Home
last modified time | relevance | path

Searched refs:status (Results 1 – 25 of 117) sorted by relevance

12345

/openthread-3.4.0/third_party/mbedtls/repo/programs/psa/
Dcrypto_examples.c69 psa_status_t status; in cipher_operation() local
79 status = psa_cipher_update( operation, input + bytes_written, in cipher_operation()
82 ASSERT_STATUS( status, PSA_SUCCESS ); in cipher_operation()
88 status = psa_cipher_finish( operation, output + *output_len, in cipher_operation()
90 ASSERT_STATUS( status, PSA_SUCCESS ); in cipher_operation()
94 return( status ); in cipher_operation()
108 psa_status_t status; in cipher_encrypt() local
113 status = psa_cipher_encrypt_setup( &operation, key, alg ); in cipher_encrypt()
114 ASSERT_STATUS( status, PSA_SUCCESS ); in cipher_encrypt()
116 status = psa_cipher_generate_iv( &operation, iv, iv_size, &iv_len ); in cipher_encrypt()
[all …]
Dkey_ladder_demo.c92 status = DEMO_ERROR; \
102 status = ( expr ); \
103 if( status != PSA_SUCCESS ) \
106 (int) status, \
175 psa_status_t status = PSA_SUCCESS; in save_key() local
191 return( status ); in save_key()
201 psa_status_t status = PSA_SUCCESS; in generate() local
217 return( status ); in generate()
230 psa_status_t status = PSA_SUCCESS; in import_key_from_file() local
244 status = DEMO_ERROR; in import_key_from_file()
[all …]
/openthread-3.4.0/third_party/mbedtls/repo/library/
Dpsa_crypto_slot_management.c104 psa_status_t status = PSA_ERROR_CORRUPTION_DETECTED; in psa_get_and_lock_key_slot_in_memory() local
121 status = mbedtls_svc_key_id_equal( key, slot->attr.id ) ? in psa_get_and_lock_key_slot_in_memory()
135 status = ( slot_idx < MBEDTLS_PSA_KEY_SLOT_COUNT ) ? in psa_get_and_lock_key_slot_in_memory()
139 if( status == PSA_SUCCESS ) in psa_get_and_lock_key_slot_in_memory()
141 status = psa_lock_key_slot( slot ); in psa_get_and_lock_key_slot_in_memory()
142 if( status == PSA_SUCCESS ) in psa_get_and_lock_key_slot_in_memory()
146 return( status ); in psa_get_and_lock_key_slot_in_memory()
174 psa_status_t status = PSA_ERROR_CORRUPTION_DETECTED; in psa_get_empty_key_slot() local
180 status = PSA_ERROR_BAD_STATE; in psa_get_empty_key_slot()
217 status = psa_lock_key_slot( selected_slot ); in psa_get_empty_key_slot()
[all …]
Dpsa_crypto.c607 psa_status_t status = psa_allocate_buffer_to_slot( slot, in psa_copy_key_material_into_slot() local
609 if( status != PSA_SUCCESS ) in psa_copy_key_material_into_slot()
610 return( status ); in psa_copy_key_material_into_slot()
622 psa_status_t status = PSA_ERROR_CORRUPTION_DETECTED; in psa_import_key_into_slot() local
642 status = validate_unstructured_key_bit_size( type, *bits ); in psa_import_key_into_slot()
643 if( status != PSA_SUCCESS ) in psa_import_key_into_slot()
644 return( status ); in psa_import_key_into_slot()
969 psa_status_t status = PSA_ERROR_CORRUPTION_DETECTED; in psa_get_and_lock_key_slot_with_policy() local
972 status = psa_get_and_lock_key_slot( key, p_slot ); in psa_get_and_lock_key_slot_with_policy()
973 if( status != PSA_SUCCESS ) in psa_get_and_lock_key_slot_with_policy()
