/openthread-3.6.0/third_party/mbedtls/repo/programs/psa/ |
D | crypto_examples.c | 69 psa_status_t status; in cipher_operation() local 79 status = psa_cipher_update( operation, input + bytes_written, in cipher_operation() 82 ASSERT_STATUS( status, PSA_SUCCESS ); in cipher_operation() 88 status = psa_cipher_finish( operation, output + *output_len, in cipher_operation() 90 ASSERT_STATUS( status, PSA_SUCCESS ); in cipher_operation() 94 return( status ); in cipher_operation() 108 psa_status_t status; in cipher_encrypt() local 113 status = psa_cipher_encrypt_setup( &operation, key, alg ); in cipher_encrypt() 114 ASSERT_STATUS( status, PSA_SUCCESS ); in cipher_encrypt() 116 status = psa_cipher_generate_iv( &operation, iv, iv_size, &iv_len ); in cipher_encrypt() [all …]
|
D | key_ladder_demo.c | 92 status = DEMO_ERROR; \ 102 status = ( expr ); \ 103 if( status != PSA_SUCCESS ) \ 106 (int) status, \ 175 psa_status_t status = PSA_SUCCESS; in save_key() local 191 return( status ); in save_key() 201 psa_status_t status = PSA_SUCCESS; in generate() local 217 return( status ); in generate() 230 psa_status_t status = PSA_SUCCESS; in import_key_from_file() local 244 status = DEMO_ERROR; in import_key_from_file() [all …]
|
/openthread-3.6.0/third_party/mbedtls/repo/library/ |
D | psa_crypto.c | 607 psa_status_t status = psa_allocate_buffer_to_slot( slot, in psa_copy_key_material_into_slot() local 609 if( status != PSA_SUCCESS ) in psa_copy_key_material_into_slot() 610 return( status ); in psa_copy_key_material_into_slot() 622 psa_status_t status = PSA_ERROR_CORRUPTION_DETECTED; in psa_import_key_into_slot() local 642 status = validate_unstructured_key_bit_size( type, *bits ); in psa_import_key_into_slot() 643 if( status != PSA_SUCCESS ) in psa_import_key_into_slot() 644 return( status ); in psa_import_key_into_slot() 969 psa_status_t status = PSA_ERROR_CORRUPTION_DETECTED; in psa_get_and_lock_key_slot_with_policy() local 972 status = psa_get_and_lock_key_slot( key, p_slot ); in psa_get_and_lock_key_slot_with_policy() 973 if( status != PSA_SUCCESS ) in psa_get_and_lock_key_slot_with_policy() [all …]
|
D | psa_crypto_slot_management.c | 104 psa_status_t status = PSA_ERROR_CORRUPTION_DETECTED; in psa_get_and_lock_key_slot_in_memory() local 121 status = mbedtls_svc_key_id_equal( key, slot->attr.id ) ? in psa_get_and_lock_key_slot_in_memory() 135 status = ( slot_idx < MBEDTLS_PSA_KEY_SLOT_COUNT ) ? in psa_get_and_lock_key_slot_in_memory() 139 if( status == PSA_SUCCESS ) in psa_get_and_lock_key_slot_in_memory() 141 status = psa_lock_key_slot( slot ); in psa_get_and_lock_key_slot_in_memory() 142 if( status == PSA_SUCCESS ) in psa_get_and_lock_key_slot_in_memory() 146 return( status ); in psa_get_and_lock_key_slot_in_memory() 174 psa_status_t status = PSA_ERROR_CORRUPTION_DETECTED; in psa_get_empty_key_slot() local 180 status = PSA_ERROR_BAD_STATE; in psa_get_empty_key_slot() 217 status = psa_lock_key_slot( selected_slot ); in psa_get_empty_key_slot() [all …]
|
D | psa_crypto_driver_wrappers.c | 71 psa_status_t status = PSA_ERROR_CORRUPTION_DETECTED; in psa_driver_wrapper_init() local 74 status = psa_init_all_se_drivers( ); in psa_driver_wrapper_init() 75 if( status != PSA_SUCCESS ) in psa_driver_wrapper_init() 76 return( status ); in psa_driver_wrapper_init() 80 status = mbedtls_test_transparent_init( ); in psa_driver_wrapper_init() 81 if( status != PSA_SUCCESS ) in psa_driver_wrapper_init() 82 return( status ); in psa_driver_wrapper_init() 84 status = mbedtls_test_opaque_init( ); in psa_driver_wrapper_init() 85 if( status != PSA_SUCCESS ) in psa_driver_wrapper_init() 86 return( status ); in psa_driver_wrapper_init() [all …]
|
