Home
last modified time | relevance | path

Searched refs:Crypto (Results 1 – 25 of 87) sorted by relevance

1234

/openthread-latest/src/core/thread/
Dkey_manager.cpp185 mNetworkKeyRef = Crypto::Storage::kInvalidKeyRef; in KeyManager()
186 mPskcRef = Crypto::Storage::kInvalidKeyRef; in KeyManager()
210 if (Crypto::Storage::IsKeyRefValid(mPskcRef)) in SetPskc()
263 if (Crypto::Storage::IsKeyRefValid(mNetworkKeyRef)) in SetNetworkKey()
289 Crypto::HmacSha256 hmac; in ComputeKeys()
291 Crypto::Key cryptoKey; in ComputeKeys()
311 Crypto::HkdfSha256 hkdf; in ComputeTrelKey()
313 Crypto::Key cryptoKey; in ComputeTrelKey()
548 if (Crypto::Storage::HasKey(mNetworkKeyRef)) in GetNetworkKey()
552 …SuccessOrAssert(Crypto::Storage::ExportKey(mNetworkKeyRef, aNetworkKey.m8, NetworkKey::kSize, keyL… in GetNetworkKey()
[all …]
Dkey_manager.hpp150 Error GenerateRandom(void) { return Random::Crypto::Fill(*this); } in GenerateRandom()
177 Error GenerateRandom(void) { return Random::Crypto::Fill(*this); } in GenerateRandom()
567 Crypto::HmacSha256::Hash mHash;
/openthread-latest/tests/unit/
Dtest_hmac_sha256.cpp101 Crypto::Sha256 sha256; in TestSha256()
102 Crypto::Sha256::Hash hash; in TestSha256()
108 VerifyOrQuit(hash == static_cast<const Crypto::HmacSha256::Hash &>(testCase.mHash)); in TestSha256()
127 Crypto::Sha256 sha256; in TestSha256()
128 Crypto::Sha256::Hash hash; in TestSha256()
134 VerifyOrQuit(hash == static_cast<const Crypto::HmacSha256::Hash &>(testCase.mHash)); in TestSha256()
244 Crypto::HmacSha256 hmac; in TestHmacSha256()
245 Crypto::HmacSha256::Hash hash; in TestHmacSha256()
247 hmac.Start(static_cast<const Crypto::Key &>(testCase.mKey)); in TestHmacSha256()
251 VerifyOrQuit(hash == static_cast<const Crypto::HmacSha256::Hash &>(testCase.mHash)); in TestHmacSha256()
[all …]
Dtest_aes.cpp61 Crypto::AesCcm aesCcm; in TestMacBeaconFrame()
129 Crypto::AesCcm aesCcm; in TestMacCommandFrame()
136 …aesCcm.Payload(test + kHeaderLength, test + kHeaderLength, kPayloadLength, Crypto::AesCcm::kEncryp… in TestMacCommandFrame()
143 …aesCcm.Payload(test + kHeaderLength, test + kHeaderLength, kPayloadLength, Crypto::AesCcm::kDecryp… in TestMacCommandFrame()
159 aesCcm.Payload(*message, kHeaderLength, kPayloadLength, Crypto::AesCcm::kEncrypt); in TestMacCommandFrame()
168 aesCcm.Payload(*message, kHeaderLength, kPayloadLength, Crypto::AesCcm::kDecrypt); in TestMacCommandFrame()
198 Crypto::AesCcm aesCcm; in TestInPlaceAesCcmProcessing()
230 … aesCcm.Payload(*message, kHeaderLength, msgLength - kHeaderLength, Crypto::AesCcm::kEncrypt); in TestInPlaceAesCcmProcessing()
241 … aesCcm.Payload(*message, kHeaderLength, msgLength - kHeaderLength, Crypto::AesCcm::kDecrypt); in TestInPlaceAesCcmProcessing()
Dtest_ecdsa.cpp45 namespace Crypto { namespace
189 ot::Crypto::TestEcdsaVector(); in main()
190 ot::Crypto::TestEcdsaKeyGenerationSignAndVerify(); in main()