[all …]
Dpsa_crypto_driver_wrappers.c71 psa_status_t status = PSA_ERROR_CORRUPTION_DETECTED; in psa_driver_wrapper_init() local
74 status = psa_init_all_se_drivers( ); in psa_driver_wrapper_init()
75 if( status != PSA_SUCCESS ) in psa_driver_wrapper_init()
76 return( status ); in psa_driver_wrapper_init()
80 status = mbedtls_test_transparent_init( ); in psa_driver_wrapper_init()
81 if( status != PSA_SUCCESS ) in psa_driver_wrapper_init()
82 return( status ); in psa_driver_wrapper_init()
84 status = mbedtls_test_opaque_init( ); in psa_driver_wrapper_init()
85 if( status != PSA_SUCCESS ) in psa_driver_wrapper_init()
86 return( status ); in psa_driver_wrapper_init()
[all …]
Dpsa_crypto_storage.c95 psa_status_t status; in psa_crypto_storage_load() local
100 status = psa_its_get_info( data_identifier, &data_identifier_info ); in psa_crypto_storage_load()
101 if( status != PSA_SUCCESS ) in psa_crypto_storage_load()
102 return( status ); in psa_crypto_storage_load()
104 status = psa_its_get( data_identifier, 0, (uint32_t) data_size, data, &data_length ); in psa_crypto_storage_load()
108 return( status ); in psa_crypto_storage_load()
145 psa_status_t status; in psa_crypto_storage_store() local
152 status = psa_its_set( data_identifier, (uint32_t) data_length, data, 0 ); in psa_crypto_storage_store()
153 if( status != PSA_SUCCESS ) in psa_crypto_storage_store()
158 status = psa_its_get_info( data_identifier, &data_identifier_info ); in psa_crypto_storage_store()
[all …]
Dpsa_crypto_mac.c51 psa_status_t status; in psa_hmac_setup_internal() local
70 status = psa_hash_compute( hash_alg, key, key_length, in psa_hmac_setup_internal()
72 if( status != PSA_SUCCESS ) in psa_hmac_setup_internal()
94 status = psa_hash_setup( &hmac->hash_ctx, hash_alg ); in psa_hmac_setup_internal()
95 if( status != PSA_SUCCESS ) in psa_hmac_setup_internal()
98 status = psa_hash_update( &hmac->hash_ctx, ipad, block_size ); in psa_hmac_setup_internal()
103 return( status ); in psa_hmac_setup_internal()
123 psa_status_t status; in psa_hmac_finish_internal() local
125 status = psa_hash_finish( &hmac->hash_ctx, tmp, sizeof( tmp ), &hash_size ); in psa_hmac_finish_internal()
126 if( status != PSA_SUCCESS ) in psa_hmac_finish_internal()
[all …]
Dpsa_crypto_rsa.c60 psa_status_t status; in psa_check_rsa_key_byte_aligned() local
62 status = mbedtls_to_psa_error( in psa_check_rsa_key_byte_aligned()
64 if( status == PSA_SUCCESS ) in psa_check_rsa_key_byte_aligned()
67 status = PSA_ERROR_NOT_SUPPORTED; in psa_check_rsa_key_byte_aligned()
70 return( status ); in psa_check_rsa_key_byte_aligned()
77 psa_status_t status; in mbedtls_psa_rsa_load_representation() local
84 status = mbedtls_to_psa_error( in mbedtls_psa_rsa_load_representation()
87 status = mbedtls_to_psa_error( in mbedtls_psa_rsa_load_representation()
89 if( status != PSA_SUCCESS ) in mbedtls_psa_rsa_load_representation()
96 status = PSA_ERROR_INVALID_ARGUMENT; in mbedtls_psa_rsa_load_representation()
[all …]
Dpsa_crypto_ecp.c54 psa_status_t status; in mbedtls_psa_ecp_load_representation() local
