Home
last modified time | relevance | path

Searched full:with (Results 1 – 25 of 2388) sorted by relevance

12345678910>>...96

/openthread-latest/third_party/mbedtls/repo/tests/suites/
Dtest_suite_psa_crypto_op_fail.generated.data7 PSA aead AEAD_WITH_AT_LEAST_THIS_LENGTH_TAG(CCM,1): incompatible with AES
11 PSA aead AEAD_WITH_AT_LEAST_THIS_LENGTH_TAG(CCM,1): incompatible with ARIA
15 PSA aead AEAD_WITH_AT_LEAST_THIS_LENGTH_TAG(CCM,1): incompatible with CAMELLIA
19 PSA aead AEAD_WITH_AT_LEAST_THIS_LENGTH_TAG(CCM,1): incompatible with CHACHA20
23 PSA aead AEAD_WITH_AT_LEAST_THIS_LENGTH_TAG(CCM,1): incompatible with DERIVE
27 PSA aead AEAD_WITH_AT_LEAST_THIS_LENGTH_TAG(CCM,1): incompatible with DES
31 PSA aead AEAD_WITH_AT_LEAST_THIS_LENGTH_TAG(CCM,1): incompatible with DH_KEY_PAIR(RFC7919)
35 PSA aead AEAD_WITH_AT_LEAST_THIS_LENGTH_TAG(CCM,1): incompatible with DH_PUBLIC_KEY(RFC7919)
39 PSA aead AEAD_WITH_AT_LEAST_THIS_LENGTH_TAG(CCM,1): incompatible with ECC_KEY_PAIR(BRAINPOOL_P_R1)
43 PSA aead AEAD_WITH_AT_LEAST_THIS_LENGTH_TAG(CCM,1): incompatible with ECC_KEY_PAIR(MONTGOMERY)
[all …]
Dtest_suite_bignum.generated.data12 MPI add #4 0 (null) + negative with leading zero limb
21 MPI add #7 0 (null) + positive with leading zero limb
24 MPI add #8 0 (null) + negative with leading zero limb
42 MPI add #14 0 (1 limb) + negative with leading zero limb
51 MPI add #17 0 (1 limb) + positive with leading zero limb
54 MPI add #18 0 (1 limb) + negative with leading zero limb
72 MPI add #24 negative 0 (null) + negative with leading zero limb
81 MPI add #27 negative 0 (null) + positive with leading zero limb
84 MPI add #28 negative 0 (null) + negative with leading zero limb
93 MPI add #31 negative with leading zero limb + 0 (null)
[all …]
Dtest_suite_cipher.des.data73 DES Encrypt and decrypt 0 bytes with one and zeros padding
77 DES Encrypt and decrypt 1 byte with one and zeros padding
81 DES Encrypt and decrypt 2 bytes with one and zeros padding
85 DES Encrypt and decrypt 7 bytes with one and zeros padding
89 DES Encrypt and decrypt 8 bytes with one and zeros padding
93 DES Encrypt and decrypt 9 bytes with one and zeros padding
97 DES Encrypt and decrypt 15 bytes with one and zeros padding
101 DES Encrypt and decrypt 16 bytes with one and zeros padding
105 DES Encrypt and decrypt 17 bytes with one and zeros padding
109 DES Encrypt and decrypt 31 bytes with one and zeros padding
[all …]
Dtest_suite_ssl.data367 Handshake, ECDHE-RSA-WITH-AES-256-GCM-SHA384
369 handshake_cipher:"TLS-ECDHE-RSA-WITH-AES-256-GCM-SHA384":MBEDTLS_PK_RSA:0
371 Handshake, RSA-WITH-AES-128-CCM
373 handshake_cipher:"TLS-RSA-WITH-AES-128-CCM":MBEDTLS_PK_RSA:0
375 Handshake, DHE-RSA-WITH-AES-256-CBC-SHA256
377 handshake_cipher:"TLS-DHE-RSA-WITH-AES-256-CBC-SHA256":MBEDTLS_PK_RSA:0
379 Handshake, ECDHE-ECDSA-WITH-AES-256-CCM
381 handshake_cipher:"TLS-ECDHE-ECDSA-WITH-AES-256-CCM":MBEDTLS_PK_ECDSA:0
383 Handshake, ECDH-ECDSA-WITH-CAMELLIA-256-CBC-SHA384
385 handshake_cipher:"TLS-ECDH-ECDSA-WITH-CAMELLIA-256-CBC-SHA384":MBEDTLS_PK_ECDSA:0
[all …]
Dtest_suite_cipher.aes.data9 AES-128 CBC - Encrypt and decrypt 0 bytes with PKCS7 padding
13 AES-128 CBC - Encrypt and decrypt 1 byte with PKCS7 padding
17 AES-128 CBC - Encrypt and decrypt 2 bytes with PKCS7 padding
21 AES-128 CBC - Encrypt and decrypt 7 bytes with PKCS7 padding
25 AES-128 CBC - Encrypt and decrypt 8 bytes with PKCS7 padding
29 AES-128 CBC - Encrypt and decrypt 9 bytes with PKCS7 padding
33 AES-128 CBC - Encrypt and decrypt 15 bytes with PKCS7 padding
37 AES-128 CBC - Encrypt and decrypt 16 bytes with PKCS7 padding
41 AES-128 CBC - Encrypt and decrypt 17 bytes with PKCS7 padding
45 AES-128 CBC - Encrypt and decrypt 31 bytes with PKCS7 padding
[all …]
Dtest_suite_random.data1 Generate random twice with CTR_DRBG
4 Generate random twice with HMAC_DRBG(SHA-1)
8 Generate random twice with HMAC_DRBG(SHA-256)
12 Generate random twice with HMAC_DRBG(SHA-512)
16 Generate random twice with PSA classic wrapper
19 Generate random twice with PSA API
38 # with something larger than any RNG call made by Mbed TLS itself expects.
