/openthread-2.7.6/third_party/mbedtls/repo/tests/suites/ |
D | test_suite_cipher.nist_kw.data | 33 KWP AES-128 1 byte input 37 KWP AES-128 2 byte input 41 KWP AES-128 3 byte input 45 KWP AES-128 4 byte input 49 KWP AES-128 5 byte input 53 KWP AES-128 6 byte input 57 KWP AES-128 7 byte input 61 KWP AES-128 8 byte input 65 KWP AES-128 9 byte input 69 KWP AES-128 10 byte input [all …]
|
D | test_suite_psa_its.data | 40 Get 1 byte of 10 at 9 46 Get 1 byte of 10 at 0 52 Get 1 byte of 10 at 10: out of range 55 Get 1 byte of 10 at 11: out of range 61 Get -1 byte of 10 at 10: out of range 64 Get 1 byte of 10 at -1: out of range
|
D | test_suite_cmac.data | 38 CMAC Single Blocks #2 - Single 16 byte block 41 CMAC Single Blocks #3 - Single 64 byte block 44 CMAC Multiple Blocks #1 - Multiple 8 byte blocks 47 CMAC Multiple Blocks #2 - Multiple 16 byte blocks 53 CMAC Multiple Blocks #4 - Multiple 8 byte blocks with gaps 59 CMAC Multiple Operations, same key #2 - Empty, 64 byte block 62 CMAC Multiple Operations, same key #3 - variable byte blocks
|
D | test_suite_pkcs1_v15.data | 67 RSAES-V15 decoding: bad first byte 70 RSAES-V15 decoding: bad second byte (0 instead of 2) 73 RSAES-V15 decoding: bad second byte (1 instead of 2) 103 EMSA-V15 decoding: bad first byte 106 EMSA-V15 decoding: bad second byte (0 instead of 1) 109 EMSA-V15 decoding: bad second byte (2 instead of 1) 118 EMSA-V15 decoding: invalid padding at first byte 121 EMSA-V15 decoding: invalid padding at last byte 127 EMSA-V15 decoding: unfinished padding with invalid first byte 130 EMSA-V15 decoding: unfinished padding with invalid last byte
|
D | target_test.function | 8 * \param p Pointer to byte array 9 * \param start Pointer to start of byte array 10 * \param len Length of byte array 27 * \brief 4 byte align unsigned char pointer 29 * \param p Pointer to byte array 30 * \param start Pointer to start of byte array 31 * \param len Length of byte array 63 * \brief Receives hex string on serial interface, and converts to a byte. 71 uint8_t byte; 79 TEST_HELPER_ASSERT( mbedtls_test_unhexify( &byte, sizeof( byte ), [all …]
|
D | test_suite_aes.xts.data | 7 AES-128-XTS Encrypt Fail Sector Too Small (by 1 byte) 10 AES-128-XTS Encrypt Fail Sector Too Large (by 1 byte) 35 # 128-bit keys with 32 byte sector 47 # 128-bit keys with 512 byte sector 68 # 256-bit keys with 512 byte sector
|
D | test_suite_psa_crypto_persistent_key.data | 65 import/export persistent raw key: 1 byte 76 import/export persistent raw key file not exist: 1 byte 91 import/export persistent raw key with restart: 1 byte 102 import/export persistent raw key file not exist with restart: 1 byte
|
D | test_suite_asn1parse.data | 61 length=0 (1 length byte) 70 length=1 (1 length byte) 85 length=2 (1 length byte) 100 length=128 (1 length byte) 106 length=255 (1 length byte)
|
D | test_suite_pkwrite.data | 41 Private key write check EC 521 bits (top byte is 0)
|
D | test_suite_ecjpake.data | 19 ECJPAKE round one: trailing byte 121 ECJPAKE round two client: trailing byte 187 ECJPAKE round two server: trailing byte