D | psa_crypto_mac.c | 51 psa_status_t status; in psa_hmac_setup_internal() local 70 status = psa_hash_compute( hash_alg, key, key_length, in psa_hmac_setup_internal() 72 if( status != PSA_SUCCESS ) in psa_hmac_setup_internal() 94 status = psa_hash_setup( &hmac->hash_ctx, hash_alg ); in psa_hmac_setup_internal() 95 if( status != PSA_SUCCESS ) in psa_hmac_setup_internal() 98 status = psa_hash_update( &hmac->hash_ctx, ipad, block_size ); in psa_hmac_setup_internal() 103 return( status ); in psa_hmac_setup_internal() 123 psa_status_t status; in psa_hmac_finish_internal() local 125 status = psa_hash_finish( &hmac->hash_ctx, tmp, sizeof( tmp ), &hash_size ); in psa_hmac_finish_internal() 126 if( status != PSA_SUCCESS ) in psa_hmac_finish_internal() [all …]
|
D | psa_crypto_rsa.c | 60 psa_status_t status; in psa_check_rsa_key_byte_aligned() local 62 status = mbedtls_to_psa_error( in psa_check_rsa_key_byte_aligned() 64 if( status == PSA_SUCCESS ) in psa_check_rsa_key_byte_aligned() 67 status = PSA_ERROR_NOT_SUPPORTED; in psa_check_rsa_key_byte_aligned() 70 return( status ); in psa_check_rsa_key_byte_aligned() 77 psa_status_t status; in mbedtls_psa_rsa_load_representation() local 84 status = mbedtls_to_psa_error( in mbedtls_psa_rsa_load_representation() 87 status = mbedtls_to_psa_error( in mbedtls_psa_rsa_load_representation() 89 if( status != PSA_SUCCESS ) in mbedtls_psa_rsa_load_representation() 96 status = PSA_ERROR_INVALID_ARGUMENT; in mbedtls_psa_rsa_load_representation() [all …]
|
D | psa_crypto_aead.c | 82 psa_status_t status = PSA_ERROR_CORRUPTION_DETECTED; in psa_aead_setup() local 109 status = mbedtls_to_psa_error( in psa_aead_setup() 112 if( status != PSA_SUCCESS ) in psa_aead_setup() 113 return( status ); in psa_aead_setup() 128 status = mbedtls_to_psa_error( in psa_aead_setup() 131 if( status != PSA_SUCCESS ) in psa_aead_setup() 132 return( status ); in psa_aead_setup() 145 status = mbedtls_to_psa_error( in psa_aead_setup() 148 if( status != PSA_SUCCESS ) in psa_aead_setup() 149 return( status ); in psa_aead_setup() [all …]
|
D | psa_crypto_storage.c | 95 psa_status_t status; in psa_crypto_storage_load() local 100 status = psa_its_get_info( data_identifier, &data_identifier_info ); in psa_crypto_storage_load() 101 if( status != PSA_SUCCESS ) in psa_crypto_storage_load() 102 return( status ); in psa_crypto_storage_load() 104 status = psa_its_get( data_identifier, 0, (uint32_t) data_size, data, &data_length ); in psa_crypto_storage_load() 108 return( status ); in psa_crypto_storage_load() 145 psa_status_t status; in psa_crypto_storage_store() local 152 status = psa_its_set( data_identifier, (uint32_t) data_length, data, 0 ); in psa_crypto_storage_store() 153 if( status != PSA_SUCCESS ) in psa_crypto_storage_store() 158 status = psa_its_get_info( data_identifier, &data_identifier_info ); in psa_crypto_storage_store() [all …]
|
D | psa_crypto_ecp.c | 54 psa_status_t status; in mbedtls_psa_ecp_load_representation() local 110 status = PSA_ERROR_NOT_SUPPORTED; in mbedtls_psa_ecp_load_representation() 114 status = mbedtls_to_psa_error( in mbedtls_psa_ecp_load_representation() 116 if( status != PSA_SUCCESS ) in mbedtls_psa_ecp_load_representation() 123 status = mbedtls_to_psa_error( in mbedtls_psa_ecp_load_representation() 127 if( status != PSA_SUCCESS ) in mbedtls_psa_ecp_load_representation() 131 status = mbedtls_to_psa_error( in mbedtls_psa_ecp_load_representation() 133 if( status != PSA_SUCCESS ) in mbedtls_psa_ecp_load_representation() 139 status = mbedtls_to_psa_error( in mbedtls_psa_ecp_load_representation() 144 if( status != PSA_SUCCESS ) in mbedtls_psa_ecp_load_representation() [all …]
|