/openthread-latest/third_party/mbedtls/repo/library/
Dssl_ciphersuites.c328 "TLS-ECDHE-RSA-WITH-CHACHA20-POLY1305-SHA256",
336 "TLS-ECDHE-ECDSA-WITH-CHACHA20-POLY1305-SHA256",
344 "TLS-DHE-RSA-WITH-CHACHA20-POLY1305-SHA256",
352 "TLS-PSK-WITH-CHACHA20-POLY1305-SHA256",
360 "TLS-ECDHE-PSK-WITH-CHACHA20-POLY1305-SHA256",
368 "TLS-DHE-PSK-WITH-CHACHA20-POLY1305-SHA256",
376 "TLS-RSA-PSK-WITH-CHACHA20-POLY1305-SHA256",
389 { MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, "TLS-ECDHE-ECDSA-WITH-AES-128-CBC-SHA",
393 { MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, "TLS-ECDHE-ECDSA-WITH-AES-256-CBC-SHA",
401 { MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256, "TLS-ECDHE-ECDSA-WITH-AES-128-CBC-SHA256",
[all …]
/openthread-latest/third_party/mbedtls/repo/include/mbedtls/
Dcipher.h4 * \brief This file contains an abstraction interface for use with the cipher
87 MBEDTLS_CIPHER_AES_128_ECB, /**< AES cipher with 128-bit ECB mode. */
88 MBEDTLS_CIPHER_AES_192_ECB, /**< AES cipher with 192-bit ECB mode. */
89 MBEDTLS_CIPHER_AES_256_ECB, /**< AES cipher with 256-bit ECB mode. */
90 MBEDTLS_CIPHER_AES_128_CBC, /**< AES cipher with 128-bit CBC mode. */
91 MBEDTLS_CIPHER_AES_192_CBC, /**< AES cipher with 192-bit CBC mode. */
92 MBEDTLS_CIPHER_AES_256_CBC, /**< AES cipher with 256-bit CBC mode. */
93 MBEDTLS_CIPHER_AES_128_CFB128, /**< AES cipher with 128-bit CFB128 mode. */
94 MBEDTLS_CIPHER_AES_192_CFB128, /**< AES cipher with 192-bit CFB128 mode. */
95 MBEDTLS_CIPHER_AES_256_CFB128, /**< AES cipher with 256-bit CFB128 mode. */
[all …]
/openthread-latest/.github/workflows/
Dsimulation-1.1.yml5 # Redistribution and use in source and binary forms, with or without
11 # documentation and/or other materials provided with the distribution.
59 with:
63 with:
66 with:
85 with:
94 with:
112 with:
116 with:
119 with:
[all …]
Dsimulation-1.4.yml5 # Redistribution and use in source and binary forms, with or without
11 # documentation and/or other materials provided with the distribution.
70 with:
74 with:
77 with:
104 with:
109 with:
117 with:
136 with:
140 with:
[all …]
Dtoranj.yml5 # Redistribution and use in source and binary forms, with or without
11 # documentation and/or other materials provided with the distribution.
63 with:
67 with:
70 with:
98 with:
102 with:
105 with:
124 with:
135 with:
[all …]
Dbuild.yml5 # Redistribution and use in source and binary forms, with or without
11 # documentation and/or other materials provided with the distribution.
53 with:
57 with:
60 with:
79 with:
85 with:
95 with:
99 with:
102 with:
[all …]
Dposix.yml5 # Redistribution and use in source and binary forms, with or without
11 # documentation and/or other materials provided with the distribution.
56 with:
61 with:
85 with:
93 with:
118 with:
124 with:
131 with:
146 with:
[all …]
Dotns.yml5 # Redistribution and use in source and binary forms, with or without
11 # documentation and/or other materials provided with the distribution.
