/openthread-latest/third_party/mbedtls/repo/tests/suites/ |
D | test_suite_psa_crypto_op_fail.generated.data | 7 PSA aead AEAD_WITH_AT_LEAST_THIS_LENGTH_TAG(CCM,1): incompatible with AES 11 PSA aead AEAD_WITH_AT_LEAST_THIS_LENGTH_TAG(CCM,1): incompatible with ARIA 15 PSA aead AEAD_WITH_AT_LEAST_THIS_LENGTH_TAG(CCM,1): incompatible with CAMELLIA 19 PSA aead AEAD_WITH_AT_LEAST_THIS_LENGTH_TAG(CCM,1): incompatible with CHACHA20 23 PSA aead AEAD_WITH_AT_LEAST_THIS_LENGTH_TAG(CCM,1): incompatible with DERIVE 27 PSA aead AEAD_WITH_AT_LEAST_THIS_LENGTH_TAG(CCM,1): incompatible with DES 31 PSA aead AEAD_WITH_AT_LEAST_THIS_LENGTH_TAG(CCM,1): incompatible with DH_KEY_PAIR(RFC7919) 35 PSA aead AEAD_WITH_AT_LEAST_THIS_LENGTH_TAG(CCM,1): incompatible with DH_PUBLIC_KEY(RFC7919) 39 PSA aead AEAD_WITH_AT_LEAST_THIS_LENGTH_TAG(CCM,1): incompatible with ECC_KEY_PAIR(BRAINPOOL_P_R1) 43 PSA aead AEAD_WITH_AT_LEAST_THIS_LENGTH_TAG(CCM,1): incompatible with ECC_KEY_PAIR(MONTGOMERY) [all …]
|
D | test_suite_bignum.generated.data | 12 MPI add #4 0 (null) + negative with leading zero limb 21 MPI add #7 0 (null) + positive with leading zero limb 24 MPI add #8 0 (null) + negative with leading zero limb 42 MPI add #14 0 (1 limb) + negative with leading zero limb 51 MPI add #17 0 (1 limb) + positive with leading zero limb 54 MPI add #18 0 (1 limb) + negative with leading zero limb 72 MPI add #24 negative 0 (null) + negative with leading zero limb 81 MPI add #27 negative 0 (null) + positive with leading zero limb 84 MPI add #28 negative 0 (null) + negative with leading zero limb 93 MPI add #31 negative with leading zero limb + 0 (null) [all …]
|
D | test_suite_cipher.des.data | 73 DES Encrypt and decrypt 0 bytes with one and zeros padding 77 DES Encrypt and decrypt 1 byte with one and zeros padding 81 DES Encrypt and decrypt 2 bytes with one and zeros padding 85 DES Encrypt and decrypt 7 bytes with one and zeros padding 89 DES Encrypt and decrypt 8 bytes with one and zeros padding 93 DES Encrypt and decrypt 9 bytes with one and zeros padding 97 DES Encrypt and decrypt 15 bytes with one and zeros padding 101 DES Encrypt and decrypt 16 bytes with one and zeros padding 105 DES Encrypt and decrypt 17 bytes with one and zeros padding 109 DES Encrypt and decrypt 31 bytes with one and zeros padding [all …]
|
D | test_suite_ssl.data | 367 Handshake, ECDHE-RSA-WITH-AES-256-GCM-SHA384 369 handshake_cipher:"TLS-ECDHE-RSA-WITH-AES-256-GCM-SHA384":MBEDTLS_PK_RSA:0 371 Handshake, RSA-WITH-AES-128-CCM 373 handshake_cipher:"TLS-RSA-WITH-AES-128-CCM":MBEDTLS_PK_RSA:0 375 Handshake, DHE-RSA-WITH-AES-256-CBC-SHA256 377 handshake_cipher:"TLS-DHE-RSA-WITH-AES-256-CBC-SHA256":MBEDTLS_PK_RSA:0 379 Handshake, ECDHE-ECDSA-WITH-AES-256-CCM 381 handshake_cipher:"TLS-ECDHE-ECDSA-WITH-AES-256-CCM":MBEDTLS_PK_ECDSA:0 383 Handshake, ECDH-ECDSA-WITH-CAMELLIA-256-CBC-SHA384 385 handshake_cipher:"TLS-ECDH-ECDSA-WITH-CAMELLIA-256-CBC-SHA384":MBEDTLS_PK_ECDSA:0 [all …]
|
