in psa_driver_wrapper_verify_hash() [all …]
|
D | psa_its_file.c | 130 psa_status_t status; in psa_its_get_info() local 132 status = psa_its_read_file( uid, p_info, &stream ); in psa_its_get_info() 135 return( status ); in psa_its_get_info() 144 psa_status_t status; in psa_its_get() local 149 status = psa_its_read_file( uid, &info, &stream ); in psa_its_get() 150 if( status != PSA_SUCCESS ) in psa_its_get() 152 status = PSA_ERROR_INVALID_ARGUMENT; in psa_its_get() 162 status = PSA_ERROR_STORAGE_FAILURE; in psa_its_get() 176 status = PSA_SUCCESS; in psa_its_get() 183 return( status ); in psa_its_get() [all …]
|
D | psa_crypto_se.c | 145 psa_status_t status; in psa_load_se_persistent_data() local 149 status = psa_get_se_driver_its_file_uid( driver, &uid ); in psa_load_se_persistent_data() 150 if( status != PSA_SUCCESS ) in psa_load_se_persistent_data() 151 return( status ); in psa_load_se_persistent_data() 169 psa_status_t status; in psa_save_se_persistent_data() local 172 status = psa_get_se_driver_its_file_uid( driver, &uid ); in psa_save_se_persistent_data() 173 if( status != PSA_SUCCESS ) in psa_save_se_persistent_data() 174 return( status ); in psa_save_se_persistent_data() 200 psa_status_t status; in psa_find_se_slot_for_key() local 222 status = p_validate_slot_number( &driver->u.context, in psa_find_se_slot_for_key() [all …]
|
/openthread-2.7.6/third_party/mbedtls/repo/docs/ |
D | getting_started.md | 77 psa_status_t status; 85 status = psa_crypto_init(); 86 if (status != PSA_SUCCESS) { 98 status = psa_import_key(&attributes, key, key_len, &key); 99 if (status != PSA_SUCCESS) { 130 psa_status_t status; 144 status = psa_crypto_init(); 145 if (status != PSA_SUCCESS) { 157 status = psa_import_key(&attributes, key, key_len, &key); 158 if (status != PSA_SUCCESS) { [all …]
|
/openthread-2.7.6/src/lib/spinel/ |
D | spinel_encoder.hpp | 110 …* property fails and the property key should be switched to `LAST_STATUS` with an error status, th… 130 * `SPINEL_PROP_LAST_STATUS` and writes the given spinel status error. 132 * @param[in] aStatus Spinel error status 144 * does nothing and returns error status `OT_ERROR_INVALID_STATE`. 146 … no buffer space is available, this method will discard and clear the frame and return error status 163 * method does nothing and returns error status `OT_ERROR_INVALID_STATE`. 166 * error status `OT_ERROR_NO_BUFS`. 181 * method does nothing and returns error status `OT_ERROR_INVALID_STATE`. 184 * error status `OT_ERROR_NO_BUFS`. 199 * method does nothing and returns error status `OT_ERROR_INVALID_STATE`. [all …]
|
/openthread-2.7.6/third_party/mbedtls/repo/tests/src/drivers/ |
D | key_management.c | 108 psa_status_t status = mbedtls_to_psa_error( in test_transparent_generate_key() local 111 if( status == PSA_SUCCESS ) in test_transparent_generate_key() 121 return( status ); in test_transparent_generate_key() 160 psa_status_t status = PSA_ERROR_CORRUPTION_DETECTED; in test_transparent_validate_key() local 207 status = mbedtls_to_psa_error( in test_transparent_validate_key() 209 if( status != PSA_SUCCESS ) in test_transparent_validate_key() 216 status = mbedtls_to_psa_error( in test_transparent_validate_key() 220 if( status != PSA_SUCCESS ) in test_transparent_validate_key() 224 status = mbedtls_to_psa_error( in test_transparent_validate_key() 230 status = mbedtls_to_psa_error( in test_transparent_validate_key() [all …]
|
D | cipher.c | 39 * status is not overridden through the hooks) is to take care of all AES-CTR 323 psa_status_t status; in test_transparent_cipher_generate_iv() local 341 status = mbedtls_to_psa_error( in test_transparent_cipher_generate_iv() 345 if( status != PSA_SUCCESS ) in test_transparent_cipher_generate_iv() 346 return( status ); in test_transparent_cipher_generate_iv() 349 status = test_transparent_cipher_set_iv( operation, iv, *iv_length ); in test_transparent_cipher_generate_iv() 351 return( status ); in test_transparent_cipher_generate_iv() 359 psa_status_t status; in test_transparent_cipher_set_iv() local 375 status = mbedtls_to_psa_error( in test_transparent_cipher_set_iv() 378 if( status == PSA_SUCCESS ) in test_transparent_cipher_set_iv() [all …]
|
D | signature.c | 67 psa_status_t status = PSA_ERROR_NOT_SUPPORTED; in test_transparent_signature_sign_hash() local 99 status = PSA_ERROR_GENERIC_ERROR; in test_transparent_signature_sign_hash() 116 status = PSA_ERROR_BUFFER_TOO_SMALL; in test_transparent_signature_sign_hash() 128 status = mbedtls_to_psa_error( ret ); in test_transparent_signature_sign_hash() 132 if( status == PSA_SUCCESS ) in test_transparent_signature_sign_hash() 145 return( status ); in test_transparent_signature_sign_hash() 179 psa_status_t status = PSA_ERROR_NOT_SUPPORTED; in test_transparent_signature_verify_hash() local 211 status = PSA_ERROR_GENERIC_ERROR; in test_transparent_signature_verify_hash() 227 status = PSA_ERROR_BUFFER_TOO_SMALL; in test_transparent_signature_verify_hash() 253 status = mbedtls_to_psa_error( ret ); in test_transparent_signature_verify_hash() [all …]