110 status = PSA_ERROR_NOT_SUPPORTED; in mbedtls_psa_ecp_load_representation()
114 status = mbedtls_to_psa_error( in mbedtls_psa_ecp_load_representation()
116 if( status != PSA_SUCCESS ) in mbedtls_psa_ecp_load_representation()
123 status = mbedtls_to_psa_error( in mbedtls_psa_ecp_load_representation()
127 if( status != PSA_SUCCESS ) in mbedtls_psa_ecp_load_representation()
131 status = mbedtls_to_psa_error( in mbedtls_psa_ecp_load_representation()
133 if( status != PSA_SUCCESS ) in mbedtls_psa_ecp_load_representation()
139 status = mbedtls_to_psa_error( in mbedtls_psa_ecp_load_representation()
144 if( status != PSA_SUCCESS ) in mbedtls_psa_ecp_load_representation()
[all …]
Dpsa_crypto_aead.c82 psa_status_t status = PSA_ERROR_CORRUPTION_DETECTED; in psa_aead_setup() local
109 status = mbedtls_to_psa_error( in psa_aead_setup()
112 if( status != PSA_SUCCESS ) in psa_aead_setup()
113 return( status ); in psa_aead_setup()
128 status = mbedtls_to_psa_error( in psa_aead_setup()
131 if( status != PSA_SUCCESS ) in psa_aead_setup()
132 return( status ); in psa_aead_setup()
145 status = mbedtls_to_psa_error( in psa_aead_setup()
148 if( status != PSA_SUCCESS ) in psa_aead_setup()
149 return( status ); in psa_aead_setup()
[all …]
Dpsa_crypto_cipher.c272 psa_status_t status = PSA_ERROR_CORRUPTION_DETECTED; in psa_cipher_update_ecb() local
279 status = PSA_SUCCESS; in psa_cipher_update_ecb()
299 status = mbedtls_to_psa_error( in psa_cipher_update_ecb()
305 if( status != PSA_SUCCESS ) in psa_cipher_update_ecb()
317 status = mbedtls_to_psa_error( in psa_cipher_update_ecb()
322 if( status != PSA_SUCCESS ) in psa_cipher_update_ecb()
340 status = PSA_SUCCESS; in psa_cipher_update_ecb()
343 return( status ); in psa_cipher_update_ecb()
351 psa_status_t status = PSA_ERROR_CORRUPTION_DETECTED; in mbedtls_psa_cipher_update() local
377 status = psa_cipher_update_ecb( &operation->ctx.cipher, in mbedtls_psa_cipher_update()
[all …]
Dpsa_crypto_se.c145 psa_status_t status; in psa_load_se_persistent_data() local
149 status = psa_get_se_driver_its_file_uid( driver, &uid ); in psa_load_se_persistent_data()
150 if( status != PSA_SUCCESS ) in psa_load_se_persistent_data()
151 return( status ); in psa_load_se_persistent_data()
169 psa_status_t status; in psa_save_se_persistent_data() local
172 status = psa_get_se_driver_its_file_uid( driver, &uid ); in psa_save_se_persistent_data()
173 if( status != PSA_SUCCESS ) in psa_save_se_persistent_data()
174 return( status ); in psa_save_se_persistent_data()
200 psa_status_t status; in psa_find_se_slot_for_key() local
222 status = p_validate_slot_number( &driver->u.context, in psa_find_se_slot_for_key()
[all …]
Dpsa_its_file.c126 psa_status_t status; in psa_its_get_info() local
128 status = psa_its_read_file( uid, p_info, &stream ); in psa_its_get_info()
131 return( status ); in psa_its_get_info()
140 psa_status_t status; in psa_its_get() local
145 status = psa_its_read_file( uid, &info, &stream ); in psa_its_get()
146 if( status != PSA_SUCCESS ) in psa_its_get()
148 status = PSA_ERROR_INVALID_ARGUMENT; in psa_its_get()
