/openthread-3.4.0/third_party/mbedtls/repo/tests/suites/ |
D | test_suite_md.data | 264 generic multi step mbedtls_md2 Test vector RFC1319 #1 268 generic multi step mbedtls_md2 Test vector RFC1319 #2 272 generic multi step mbedtls_md2 Test vector RFC1319 #3 276 generic multi step mbedtls_md2 Test vector RFC1319 #4 280 generic multi step mbedtls_md2 Test vector RFC1319 #5 284 generic multi step mbedtls_md2 Test vector RFC1319 #6 288 generic multi step mbedtls_md2 Test vector RFC1319 #7 292 generic multi step mbedtls_md4 Test vector RFC1320 #1 296 generic multi step mbedtls_md4 Test vector RFC1320 #2 300 generic multi step mbedtls_md4 Test vector RFC1320 #3 [all …]
|
D | test_suite_mps.data | 1 MPS Reader: Single step, single round, pausing disabled 4 MPS Reader: Single step, single round, pausing enabled but unused 7 MPS Reader: Single step, multiple rounds, pausing disabled 10 MPS Reader: Single step, multiple rounds, pausing enabled but unused
|
D | test_suite_psa_crypto_init.function | 36 size_t step; 45 if( state->step >= state->max_steps ) 48 *olen = MIN( len, state->length_sequence[state->step] ); 51 ++state->step; 251 fake_entropy_state.step = 0;
|
D | host_test.function | 773 if( mbedtls_test_info.step != (unsigned long)( -1 ) ) 775 mbedtls_fprintf( stdout, "step %lu, ", 776 mbedtls_test_info.step );
|
D | test_suite_asn1parse.function | 597 unsigned int step = 0; 618 mbedtls_test_set_step( step ); 629 ++step;
|
D | test_suite_dhm.function | 17 ++mbedtls_test_info.step;
|
D | test_suite_psa_crypto.data | 3305 PSA key derivation: HKDF-SHA-256, duplicate salt step 3309 PSA key derivation: HKDF-SHA-256, duplicate secret step (direct, direct) 3313 PSA key derivation: HKDF-SHA-256, duplicate secret step (direct, key) 3317 PSA key derivation: HKDF-SHA-256, duplicate secret step (key, direct) 3321 PSA key derivation: HKDF-SHA-256, duplicate secret step (key, key) 3325 PSA key derivation: HKDF-SHA-256, duplicate info step (non-consecutive) 3329 PSA key derivation: HKDF-SHA-256, duplicate info step (consecutive) 3333 PSA key derivation: HKDF-SHA-256, reject label step 3337 PSA key derivation: HKDF-SHA-256, reject seed step
|
D | test_suite_mps.function | 175 * single-step sequence of feed-fetch-commit-reclaim.
|
D | test_suite_psa_crypto.function | 4442 /* Skip this step */ 4995 /* The tests currently include inputs that should fail at either step. 4996 * Test cases that fail at the setup step should be changed to call
|
D | test_suite_ssl.function | 1012 * there is no need to call the next step */
|
/openthread-3.4.0/third_party/mbedtls/repo/tests/src/ |
D | helpers.c | 104 void mbedtls_test_set_step( unsigned long step ) in mbedtls_test_set_step() argument 106 mbedtls_test_info.step = step; in mbedtls_test_set_step() 112 mbedtls_test_info.step = (unsigned long)( -1 ); in mbedtls_test_info_reset()
|
/openthread-3.4.0/third_party/mbedtls/repo/tests/include/test/ |
D | helpers.h | 74 unsigned long step; member 128 void mbedtls_test_set_step( unsigned long step );
|
/openthread-3.4.0/third_party/mbedtls/repo/library/ |
D | psa_crypto.c | 4442 psa_key_derivation_step_t step, in psa_hkdf_input() argument 4447 switch( step ) in psa_hkdf_input() 4579 psa_key_derivation_step_t step, in psa_tls12_prf_input() argument 4583 switch( step ) in psa_tls12_prf_input() 4635 psa_key_derivation_step_t step, in psa_tls12_prf_psk_to_ms_input() argument 4639 if( step == PSA_KEY_DERIVATION_INPUT_SECRET ) in psa_tls12_prf_psk_to_ms_input() 4645 return( psa_tls12_prf_input( prf, step, data, data_length ) ); in psa_tls12_prf_psk_to_ms_input() 4659 psa_key_derivation_step_t step, in psa_key_derivation_check_input_type() argument 4662 switch( step ) in psa_key_derivation_check_input_type() 4685 psa_key_derivation_step_t step, in psa_key_derivation_input_internal() argument [all …]
|
/openthread-3.4.0/third_party/mbedtls/repo/include/psa/ |
D | crypto.h | 3457 psa_key_derivation_step_t step, 3510 psa_key_derivation_step_t step, 3580 psa_key_derivation_step_t step,
|
/openthread-3.4.0/ |
D | CONTRIBUTING.md | 20 … The best bug reports provide a detailed description of the issue and step-by-step instructions fo…
|
/openthread-3.4.0/third_party/mbedtls/repo/docs/architecture/ |
D | psa-crypto-implementation-structure.md | 66 In case of any error occurring at step 3 or 4, psa_fail_key_creation() is called. It wipes and clea…
|
/openthread-3.4.0/third_party/nlbuild-autotools/repo/ |
D | README.md | 51 into your project. The next step is using the
|
/openthread-3.4.0/third_party/nlbuild-autotools/repo/third_party/autoconf/m4/ |
D | ax_pthread.m4 | 294 # step
|
/openthread-3.4.0/third_party/mbedtls/repo/docs/proposed/ |
D | psa-driver-interface.md | 234 The entry points that implement each step of a multi-part operation are grouped into a family. A dr… 252 …ain any embedded pointers (except pointers to global data that do not change after the setup step). 712 If a failure occurs after the `"allocate_key"` step but before the call to the second driver entry …
|
/openthread-3.4.0/third_party/mbedtls/repo/ |
D | ChangeLog | 87 for algorithm values that fully encode the hashing step, as per the PSA 974 or from a buffer regardless of the step type.
|