D | test_suite_cipher.aes.data | 9 AES-128 CBC - Encrypt and decrypt 0 bytes with PKCS7 padding 13 AES-128 CBC - Encrypt and decrypt 1 byte with PKCS7 padding 17 AES-128 CBC - Encrypt and decrypt 2 bytes with PKCS7 padding 21 AES-128 CBC - Encrypt and decrypt 7 bytes with PKCS7 padding 25 AES-128 CBC - Encrypt and decrypt 8 bytes with PKCS7 padding 29 AES-128 CBC - Encrypt and decrypt 9 bytes with PKCS7 padding 33 AES-128 CBC - Encrypt and decrypt 15 bytes with PKCS7 padding 37 AES-128 CBC - Encrypt and decrypt 16 bytes with PKCS7 padding 41 AES-128 CBC - Encrypt and decrypt 17 bytes with PKCS7 padding 45 AES-128 CBC - Encrypt and decrypt 31 bytes with PKCS7 padding [all …]
|
D | test_suite_random.data | 1 Generate random twice with CTR_DRBG 4 Generate random twice with HMAC_DRBG(SHA-1) 8 Generate random twice with HMAC_DRBG(SHA-256) 12 Generate random twice with HMAC_DRBG(SHA-512) 16 Generate random twice with PSA classic wrapper 19 Generate random twice with PSA API 38 # with something larger than any RNG call made by Mbed TLS itself expects.
|
/openthread-latest/third_party/mbedtls/repo/library/ |
D | ssl_ciphersuites.c | 328 "TLS-ECDHE-RSA-WITH-CHACHA20-POLY1305-SHA256", 336 "TLS-ECDHE-ECDSA-WITH-CHACHA20-POLY1305-SHA256", 344 "TLS-DHE-RSA-WITH-CHACHA20-POLY1305-SHA256", 352 "TLS-PSK-WITH-CHACHA20-POLY1305-SHA256", 360 "TLS-ECDHE-PSK-WITH-CHACHA20-POLY1305-SHA256", 368 "TLS-DHE-PSK-WITH-CHACHA20-POLY1305-SHA256", 376 "TLS-RSA-PSK-WITH-CHACHA20-POLY1305-SHA256", 389 { MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, "TLS-ECDHE-ECDSA-WITH-AES-128-CBC-SHA", 393 { MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, "TLS-ECDHE-ECDSA-WITH-AES-256-CBC-SHA", 401 { MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256, "TLS-ECDHE-ECDSA-WITH-AES-128-CBC-SHA256", [all …]
|
/openthread-latest/third_party/mbedtls/repo/include/mbedtls/ |
D | cipher.h | 4 * \brief This file contains an abstraction interface for use with the cipher 87 MBEDTLS_CIPHER_AES_128_ECB, /**< AES cipher with 128-bit ECB mode. */ 88 MBEDTLS_CIPHER_AES_192_ECB, /**< AES cipher with 192-bit ECB mode. */ 89 MBEDTLS_CIPHER_AES_256_ECB, /**< AES cipher with 256-bit ECB mode. */ 90 MBEDTLS_CIPHER_AES_128_CBC, /**< AES cipher with 128-bit CBC mode. */ 91 MBEDTLS_CIPHER_AES_192_CBC, /**< AES cipher with 192-bit CBC mode. */ 92 MBEDTLS_CIPHER_AES_256_CBC, /**< AES cipher with 256-bit CBC mode. */ 93 MBEDTLS_CIPHER_AES_128_CFB128, /**< AES cipher with 128-bit CFB128 mode. */ 94 MBEDTLS_CIPHER_AES_192_CFB128, /**< AES cipher with 192-bit CFB128 mode. */ 95 MBEDTLS_CIPHER_AES_256_CFB128, /**< AES cipher with 256-bit CFB128 mode. */ [all …]
|
/openthread-latest/.github/workflows/ |
D | simulation-1.1.yml | 5 # Redistribution and use in source and binary forms, with or without 11 # documentation and/or other materials provided with the distribution. 59 with: 63 with: 66 with: 85 with: 94 with: 112 with: 116 with: 119 with: [all …]
|
D | simulation-1.4.yml | 5 # Redistribution and use in source and binary forms, with or without 11 # documentation and/or other materials provided with the distribution. 70 with: 74 with: 77 with: 104 with: 109 with: 117 with: 136 with: 140 with: [all …]
|
D | toranj.yml | 5 # Redistribution and use in source and binary forms, with or without 11 # documentation and/or other materials provided with the distribution. 63 with: 67 with: 70 with: 98 with: 102 with: 105 with: 124 with: 135 with: [all …]
|