Dtest_hkdf_sha256.cpp133 Crypto::HkdfSha256 hkdf; in TestHkdfSha256()
135 Crypto::Key testInputKey; in TestHkdfSha256()
/openthread-latest/src/core/mac/
Dmac_types.cpp60 IgnoreError(Random::Crypto::Fill(*this)); in GenerateRandom()
331 SuccessOrAssert(Crypto::Storage::ImportKey(keyRef, Crypto::Storage::kKeyTypeAes, in SetFrom()
332 Crypto::Storage::kKeyAlgorithmAesEcb, in SetFrom()
333 … (aIsExportable ? Crypto::Storage::kUsageExport : 0) | in SetFrom()
334Crypto::Storage::kUsageEncrypt | Crypto::Storage::kUsageDecrypt, in SetFrom()
335Crypto::Storage::kTypeVolatile, aKey.GetBytes(), Key::kSize)); in SetFrom()
350 if (Crypto::Storage::IsKeyRefValid(GetKeyRef())) in ExtractKey()
354 SuccessOrAssert(Crypto::Storage::ExportKey(GetKeyRef(), aKey.m8, Key::kSize, keySize)); in ExtractKey()
361 void KeyMaterial::ConvertToCryptoKey(Crypto::Key &aCryptoKey) const in ConvertToCryptoKey()
373 Crypto::Storage::DestroyKey(GetKeyRef()); in DestroyKey()
/openthread-latest/src/core/crypto/
Decdsa.hpp52 namespace Crypto { namespace
234 … return Crypto::Storage::ImportKey(mKeyRef, Storage::kKeyTypeEcdsa, Storage::kKeyAlgorithmEcdsa, in ImportKeyPair()
340 DefineCoreType(otPlatCryptoEcdsaSignature, Crypto::Ecdsa::P256::Signature);
341 DefineCoreType(otPlatCryptoEcdsaKeyPair, Crypto::Ecdsa::P256::KeyPair);
342 DefineCoreType(otPlatCryptoEcdsaPublicKey, Crypto::Ecdsa::P256::PublicKey);
Dsha256.hpp55 namespace Crypto { namespace
148 DefineCoreType(otCryptoSha256Hash, Crypto::Sha256::Hash);
Dstorage.cpp39 namespace Crypto { namespace
50 SuccessOrAssert(Crypto::Storage::ExportKey(GetKeyRef(), aKeyBuffer, aKeyLength, readKeyLength)); in ExtractKey()
Dmbedtls.cpp52 namespace Crypto { namespace
177 IgnoreError(ot::Random::Crypto::FillBuffer(aBuffer, static_cast<uint16_t>(aSize))); in CryptoSecurePrng()
Dstorage.hpp49 namespace Crypto { namespace
389 DefineCoreType(otCryptoKey, Crypto::Key);
Dmbedtls.hpp61 namespace Crypto { namespace
Daes_ecb.hpp46 namespace Crypto { namespace
Dhkdf_sha256.hpp47 namespace Crypto { namespace
Daes_ecb.cpp39 namespace Crypto { namespace
/openthread-latest/third_party/mbedtls/repo/docs/
Duse-psa-crypto.md7 - enables new APIs for using keys handled by PSA Crypto, such as
28 - `MBEDTLS_PSA_CRYPTO_C` enables the implementation of the PSA Crypto API.
32 PSA Crypto but you're not required to call `psa_crypto_init()` before calling
34 - `MBEDTLS_USE_PSA_CRYPTO` means that X.509 and TLS will use PSA Crypto as
36 supported by PSA Crypto, see "Internal Changes" below for a complete list of
43 uses PSA crypto. The parts of the TLS 1.3 code that will use PSA Crypto or not
52 **Historical note:** This option was introduced at a time when PSA Crypto was
56 TLS, as well as some of PK for technical reasons. Nowadays PSA Crypto is no
58 its use in other modules opt-in. However, PSA Crypto functions require that
76 **Benefits:** isolation of long-term secrets, use of PSA Crypto drivers.