62 with:
67 with:
71 with:
87 with:
96 with:
107 with:
111 with:
127 with:
[all …]
/openthread-latest/third_party/mbedtls/repo/docs/architecture/testing/
Dpsa-storage-format-testing.md7 …oad a key that was saved with the version of Mbed TLS under test, but also that it's possible to l…
15 …er of Mbed TLS, I want to store a key under version V and read it back under version W, with W ≥ V.
19 …overage multiplied by the number of versions that we want to preserve backward compatibility with).
23 …indicated by the parameters, then compares the actual state of the storage with the expected state.
25 …esting and load-and-check testing can be split into separate test functions with the same payloads.
27 If the test passes with version V, this means that the test data is consistent with what the implem…
29 …ort-and-save passing on version V and load-and-check passing on version W with the same data that …
33 ### Keeping up with storage format evolution
39 …should keep the corresponding test cases in load-only mode: create a file with the expected conten…
56with the current storage format version. When the storage format changes, if backward compatibilit…
[all …]
Ddriver-interface-test-strategy.md21 …e by Mbed TLS, the initialization code must call `psa_register_se_driver` with a structure that de…
27 Many SE driver interface unit tests could be covered by running the existing API tests with a key i…
33 * Test `psa_register_se_driver` with valid and with invalid arguments.
41 * Make at least one test with a key in a secure element that checks that the driver method is calle…
42 * Make at least one test with a key that is not in a secure element that checks that the driver met…
43 * Make at least one test with a key in a secure element with a driver that does not have the requis…
44 * Make at least one test with a key in a secure element with a driver that does not have the substr…
45 * At least one test should register multiple drivers with a key in each driver and check that the e…
46 * At least one test should register the same driver structure with multiple lifetime values and che…
48 … provides the MAC methods must provide all or none). In those cases, test with all of them null an…
[all …]
/openthread-latest/third_party/mbedtls/repo/docs/architecture/psa-migration/
Dpsa-limitations.md44 Currently, the PSA Crypto API can only perform FFDH with a limited set of
76 4. Implement RFC 7919, support DHE-RSA and DHE-PSK only in conjunction with it
85 As of early 2023, the plan is to go with option 2 in Mbed TLS 4.0, which has
179 OpenSSL picks saltlen = keylen - hashlen - 2 (tested with openssl 1.1.1f).
181 by default (tested with GnuTLS 3.6.13). FIPS 186-4 requires 0 <= saltlen <=
210 Files with "bad" in the name are expected to be invalid and rejected in tests.
214 server9-bad-mgfhash.crt (announcing mgf1(sha224), signed with another mgf)
216 Mask Algorithm: mgf1 with sha224
218 server9-bad-saltlen.crt (announcing saltlen = 0xDE, signed with another len)
220 Mask Algorithm: mgf1 with sha256
[all …]
/openthread-latest/third_party/mbedtls/repo/tests/data_files/
DReadme-x509.txt9 test-ca-sha1.crt and test-ca-sha256.crt use the same key, signed with
12 uses an EC key with NIST P-384 (aka secp384r1)
21 uses an EC key with NIST P-384, signed by test-ca
25 uses an EC key with NIST P-256, signed by test-int-ca2
32 server2-v1*.crt: EE cert (without of with chain in same file)
58 - cert_v1_with_ext.crt: 1 R: v1 with extensions (illegal)
76 -badsign.crt: S5 with corrupted signature
77 -expired.crt: S5 with "not after" date in the past
78 -future.crt: S5 with "not before" date in the future
80 (with forbidden EC algorithm identifier NULL parameter)
[all …]
/openthread-latest/third_party/mbedtls/repo/tests/scripts/
Dtranslate_ciphers.py34 "TLS-ECDHE-ECDSA-WITH-NULL-SHA"),
38 "TLS-ECDHE-ECDSA-WITH-AES-128-GCM-SHA256"),
42 "TLS-DHE-RSA-WITH-3DES-EDE-CBC-SHA"),
46 "TLS-RSA-WITH-AES-256-CBC-SHA"),
50 "TLS-PSK-WITH-3DES-EDE-CBC-SHA"),
54 "TLS-ECDHE-ECDSA-WITH-CHACHA20-POLY1305-SHA256"),
58 "TLS-ECDHE-ECDSA-WITH-AES-128-CCM"),
62 "TLS-ECDHE-RSA-WITH-ARIA-256-GCM-SHA384"),
85 # Replace "_" with "-" to handle ciphersuite names based on Mbed TLS
90 s_cipher = s_cipher.replace("-WITH-", ":+")
[all …]
/openthread-latest/tests/scripts/thread-cert/
Dv1_2_LowPower_test_forward_tracking_series.py6 # Redistribution and use in source and binary forms, with or without
12 # documentation and/or other materials provided with the distribution.