D | build.yml | 5 # Redistribution and use in source and binary forms, with or without 11 # documentation and/or other materials provided with the distribution. 53 with: 57 with: 60 with: 79 with: 85 with: 95 with: 99 with: 102 with: [all …]
|
D | posix.yml | 5 # Redistribution and use in source and binary forms, with or without 11 # documentation and/or other materials provided with the distribution. 56 with: 61 with: 85 with: 93 with: 118 with: 124 with: 131 with: 146 with: [all …]
|
D | otns.yml | 5 # Redistribution and use in source and binary forms, with or without 11 # documentation and/or other materials provided with the distribution. 62 with: 67 with: 71 with: 87 with: 96 with: 107 with: 111 with: 127 with: [all …]
|
/openthread-latest/third_party/mbedtls/repo/docs/architecture/testing/ |
D | psa-storage-format-testing.md | 7 …oad a key that was saved with the version of Mbed TLS under test, but also that it's possible to l… 15 …er of Mbed TLS, I want to store a key under version V and read it back under version W, with W ≥ V. 19 …overage multiplied by the number of versions that we want to preserve backward compatibility with). 23 …indicated by the parameters, then compares the actual state of the storage with the expected state. 25 …esting and load-and-check testing can be split into separate test functions with the same payloads. 27 If the test passes with version V, this means that the test data is consistent with what the implem… 29 …ort-and-save passing on version V and load-and-check passing on version W with the same data that … 33 ### Keeping up with storage format evolution 39 …should keep the corresponding test cases in load-only mode: create a file with the expected conten… 56 …with the current storage format version. When the storage format changes, if backward compatibilit… [all …]
|
D | driver-interface-test-strategy.md | 21 …e by Mbed TLS, the initialization code must call `psa_register_se_driver` with a structure that de… 27 Many SE driver interface unit tests could be covered by running the existing API tests with a key i… 33 * Test `psa_register_se_driver` with valid and with invalid arguments. 41 * Make at least one test with a key in a secure element that checks that the driver method is calle… 42 * Make at least one test with a key that is not in a secure element that checks that the driver met… 43 * Make at least one test with a key in a secure element with a driver that does not have the requis… 44 * Make at least one test with a key in a secure element with a driver that does not have the substr… 45 * At least one test should register multiple drivers with a key in each driver and check that the e… 46 * At least one test should register the same driver structure with multiple lifetime values and che… 48 … provides the MAC methods must provide all or none). In those cases, test with all of them null an… [all …]
|
/openthread-latest/third_party/mbedtls/repo/docs/architecture/psa-migration/ |
D | psa-limitations.md | 44 Currently, the PSA Crypto API can only perform FFDH with a limited set of 76 4. Implement RFC 7919, support DHE-RSA and DHE-PSK only in conjunction with it 85 As of early 2023, the plan is to go with option 2 in Mbed TLS 4.0, which has 179 OpenSSL picks saltlen = keylen - hashlen - 2 (tested with openssl 1.1.1f). 181 by default (tested with GnuTLS 3.6.13). FIPS 186-4 requires 0 <= saltlen <= 210 Files with "bad" in the name are expected to be invalid and rejected in tests. 214 server9-bad-mgfhash.crt (announcing mgf1(sha224), signed with another mgf) 216 Mask Algorithm: mgf1 with sha224 218 server9-bad-saltlen.crt (announcing saltlen = 0xDE, signed with another len) 220 Mask Algorithm: mgf1 with sha256 [all …]