|
D | test_suite_cipher.camellia.data | 13 CAMELLIA Encrypt and decrypt 1 byte [#1] 73 CAMELLIA Encrypt and decrypt 1 byte with one and zeros padding 133 CAMELLIA Encrypt and decrypt 1 byte with zeros and len padding 193 CAMELLIA Encrypt and decrypt 1 byte with zeros padding 357 CAMELLIA Encrypt and decrypt 1 byte [#2] 461 CAMELLIA Encrypt and decrypt 1 byte [#3] 565 CAMELLIA Encrypt and decrypt 1 byte [#4] 669 CAMELLIA Encrypt and decrypt 1 byte [#5]
|
D | test_suite_asn1write.data | 241 ASN.1 Write / Read Length #6 (Len = 258, byte order) 250 ASN.1 Write / Read Length #9 (Len = 66051, byte order) 259 ASN.1 Write / Read Length #12 (Len = 16909060, byte order)
|
/openthread-2.7.6/tests/unit/ |
D | test_util.cpp | 42 uint8_t byte; in DumpBuffer() local 50 byte = *aBuffer++; in DumpBuffer() 51 printf("%02X ", byte); in DumpBuffer() 52 charBuff[counter] = isprint(byte) ? static_cast<char>(byte) : '.'; in DumpBuffer()
|
D | test_hdlc.cpp | 451 uint8_t byte; in TestEncoderDecoder() local 488 byte = kFlagSequence; in TestEncoderDecoder() 490 SuccessOrQuit(encoder.Encode(&byte, sizeof(uint8_t))); in TestEncoderDecoder() 544 byte = i & 0xff; in TestEncoderDecoder() 545 error = encoder.Encode(&byte, sizeof(uint8_t)); in TestEncoderDecoder() 548 VerifyOrQuit(encoder.Encode(&byte, sizeof(uint8_t)) == OT_ERROR_NO_BUFS, in TestEncoderDecoder() 580 byte = kFlagSequence; in TestEncoderDecoder() 582 decoder.Decode(&byte, sizeof(uint8_t)); in TestEncoderDecoder() 584 decoder.Decode(&byte, sizeof(uint8_t)); in TestEncoderDecoder() 586 decoder.Decode(&byte, sizeof(uint8_t)); in TestEncoderDecoder() [all …]
|
D | test_checksum.cpp | 121 uint8_t byte; in CorruptMessage() local 125 SuccessOrQuit(aMessage.Read(byteOffset, byte)); in CorruptMessage() 129 byte ^= (1 << bitOffset); in CorruptMessage() 131 aMessage.Write(byteOffset, byte); in CorruptMessage()
|
/openthread-2.7.6/src/core/common/ |
D | string.cpp | 164 uint8_t byte; in IsValidUtf8String() local 170 byte = *reinterpret_cast<const uint8_t *>(aString + position); in IsValidUtf8String() 173 if ((byte & 0x80) == 0) in IsValidUtf8String() 180 if ((byte & 0x40) == 0) // 10xx-xxxx in IsValidUtf8String() 185 else if ((byte & 0x20) == 0) // 110x-xxxx in IsValidUtf8String() 189 else if ((byte & 0x10) == 0) // 1110-xxxx in IsValidUtf8String() 193 else if ((byte & 0x08) == 0) // 1111-0xxx in IsValidUtf8String() 206 byte = *reinterpret_cast<const uint8_t *>(aString + position); in IsValidUtf8String() 210 VerifyOrExit((byte & 0xc0) == 0x80, ret = false); in IsValidUtf8String()
|
/openthread-2.7.6/examples/platforms/simulation/ |
D | flash.c | 138 uint8_t byte; in otPlatFlashWrite() local 148 rval = pread(sFlashFd, &byte, sizeof(byte), (off_t)(address + offset)); in otPlatFlashWrite() 149 VerifyOrDie(rval == sizeof(byte), OT_EXIT_ERROR_ERRNO); in otPlatFlashWrite() 152 byte &= ((uint8_t *)aData)[offset]; in otPlatFlashWrite() 154 rval = pwrite(sFlashFd, &byte, sizeof(byte), (off_t)(address + offset)); in otPlatFlashWrite() 155 VerifyOrDie(rval == sizeof(byte), OT_EXIT_ERROR_ERRNO); in otPlatFlashWrite()
