Home
last modified time | relevance | path

Searched refs:second (Results 1 – 18 of 18) sorted by relevance

/openthread-3.6.0/third_party/mbedtls/repo/tests/suites/
Dtest_suite_ecjpake.data43 ECJPAKE round one: KKP1: length of second point too small
46 ECJPAKE round one: KKP1: length of second point too big
49 ECJPAKE round one: KKP1: no second point data
52 ECJPAKE round one: KKP1: unknow second point format
55 ECJPAKE round one: KKP1: nothing after second point
91 ECJPAKE round one: KKP2: length of second point too small
94 ECJPAKE round one: KKP2: length of second point too big
97 ECJPAKE round one: KKP2: no second point data
100 ECJPAKE round one: KKP2: unknow second point format
103 ECJPAKE round one: KKP2: nothing after second point
[all …]
Dtest_suite_pkcs1_v15.data70 RSAES-V15 decoding: bad second byte (0 instead of 2)
73 RSAES-V15 decoding: bad second byte (1 instead of 2)
106 EMSA-V15 decoding: bad second byte (0 instead of 1)
109 EMSA-V15 decoding: bad second byte (2 instead of 1)
Dtest_suite_asn1parse.data451 SEQUENCE of 2 OCTET STRINGs, second truncated after tag
454 SEQUENCE of 2 OCTET STRINGs, second truncated in length #1
457 SEQUENCE of 2 OCTET STRINGs, second truncated in length #2
460 SEQUENCE of 2 OCTET STRINGs, second truncated in content #1
463 SEQUENCE of 2 OCTET STRINGs, second truncated in content #2
466 SEQUENCE of 2 OCTET STRINGs, second truncated in content #3
Dtest_suite_psa_crypto_se_driver_hal.data4 # Run this test case a second time to verify that the library deinit
Dtest_suite_hmac_drbg.function206 /* Reset context for second run */
Dtest_suite_mpi.function882 /* result == second operand */
942 /* result == second operand */
990 /* result == second operand */
1026 /* result == second operand */
Dtest_suite_mps.function441 /* In all cases, fetch the rest of the second buffer. */
665 * second time.
1105 /* In all succeeding cases, fetch the rest of the second buffer. */
Dtest_suite_ssl.function990 * /p second_ssl is used as second endpoint and their sockets have to be
1538 * cannot be fragmented and sent to the second endpoint.
1560 * At the second time use message with generated data */
2849 /* Send two message to the server, second one with an error */
2899 /* Send two messages to the server, the second one small enough to fit in the
2909 /* Test that the first half of the message is valid, and second one isn't */
3991 /* Allocate second buffer and serialize to it */
Dtest_suite_ecp.data455 ECP read key #6 (Curve25519, second most significant bit unset)
Dtest_suite_x509parse.data826 X509 CRT verification #78 (multiple CRLs, revoked by second)
834 X509 CRT verification #80 (multiple CRLs, first future, revoked by second)
1849 X509 CRT ASN1 (TBS, inv v3Ext, ExtKeyUsage bad second tag)
2419 X509 CRT extendedKeyUsage #5 (two values, second)
2723 X509 Get time (UTC without second and with invalid time zone #2)
/openthread-3.6.0/third_party/tcplp/lib/test/
Dtest_all.c81 struct otLinkedBuffer second; in cbuf_test() local
82 cbuf_reference(chdr, &first, &second); in cbuf_test()
87 assert(first.mNext == &second); in cbuf_test()
88 memcpy(&buf_string[first.mLength], &second.mData[0], second.mLength); in cbuf_test()
89 assert(second.mNext == NULL); in cbuf_test()
90 buf_string[first.mLength + second.mLength] = '\0'; in cbuf_test()
/openthread-3.6.0/third_party/tcplp/lib/
Dcbuf.c269 void cbuf_reference(const struct cbufhead* chdr, otLinkedBuffer* first, otLinkedBuffer* second) { in cbuf_reference() argument
276 first->mNext = second; in cbuf_reference()
280 second->mNext = NULL; in cbuf_reference()
281 second->mData = &chdr->buf[0]; in cbuf_reference()
282 second->mLength = (uint16_t) (chdr->used - until_end); in cbuf_reference()
Dcbuf.h92 …eference(const struct cbufhead* chdr, struct otLinkedBuffer* first, struct otLinkedBuffer* second);
/openthread-3.6.0/tests/unit/
Dtest_platform.cpp271 if (aIndex > setting->second.size()) in otPlatSettingsGet()
281 const auto &data = setting->second[aIndex]; in otPlatSettingsGet()
325 if (aIndex >= setting->second.size()) in otPlatSettingsDelete()
329 setting->second.erase(setting->second.begin() + aIndex); in otPlatSettingsDelete()
/openthread-3.6.0/third_party/mbedtls/repo/configs/
DREADME.txt25 Note that the second method also works if you want to keep your custom
/openthread-3.6.0/third_party/mbedtls/repo/docs/proposed/
Dpsa-driver-interface.md418 2. The core makes a second round of calls with the `BLOCK` flag set and the `KEEPALIVE` flag clear …
419 3. If the second round does not collect enough entropy, the core makes more similar rounds, until t…
712 If a failure occurs after the `"allocate_key"` step but before the call to the second driver entry …
/openthread-3.6.0/third_party/mbedtls/repo/
DChangeLog573 (an error condition) and the second operand was aliased to the result.
937 * The initial seeding of a CTR_DRBG instance makes a second call to the
1272 * Make mbedtls_ecdh_get_params return an error if the second key
1275 interpreted according to the second group, which could lead to either
/openthread-3.6.0/src/cli/
DREADME.md375 - The second number shows number of buffers used by all messages in the queue.