158 status = PSA_ERROR_STORAGE_FAILURE; in psa_its_get()
172 status = PSA_SUCCESS; in psa_its_get()
179 return( status ); in psa_its_get()
[all …]
Dpsa_crypto_hash.c378 psa_status_t status; in mbedtls_psa_hash_finish() local
393 status = PSA_ERROR_BUFFER_TOO_SMALL; in mbedtls_psa_hash_finish()
448 status = mbedtls_to_psa_error( ret ); in mbedtls_psa_hash_finish()
451 if( status == PSA_SUCCESS ) in mbedtls_psa_hash_finish()
453 return( status ); in mbedtls_psa_hash_finish()
465 psa_status_t status = PSA_ERROR_CORRUPTION_DETECTED; in mbedtls_psa_hash_compute() local
469 status = mbedtls_psa_hash_setup( &operation, alg ); in mbedtls_psa_hash_compute()
470 if( status != PSA_SUCCESS ) in mbedtls_psa_hash_compute()
472 status = mbedtls_psa_hash_update( &operation, input, input_length ); in mbedtls_psa_hash_compute()
473 if( status != PSA_SUCCESS ) in mbedtls_psa_hash_compute()
[all …]
/openthread-3.4.0/third_party/mbedtls/repo/tests/suites/
Dtest_suite_psa_crypto_entropy.function125 psa_status_t status;
145 status = remove_seed_file( );
146 TEST_ASSERT( ( status == PSA_SUCCESS ) ||
147 ( status == PSA_ERROR_DOES_NOT_EXIST ) );
148 status = mbedtls_psa_inject_entropy( seed, seed_length_a );
149 TEST_EQUAL( status, expected_status_a );
150 status = mbedtls_psa_inject_entropy( seed, seed_length_b );
151 TEST_EQUAL( status, expected_status_b );
166 psa_status_t status;
174 status = remove_seed_file( );
[all …]
Dtest_suite_psa_crypto_driver_wrappers.function524 psa_status_t status;
611 status = psa_cipher_finish( &operation,
619 TEST_EQUAL( status, expected_status );
656 psa_status_t status;
744 status = psa_cipher_finish( &operation,
752 TEST_EQUAL( status, expected_status );
784 psa_status_t status;
825 status = psa_cipher_decrypt( key, alg, input, input_buffer_size, output,
830 TEST_EQUAL( status, expected_status );
853 psa_status_t status;
[all …]
Dtest_suite_psa_crypto_init.function152 psa_status_t status;
156 status = psa_crypto_init( );
157 PSA_ASSERT( status );
158 status = psa_crypto_init( );
159 PSA_ASSERT( status );
181 psa_status_t status;
186 status = psa_crypto_init( );
187 PSA_ASSERT( status );
190 status = psa_generate_random( random, sizeof( random ) );
191 TEST_EQUAL( status, PSA_ERROR_BAD_STATE );
[all …]
/openthread-3.4.0/third_party/mbedtls/repo/docs/
Dgetting_started.md77 psa_status_t status;
85 status = psa_crypto_init();
86 if (status != PSA_SUCCESS) {
98 status = psa_import_key(&attributes, key, key_len, &key_id);
99 if (status != PSA_SUCCESS) {
130 psa_status_t status;
144 status = psa_crypto_init();
145 if (status != PSA_SUCCESS) {
157 status = psa_import_key(&attributes, key, key_len, &key_id);
158 if (status != PSA_SUCCESS) {
[all …]
/openthread-3.4.0/tools/harness-simulation/posix/etc/
Dserver.patch9 sudo service rsyslog status || sudo service rsyslog start || die 'Failed to start rsyslog!'
10 sudo service dbus status || sudo service dbus start || die 'Failed to start dbus!'
12 …sudo service avahi-daemon status || sudo service avahi-daemon start || die 'Failed to start avahi!'