|
/openthread-2.7.6/src/lib/hdlc/ |
D | hdlc.cpp | 223 uint8_t byte = *aData++; in Decode() local 228 if (byte == kFlagSequence) in Decode() 238 switch (byte) in Decode() 271 mFcs = UpdateFcs(mFcs, byte); in Decode() 272 IgnoreError(mWritePointer.WriteByte(byte)); in Decode() 289 byte ^= 0x20; in Decode() 290 mFcs = UpdateFcs(mFcs, byte); in Decode() 291 IgnoreError(mWritePointer.WriteByte(byte)); in Decode()
|
/openthread-2.7.6/src/core/crypto/ |
D | aes_ccm.cpp | 191 uint8_t byte; in Payload() local 213 byte = plaintextBytes[i]; in Payload() 214 ciphertextBytes[i] = byte ^ mCtrPad[mCtrLength++]; in Payload() 218 byte = ciphertextBytes[i] ^ mCtrPad[mCtrLength++]; in Payload() 219 plaintextBytes[i] = byte; in Payload() 228 mBlock[mBlockLength++] ^= byte; in Payload()
|
/openthread-2.7.6/src/lib/spinel/ |
D | spinel_decoder.cpp | 73 uint8_t byte; in ReadBool() local 75 SuccessOrExit(error = ReadUint8(byte)); in ReadBool() 78 if (byte == 0x00) in ReadBool() 82 else if (byte == 0x01) in ReadBool() 110 uint8_t byte; in ReadInt8() local 112 SuccessOrExit(error = ReadUint8(byte)); in ReadInt8() 113 aInt8 = static_cast<int8_t>(byte); in ReadInt8()
|
D | spinel.c | 179 uint8_t byte; in spinel_validate_utf8() local 182 while ((byte = *string++) != 0) in spinel_validate_utf8() 184 if ((byte & 0x80) == 0) in spinel_validate_utf8() 191 if ((byte & 0x40) == 0) // 10xx-xxxx in spinel_validate_utf8() 197 else if ((byte & 0x20) == 0) // 110x-xxxx in spinel_validate_utf8() 201 else if ((byte & 0x10) == 0) // 1110-xxxx in spinel_validate_utf8() 205 else if ((byte & 0x08) == 0) // 1111-0xxx in spinel_validate_utf8() 217 byte = *string++; in spinel_validate_utf8() 220 if ((byte & 0xc0) != 0x80) in spinel_validate_utf8()
|
/openthread-2.7.6/examples/platforms/cc2538/ |
D | uart.c | 216 uint8_t byte; in UART0IntHandler() local 225 byte = HWREG(UART0_BASE + UART_O_DR); in UART0IntHandler() 230 sReceive.mBuffer[sReceive.mTail] = byte; in UART0IntHandler()
|
/openthread-2.7.6/tests/scripts/thread-cert/ |
D | dtls.py | 271 lambda acc, byte: (acc << 8) | byte, 292 def __init__(self, byte): argument 293 self.byte = byte 296 return isinstance(self, type(other)) and self.byte == other.byte 299 return struct.pack(">B", self.byte)
|
/openthread-2.7.6/third_party/mbedtls/repo/tests/data_files/base64/ |
D | def_b64_ff.bin | 2 // character. Note that this byte is invalid UTF-8, making this
|
/openthread-2.7.6/tools/spi-hdlc-adapter/ |
D | spi-hdlc-adapter.c | 797 static bool hdlc_byte_needs_escape(uint8_t byte) in hdlc_byte_needs_escape() argument 799 switch (byte) in hdlc_byte_needs_escape() 935 uint8_t byte; in pull_hdlc() local 936 while ((ret = (int)read(sHdlcInputFd, &byte, 1)) == 1) in pull_hdlc() 945 else if (byte == HDLC_BYTE_FLAG) in pull_hdlc() 979 else if (byte == HDLC_BYTE_ESC) in pull_hdlc() 984 else if (hdlc_byte_needs_escape(byte)) in pull_hdlc() 991 byte = byte ^ HDLC_ESCAPE_XFORM; in pull_hdlc() 995 fcs = hdlc_crc16(fcs, byte); in pull_hdlc() 996 sSpiTxFrameBuffer[HEADER_LEN + sSpiTxPayloadSize++] = byte; in pull_hdlc()
|