63 """All nodes are created with default configurations"""
78 # Child should get a response with status 0 (SUCCESS).
83 # Child should get a response with status 2 (SERIES_ID_ALREADY_REGISTERED).
88 # Child should get a report with status 3 (SERIES_ID_NOT_RECOGNIZED).
93 # Child should get a report with status 4 (NO_MATCHING_FRAMES_RECEIVED).
98 # Child should get a response with status 3 (SERIES_ID_NOT_RECOGNIZED).
103 # Child should get a response with status 0 (SUCCESS).
109 # Child should get a response with status 0 (SUCCESS).
[all …]
/openthread-latest/third_party/mbedtls/repo/
DChangeLog41 * Added an example program showing how to hash with the PSA API.
44 * AES-NI is now supported in Windows builds with clang and clang-cl.
51 (the cipher and PSA interfaces). This option is incompatible with modes
52 that use the decryption direction (ECB in PSA, CBC, XTS, KW) and with DES.
74 and configured with MBEDTLS_SSL_RECORD_SIZE_LIMIT.
93 with PKCS#5 PBES2. Keys encrypted this way can now be parsed by PK parse.
109 key pair with a custom public exponent.
121 called at runtime. This together with MBEDTLS_PSA_RANDOM_STATE can be
126 with the same content as a PSA key.
160 when an SSL context is reset with the mbedtls_ssl_session_reset() API.
[all …]
/openthread-latest/third_party/mbedtls/repo/docs/architecture/
Dpsa-shared-memory.md6 …A API functions might receive arguments that are in memory that is shared with an untrusted proces…
21with environments where the arguments passed to a PSA Crypto API function may be in shared memory …
23 …n, may be vulnerable due to having multiple cores or asynchronous data transfers with peripherals.)
29 We consider a security architecture with two or three entities:
33 … client, which makes a RPC to the crypto client which re-shares the memory with the crypto service.
45 Vulnerability example (parsing): suppose the input contains data with a type-length-value or length…
47 …): consider an RPC to perform authenticated encryption, using a mechanism with an encrypt-and-MAC …
62with chained calls: we consider the same RSA signature operation as before. In this example, we ad…
72 Vulnerability example with chained calls (temporary exposure): an application encrypts some data, a…
74with chained calls (backtrack): we consider a provisioning application that provides a data encryp…
[all …]
/openthread-latest/tests/scripts/thread-cert/border_router/MATN/
DMATN_12_HopLimitProcessing.py6 # Redistribution and use in source and binary forms, with or without
12 # documentation and/or other materials provided with the distribution.
41 # decrements the Hop Limit field by 1 if packet is forwarded with MPL, and if
43 # the BR drops a packet with Hop Limit 0. It also checks the use of IPv6 packets
103 # 1. Host multicasts a ping packet to the multicast address, MA1, with
114 # 4. Host multicasts a ping packet to the multicast address, MA1, with
125 # multicast address, MA2, with the Hop Limit field of the inner packet
131 # packet to the multicast address, MA2, with the Hop Limit field of
138 # packet to the multicast address, MA2, with the Hop Limit field of the
144 # packet to the multicast address, MA2, with the Hop Limit field of the
[all …]
/openthread-latest/src/core/common/
Dptr_wrapper.hpp5 * Redistribution and use in source and binary forms, with or without
11 * documentation and/or other materials provided with the distribution.
63 * Initializes the `Ptr` with a given pointer.
65 * @param[in] aPointer A pointer to initialize with.
127 * Overloads the operator `==` to compare the `Ptr` with a given pointer.
129 * @param[in] aPointer The pointer to compare with.
137 * Overloads the operator `!=` to compare the `Ptr` with a given pointer.
139 * @param[in] aPointer The pointer to compare with.
147 * Overloads the operator `==` to compare the `Ptr` with another `Ptr`.
149 * @param[in] aOther The other `Ptr` to compare with.
[all …]
/openthread-latest/third_party/mbedtls/repo/tests/opt-testcases/
Dtls13-misc.sh49 run_test "TLS 1.3 m->m: Multiple PSKs: valid ticket, reconnect with ticket" \
63 run_test "TLS 1.3 m->m: Multiple PSKs: invalid ticket, reconnect with PSK" \
154 -c "Reconnecting with saved session... ok" \
167 run_test "TLS 1.3 m->m: resumption with servername" \
174 -c "Reconnecting with saved session... ok" \
187 run_test "TLS 1.3 m->m: resumption with ticket max lifetime (7d)" \
193 -c "Reconnecting with saved session... ok" \
207 run_test "TLS 1.3 m->m: resumption with AES-256-GCM-SHA384 only" \
214 -c "Reconnecting with saved session... ok" \
227 run_test "TLS 1.3 m->m: resumption with early data" \
[all …]

12345678910>>...96