|
/openthread-latest/third_party/mbedtls/repo/tests/data_files/ |
D | Readme-x509.txt | 9 test-ca-sha1.crt and test-ca-sha256.crt use the same key, signed with 12 uses an EC key with NIST P-384 (aka secp384r1) 21 uses an EC key with NIST P-384, signed by test-ca 25 uses an EC key with NIST P-256, signed by test-int-ca2 32 server2-v1*.crt: EE cert (without of with chain in same file) 58 - cert_v1_with_ext.crt: 1 R: v1 with extensions (illegal) 76 -badsign.crt: S5 with corrupted signature 77 -expired.crt: S5 with "not after" date in the past 78 -future.crt: S5 with "not before" date in the future 80 (with forbidden EC algorithm identifier NULL parameter) [all …]
|
/openthread-latest/third_party/mbedtls/repo/tests/scripts/ |
D | translate_ciphers.py | 34 "TLS-ECDHE-ECDSA-WITH-NULL-SHA"), 38 "TLS-ECDHE-ECDSA-WITH-AES-128-GCM-SHA256"), 42 "TLS-DHE-RSA-WITH-3DES-EDE-CBC-SHA"), 46 "TLS-RSA-WITH-AES-256-CBC-SHA"), 50 "TLS-PSK-WITH-3DES-EDE-CBC-SHA"), 54 "TLS-ECDHE-ECDSA-WITH-CHACHA20-POLY1305-SHA256"), 58 "TLS-ECDHE-ECDSA-WITH-AES-128-CCM"), 62 "TLS-ECDHE-RSA-WITH-ARIA-256-GCM-SHA384"), 85 # Replace "_" with "-" to handle ciphersuite names based on Mbed TLS 90 s_cipher = s_cipher.replace("-WITH-", ":+") [all …]
|
/openthread-latest/tests/scripts/thread-cert/ |
D | v1_2_LowPower_test_forward_tracking_series.py | 6 # Redistribution and use in source and binary forms, with or without 12 # documentation and/or other materials provided with the distribution. 63 """All nodes are created with default configurations""" 78 # Child should get a response with status 0 (SUCCESS). 83 # Child should get a response with status 2 (SERIES_ID_ALREADY_REGISTERED). 88 # Child should get a report with status 3 (SERIES_ID_NOT_RECOGNIZED). 93 # Child should get a report with status 4 (NO_MATCHING_FRAMES_RECEIVED). 98 # Child should get a response with status 3 (SERIES_ID_NOT_RECOGNIZED). 103 # Child should get a response with status 0 (SUCCESS). 109 # Child should get a response with status 0 (SUCCESS). [all …]
|
/openthread-latest/third_party/mbedtls/repo/ |
D | ChangeLog | 41 * Added an example program showing how to hash with the PSA API. 44 * AES-NI is now supported in Windows builds with clang and clang-cl. 51 (the cipher and PSA interfaces). This option is incompatible with modes 52 that use the decryption direction (ECB in PSA, CBC, XTS, KW) and with DES. 74 and configured with MBEDTLS_SSL_RECORD_SIZE_LIMIT. 93 with PKCS#5 PBES2. Keys encrypted this way can now be parsed by PK parse. 109 key pair with a custom public exponent. 121 called at runtime. This together with MBEDTLS_PSA_RANDOM_STATE can be 126 with the same content as a PSA key. 160 when an SSL context is reset with the mbedtls_ssl_session_reset() API. [all …]
|
/openthread-latest/third_party/mbedtls/repo/docs/architecture/ |