|
/openthread-2.7.6/src/core/diags/ |
D | README.md | 21 Show diagnostics mode status. 35 status 0x00 54 status 0x00 73 status 0x00 85 status 0x00 97 status 0x00 107 status 0x00 117 status 0x00 127 status 0x00 172 status 0x00
|
/openthread-2.7.6/tests/scripts/thread-cert/ |
D | v1_2_LowPower_test_forward_tracking_series.py | 77 # Child should get a response with status 0 (SUCCESS). 82 # Child should get a response with status 2 (SERIES_ID_ALREADY_REGISTERED). 87 # Child should get a report with status 3 (SERIES_ID_NOT_RECOGNIZED). 92 # Child should get a report with status 4 (NO_MATCHING_FRAMES_RECEIVED). 97 # Child should get a response with status 3 (SERIES_ID_NOT_RECOGNIZED). 102 # Child should get a response with status 0 (SUCCESS). 108 # Child should get a response with status 0 (SUCCESS). 126 # 1. Child should get a response with status 0 (SUCCESS). 133 # 2. Child should get a response with status 2 (SERIES_ID_ALREADY_REGISTERED). 140 # 3. Child should get a report with status 3 (SERIES_ID_NOT_RECOGNIZED). [all …]
|
D | network_layer.py | 43 STATUS = 4 variable in TlvType 162 class Status(object): class 164 def __init__(self, status): argument 165 self._status = status 168 def status(self): member in Status 173 return self.status == other.status 176 return "Status(status={})".format(self.status) 182 status = StatusValues(ord(data.read(1))) 184 return Status(status)
|
D | test_network_layer.py | 260 status = any_status() 262 status_obj = network_layer.Status(status) 265 actual_status = status_obj.status 268 self.assertEqual(status, actual_status) 272 status = any_status() 274 status_obj = network_layer.Status(status) 277 self.assertEqual(status_obj, network_layer.Status(status)) 284 status = any_status() 288 data = bytearray([status]) 294 self.assertTrue(isinstance(status_obj, network_layer.Status)) [all …]
|
/openthread-2.7.6/src/core/thread/ |
D | link_metrics.cpp | 336 Error LinkMetrics::HandleManagementRequest(const Message &aMessage, Neighbor &aNeighbor, Status &aS… in HandleManagementRequest() 412 Status status; in HandleManagementResponse() local 427 VerifyOrExit(tlv.GetLength() == sizeof(status), error = kErrorParse); in HandleManagementResponse() 428 SuccessOrExit(aMessage.Read(offset + index + sizeof(tlv), status)); in HandleManagementResponse() 441 mMgmtResponseCallback(&aAddress, status, mMgmtResponseCallbackContext); in HandleManagementResponse() 461 Status status; in HandleReport() local 480 // There should be either: one Status TLV or some Report-Sub TLVs in HandleReport() 482 VerifyOrExit(tlv.GetLength() == sizeof(status), error = kErrorParse); in HandleReport() 483 SuccessOrExit(aMessage.Read(pos, status)); in HandleReport() 485 pos += sizeof(status); in HandleReport() [all …]
|
/openthread-2.7.6/include/openthread/platform/ |
D | otns.h | 57 * This function exports status information to OTNS. 59 …* The status information is represented by a null-terminated string with format recognizable by OT… 61 * Each status contains key and value separated by '='. 62 * Status value can be further separated into multiple fields using ',', 69 * @param[in] aStatus The status string.
|
/openthread-2.7.6/src/core/backbone_router/ |
D | bbr_manager.cpp | 160 ThreadStatusTlv::MlrStatus status = ThreadStatusTlv::kMlrSuccess; in HandleMulticastListenerRegistration() local 181 ExitNow(status = mMlrResponseStatus); in HandleMulticastListenerRegistration() 185 VerifyOrExit(isPrimary, status = ThreadStatusTlv::kMlrBbrNotPrimary); in HandleMulticastListenerRegistration() 197 status = ThreadStatusTlv::kMlrGeneralFailure); in HandleMulticastListenerRegistration() 207 …VerifyOrExit(addressesLength % sizeof(Ip6::Address) == 0, status = ThreadStatusTlv::kMlrGeneralFai… in HandleMulticastListenerRegistration() 209 status = ThreadStatusTlv::kMlrGeneralFailure); in HandleMulticastListenerRegistration() 219 VerifyOrExit(timeout < UINT32_MAX, status = ThreadStatusTlv::kMlrNoPersistent); in HandleMulticastListenerRegistration() 255 if (status == ThreadStatusTlv::kMlrSuccess) in HandleMulticastListenerRegistration() 257 status = ThreadStatusTlv::kMlrInvalid; in HandleMulticastListenerRegistration() 261 if (status == ThreadStatusTlv::kMlrSuccess) in HandleMulticastListenerRegistration() [all …]
|