D | psa_crypto_cipher.c | 272 psa_status_t status = PSA_ERROR_CORRUPTION_DETECTED; in psa_cipher_update_ecb() local 279 status = PSA_SUCCESS; in psa_cipher_update_ecb() 299 status = mbedtls_to_psa_error( in psa_cipher_update_ecb() 305 if( status != PSA_SUCCESS ) in psa_cipher_update_ecb() 317 status = mbedtls_to_psa_error( in psa_cipher_update_ecb() 322 if( status != PSA_SUCCESS ) in psa_cipher_update_ecb() 340 status = PSA_SUCCESS; in psa_cipher_update_ecb() 343 return( status ); in psa_cipher_update_ecb() 351 psa_status_t status = PSA_ERROR_CORRUPTION_DETECTED; in mbedtls_psa_cipher_update() local 377 status = psa_cipher_update_ecb( &operation->ctx.cipher, in mbedtls_psa_cipher_update() [all …]
|
D | psa_its_file.c | 126 psa_status_t status; in psa_its_get_info() local 128 status = psa_its_read_file( uid, p_info, &stream ); in psa_its_get_info() 131 return( status ); in psa_its_get_info() 140 psa_status_t status; in psa_its_get() local 145 status = psa_its_read_file( uid, &info, &stream ); in psa_its_get() 146 if( status != PSA_SUCCESS ) in psa_its_get() 148 status = PSA_ERROR_INVALID_ARGUMENT; in psa_its_get() 158 status = PSA_ERROR_STORAGE_FAILURE; in psa_its_get() 172 status = PSA_SUCCESS; in psa_its_get() 179 return( status ); in psa_its_get() [all …]
|
D | psa_crypto_se.c | 145 psa_status_t status; in psa_load_se_persistent_data() local 149 status = psa_get_se_driver_its_file_uid( driver, &uid ); in psa_load_se_persistent_data() 150 if( status != PSA_SUCCESS ) in psa_load_se_persistent_data() 151 return( status ); in psa_load_se_persistent_data() 169 psa_status_t status; in psa_save_se_persistent_data() local 172 status = psa_get_se_driver_its_file_uid( driver, &uid ); in psa_save_se_persistent_data() 173 if( status != PSA_SUCCESS ) in psa_save_se_persistent_data() 174 return( status ); in psa_save_se_persistent_data() 200 psa_status_t status; in psa_find_se_slot_for_key() local 222 status = p_validate_slot_number( &driver->u.context, in psa_find_se_slot_for_key() [all …]
|
/openthread-3.6.0/third_party/mbedtls/repo/tests/suites/ |
D | test_suite_psa_crypto_entropy.function | 125 psa_status_t status; 145 status = remove_seed_file( ); 146 TEST_ASSERT( ( status == PSA_SUCCESS ) || 147 ( status == PSA_ERROR_DOES_NOT_EXIST ) ); 148 status = mbedtls_psa_inject_entropy( seed, seed_length_a ); 149 TEST_EQUAL( status, expected_status_a ); 150 status = mbedtls_psa_inject_entropy( seed, seed_length_b ); 151 TEST_EQUAL( status, expected_status_b ); 166 psa_status_t status; 174 status = remove_seed_file( ); [all …]
|
D | test_suite_psa_crypto_driver_wrappers.function | 524 psa_status_t status; 611 status = psa_cipher_finish( &operation, 619 TEST_EQUAL( status, expected_status ); 656 psa_status_t status; 744 status = psa_cipher_finish( &operation, 752 TEST_EQUAL( status, expected_status ); 784 psa_status_t status; 825 status = psa_cipher_decrypt( key, alg, input, input_buffer_size, output, 830 TEST_EQUAL( status, expected_status ); 853 psa_status_t status; [all …]
|
D | test_suite_psa_crypto_init.function | 152 psa_status_t status; 156 status = psa_crypto_init( ); 157 PSA_ASSERT( status ); 158 status = psa_crypto_init( ); 159 PSA_ASSERT( status ); 181 psa_status_t status; 186 status = psa_crypto_init( ); 187 PSA_ASSERT( status ); 190 status = psa_generate_random( random, sizeof( random ) ); 191 TEST_EQUAL( status, PSA_ERROR_BAD_STATE ); [all …]
|
/openthread-3.6.0/third_party/mbedtls/repo/docs/ |
D | getting_started.md | 77 psa_status_t status; 85 status = psa_crypto_init(); 86 if (status != PSA_SUCCESS) { 98 status = psa_import_key(&attributes, key, key_len, &key_id); 99 if (status != PSA_SUCCESS) { 130 psa_status_t status; 144 status = psa_crypto_init(); 145 if (status != PSA_SUCCESS) { 157 status = psa_import_key(&attributes, key, key_len, &key_id); 158 if (status != PSA_SUCCESS) { [all …]
|
/openthread-3.6.0/tools/harness-simulation/posix/sniffer_sim/proto/ |
D | sniffer.proto | 20 // Possible Status which the RPCs may return 21 enum Status { enum 44 Status status = 1; field 59 Status status = 1; field 66 Status status = 1; field
|
/openthread-3.6.0/src/lib/spinel/ |