D | psa-shared-memory.md | 6 …A API functions might receive arguments that are in memory that is shared with an untrusted proces… 21 …with environments where the arguments passed to a PSA Crypto API function may be in shared memory … 23 …n, may be vulnerable due to having multiple cores or asynchronous data transfers with peripherals.) 29 We consider a security architecture with two or three entities: 33 … client, which makes a RPC to the crypto client which re-shares the memory with the crypto service. 45 Vulnerability example (parsing): suppose the input contains data with a type-length-value or length… 47 …): consider an RPC to perform authenticated encryption, using a mechanism with an encrypt-and-MAC … 62 …with chained calls: we consider the same RSA signature operation as before. In this example, we ad… 72 Vulnerability example with chained calls (temporary exposure): an application encrypts some data, a… 74 …with chained calls (backtrack): we consider a provisioning application that provides a data encryp… [all …]
|
/openthread-latest/tests/scripts/thread-cert/border_router/MATN/ |
D | MATN_12_HopLimitProcessing.py | 6 # Redistribution and use in source and binary forms, with or without 12 # documentation and/or other materials provided with the distribution. 41 # decrements the Hop Limit field by 1 if packet is forwarded with MPL, and if 43 # the BR drops a packet with Hop Limit 0. It also checks the use of IPv6 packets 103 # 1. Host multicasts a ping packet to the multicast address, MA1, with 114 # 4. Host multicasts a ping packet to the multicast address, MA1, with 125 # multicast address, MA2, with the Hop Limit field of the inner packet 131 # packet to the multicast address, MA2, with the Hop Limit field of 138 # packet to the multicast address, MA2, with the Hop Limit field of the 144 # packet to the multicast address, MA2, with the Hop Limit field of the [all …]
|
/openthread-latest/src/core/common/ |
D | ptr_wrapper.hpp | 5 * Redistribution and use in source and binary forms, with or without 11 * documentation and/or other materials provided with the distribution. 63 * Initializes the `Ptr` with a given pointer. 65 * @param[in] aPointer A pointer to initialize with. 127 * Overloads the operator `==` to compare the `Ptr` with a given pointer. 129 * @param[in] aPointer The pointer to compare with. 137 * Overloads the operator `!=` to compare the `Ptr` with a given pointer. 139 * @param[in] aPointer The pointer to compare with. 147 * Overloads the operator `==` to compare the `Ptr` with another `Ptr`. 149 * @param[in] aOther The other `Ptr` to compare with. [all …]
|
/openthread-latest/third_party/mbedtls/repo/tests/opt-testcases/ |
D | tls13-misc.sh | 49 run_test "TLS 1.3 m->m: Multiple PSKs: valid ticket, reconnect with ticket" \ 63 run_test "TLS 1.3 m->m: Multiple PSKs: invalid ticket, reconnect with PSK" \ 154 -c "Reconnecting with saved session... ok" \ 167 run_test "TLS 1.3 m->m: resumption with servername" \ 174 -c "Reconnecting with saved session... ok" \ 187 run_test "TLS 1.3 m->m: resumption with ticket max lifetime (7d)" \ 193 -c "Reconnecting with saved session... ok" \ 207 run_test "TLS 1.3 m->m: resumption with AES-256-GCM-SHA384 only" \ 214 -c "Reconnecting with saved session... ok" \ 227 run_test "TLS 1.3 m->m: resumption with early data" \ [all …]
|