13 …sudo service otbr-agent status || sudo service otbr-agent start || die 'Failed to start otbr-agent…
14 …without WEB_GUI || sudo service otbr-web status || sudo service otbr-web start || die 'Failed to s…
15 + sudo service commissionerd status || sudo service commissionerd start || die 'Failed to st…
/openthread-3.4.0/script/
Dcheck-core-makefiles42 status=$(git status --porcelain)
44 if [ -n "${status}" ]; then
/openthread-3.4.0/third_party/mbedtls/repo/tests/src/drivers/
Dtest_driver_signature.c221 psa_status_t status = PSA_ERROR_CORRUPTION_DETECTED; in mbedtls_test_transparent_signature_sign_message() local
244 status = libtestdriver1_mbedtls_psa_hash_compute( in mbedtls_test_transparent_signature_sign_message()
248 status = mbedtls_psa_hash_compute( in mbedtls_test_transparent_signature_sign_message()
254 status = PSA_ERROR_NOT_SUPPORTED; in mbedtls_test_transparent_signature_sign_message()
256 if( status != PSA_SUCCESS ) in mbedtls_test_transparent_signature_sign_message()
257 return status; in mbedtls_test_transparent_signature_sign_message()
298 psa_status_t status = PSA_ERROR_CORRUPTION_DETECTED; in mbedtls_test_transparent_signature_verify_message() local
309 status = libtestdriver1_mbedtls_psa_hash_compute( in mbedtls_test_transparent_signature_verify_message()
313 status = mbedtls_psa_hash_compute( in mbedtls_test_transparent_signature_verify_message()
319 status = PSA_ERROR_NOT_SUPPORTED; in mbedtls_test_transparent_signature_verify_message()
[all …]
/openthread-3.4.0/tools/harness-simulation/posix/sniffer_sim/
Dsniffer.py88 return sniffer_pb2.StartResponse(status=sniffer_pb2.OPERATION_ERROR)
123 return sniffer_pb2.StartResponse(status=sniffer_pb2.OK)
146 return sniffer_pb2.FilterNodesResponse(status=sniffer_pb2.OPERATION_ERROR)
179 return sniffer_pb2.FilterNodesResponse(status=sniffer_pb2.OPERATION_ERROR)
185 return sniffer_pb2.FilterNodesResponse(status=sniffer_pb2.VALUE_ERROR)
190 return sniffer_pb2.FilterNodesResponse(status=sniffer_pb2.OK)
199 return sniffer_pb2.StopResponse(status=sniffer_pb2.OPERATION_ERROR)
214 return sniffer_pb2.StopResponse(status=sniffer_pb2.OK)
/openthread-3.4.0/third_party/mbedtls/repo/tests/src/
Dpsa_exercise_key.c76 psa_status_t status = psa_get_key_slot_number( &attributes, &slot_number ); in check_key_attributes_sanity() local
82 TEST_EQUAL( status, 0 ); in check_key_attributes_sanity()
87 TEST_EQUAL( status, PSA_ERROR_INVALID_ARGUMENT ); in check_key_attributes_sanity()
194 psa_status_t status; in exercise_cipher_key() local
214 status = psa_cipher_finish( &operation, in exercise_cipher_key()
222 TEST_ASSERT( status == PSA_SUCCESS || in exercise_cipher_key()
223 status == PSA_ERROR_INVALID_PADDING ); in exercise_cipher_key()
225 PSA_ASSERT( status ); in exercise_cipher_key()
401 psa_status_t status = in exercise_asymmetric_encryption_key() local
407 TEST_ASSERT( status == PSA_SUCCESS || in exercise_asymmetric_encryption_key()
[all …]
/openthread-3.4.0/tests/scripts/thread-cert/
Dtest_network_layer.py260 status = any_status()
262 status_obj = network_layer.Status(status)
265 actual_status = status_obj.status
268 self.assertEqual(status, actual_status)
272 status = any_status()
274 status_obj = network_layer.Status(status)
277 self.assertEqual(status_obj, network_layer.Status(status))
284 status = any_status()
288 data = bytearray([status])
295 self.assertEqual(status, status_obj.status)
/openthread-3.4.0/src/core/thread/
Dlink_metrics.cpp136 uint8_t status; in HandleReport() local
159 SuccessOrExit(error = Tlv::Read<StatusSubTlv>(aMessage, offset, status)); in HandleReport()
222 hasStatus ? static_cast<Status>(status) : kStatusSuccess); in HandleReport()
310 uint8_t status; in HandleManagementResponse() local
328 SuccessOrExit(error = Tlv::Read<StatusSubTlv>(aMessage, offset, status)); in HandleManagementResponse()
341 mMgmtResponseCallback.Invoke(&aAddress, status); in HandleManagementResponse()
702 Status status = kStatusSuccess; in ConfigureForwardTrackingSeries() local
704 VerifyOrExit(0 < aSeriesId, status = kStatusOtherError); in ConfigureForwardTrackingSeries()
715 VerifyOrExit(seriesInfo != nullptr, status = kStatusSeriesIdNotRecognized); in ConfigureForwardTrackingSeries()
722 VerifyOrExit(seriesInfo == nullptr, status = kStatusSeriesIdAlreadyRegistered); in ConfigureForwardTrackingSeries()
[all …]

12345