D | spinel_encoder.hpp | 110 …* property fails and the property key should be switched to `LAST_STATUS` with an error status, th… 130 * `SPINEL_PROP_LAST_STATUS` and writes the given spinel status error. 132 * @param[in] aStatus Spinel error status 144 * does nothing and returns error status `OT_ERROR_INVALID_STATE`. 146 … no buffer space is available, this method will discard and clear the frame and return error status 163 * method does nothing and returns error status `OT_ERROR_INVALID_STATE`. 166 * error status `OT_ERROR_NO_BUFS`. 181 * method does nothing and returns error status `OT_ERROR_INVALID_STATE`. 184 * error status `OT_ERROR_NO_BUFS`. 199 * method does nothing and returns error status `OT_ERROR_INVALID_STATE`. [all …]
|
/openthread-3.6.0/tests/scripts/expect/ |
D | cli-diags.exp | 39 expect "status 0x00" 44 expect "status 0x00" 55 expect "status 0x00" 60 expect "status 0x00" 69 expect "status 0x00" 98 expect "status 0x00" 103 expect "status 0x00" 126 expect "status 0x00" 131 expect "status 0x00" 136 expect "status 0x00" [all …]
|
/openthread-3.6.0/tests/scripts/thread-cert/ |
D | v1_2_LowPower_test_forward_tracking_series.py | 78 # Child should get a response with status 0 (SUCCESS). 83 # Child should get a response with status 2 (SERIES_ID_ALREADY_REGISTERED). 88 # Child should get a report with status 3 (SERIES_ID_NOT_RECOGNIZED). 93 # Child should get a report with status 4 (NO_MATCHING_FRAMES_RECEIVED). 98 # Child should get a response with status 3 (SERIES_ID_NOT_RECOGNIZED). 103 # Child should get a response with status 0 (SUCCESS). 109 # Child should get a response with status 0 (SUCCESS). 127 # 1. Child should get a response with status 0 (SUCCESS). 134 # 2. Child should get a response with status 2 (SERIES_ID_ALREADY_REGISTERED). 141 # 3. Child should get a report with status 3 (SERIES_ID_NOT_RECOGNIZED). [all …]
|
D | network_layer.py | 43 STATUS = 4 variable in TlvType 162 class Status(object): class 164 def __init__(self, status): argument 165 self._status = status 168 def status(self): member in Status 173 return self.status == other.status 176 return "Status(status={})".format(self.status) 182 status = StatusValues(ord(data.read(1))) 184 return Status(status)
|
D | test_network_layer.py | 260 status = any_status() 262 status_obj = network_layer.Status(status) 265 actual_status = status_obj.status 268 self.assertEqual(status, actual_status) 272 status = any_status() 274 status_obj = network_layer.Status(status) 277 self.assertEqual(status_obj, network_layer.Status(status)) 284 status = any_status() 288 data = bytearray([status]) 294 self.assertTrue(isinstance(status_obj, network_layer.Status)) [all …]
|
/openthread-3.6.0/tools/harness-simulation/posix/etc/ |
D | server.patch | 9 sudo service rsyslog status || sudo service rsyslog start || die 'Failed to start rsyslog!' 10 sudo service dbus status || sudo service dbus start || die 'Failed to start dbus!' 12 …sudo service avahi-daemon status || sudo service avahi-daemon start || die 'Failed to start avahi!' 13 …sudo service otbr-agent status || sudo service otbr-agent start || die 'Failed to start otbr-agent… 14 …without WEB_GUI || sudo service otbr-web status || sudo service otbr-web start || die 'Failed to s… 15 + sudo service commissionerd status || sudo service commissionerd start || die 'Failed to st…
|
/openthread-3.6.0/etc/cmake/ |
D | options.cmake | 39 message(STATUS OT_APP_CLI=${OT_APP_CLI}) 40 message(STATUS OT_APP_NCP=${OT_APP_NCP}) 41 message(STATUS OT_APP_RCP=${OT_APP_RCP}) 42 message(STATUS OT_FTD=${OT_FTD}) 43 message(STATUS OT_MTD=${OT_MTD}) 44 message(STATUS OT_RCP=${OT_RCP}) 73 message(STATUS "${name}=\"\"") 75 message(STATUS "${name}=ON --> ${ot_config}=1") 78 message(STATUS "${name}=OFF --> ${ot_config}=0") 101 message(STATUS "${name}=\"\"") [all …]
|