Ddriver-only-builds.md20 - `MBEDTLS_PSA_CRYPTO_C` (enabled by default) - this enables PSA Crypto.
22 TLS use PSA Crypto. You need to enable this if you're using PK, X.509 or TLS
34 means the algorithm will be available in the PSA Crypto API.
49 the PSA Crypto API, as well as for use of the PK, X.509 and TLS modules when
92 In such a build, all crypto operations (via the PSA Crypto API, or non-PSA
105 - for code that uses only the PSA Crypto API: `PSA_WANT_ALG_xxx` from
179 In such builds, all crypto operations via the PSA Crypto API will work as
191 - for code that uses only the PSA Crypto API: `PSA_WANT_ECC_xxx` from
293 `MBEDTLS_PKCS1_V21`, and RSA will still work in PSA Crypto.
298 PSA Crypto works. In particular, PK, X.509 and TLS will _not_ work with
[all …]
/openthread-latest/third_party/mbedtls/repo/framework/
DREADME.md3 …on-independent build and test framework for [TF-PSA-Crypto](https://github.com/Mbed-TLS/TF-PSA-Cry…
8 * You want to build, test or contribute to TF-PSA-Crypto, and you are working from a snapshot of a …
/openthread-latest/src/core/utils/
Dslaac_address.cpp425 Crypto::Sha256 sha256; in GenerateIid()
426 Crypto::Sha256::Hash hash; in GenerateIid()
494 error = Random::Crypto::Fill(aKey); in GetIidSecretKey()
498 IgnoreError(Random::Crypto::Fill(aKey)); in GetIidSecretKey()
/openthread-latest/src/core/meshcop/
Ddataset_manager.hpp241 using KeyRef = Crypto::Storage::KeyRef;
242 using KeyRefManager = Crypto::Storage::KeyRefManager;
243 using KeyRefType = Crypto::Storage::KeyRefManager::Type;
Dtcat_agent.cpp710 SuccessOrExit(error = Random::Crypto::Fill(mRandomChallenge)); in HandleRequestRandomNumberChallenge()
727 Crypto::HmacSha256::Hash hash; in HandleRequestPskdHash()
738 Crypto::HmacSha256::Hash::kSize)); in HandleRequestPskdHash()
752 Crypto::HmacSha256::Hash hash; in VerifyHash()
754 VerifyOrExit(aLength == Crypto::HmacSha256::Hash::kSize, error = kErrorSecurity); in VerifyHash()
765 void TcatAgent::CalculateHash(uint64_t aChallenge, const char *aBuf, size_t aBufLen, Crypto::HmacSh… in CalculateHash()
768 Crypto::Key cryptoKey; in CalculateHash()
769 Crypto::HmacSha256 hmac; in CalculateHash()
Dsecure_transport.cpp202 mbedtls_ssl_conf_rng(&mConf, Crypto::MbedTls::CryptoSecurePrng, nullptr); in Setup()
281 … rval = mbedtls_ssl_cookie_setup(&mCookieCtx, Crypto::MbedTls::CryptoSecurePrng, nullptr); in Setup()
324 error = (error == kErrorNone) ? Crypto::MbedTls::MapError(rval) : error; in Setup()
364 SuccessOrExit(error = Crypto::MbedTls::MapError(mbedtls_ssl_write(&mSsl, buffer, length))); in Send()
915 Crypto::Sha256::Hash kek; in HandleMbedtlsExportKeys()
916 Crypto::Sha256 sha256; in HandleMbedtlsExportKeys()
961 Crypto::Sha256::Hash kek; in HandleMbedtlsExportKeys()
962 Crypto::Sha256 sha256; in HandleMbedtlsExportKeys()
1127 Crypto::MbedTls::CryptoSecurePrng, nullptr); in SetSecureKeys()
/openthread-latest/src/core/api/
Drandom_crypto_api.cpp44 return Random::Crypto::FillBuffer(aBuffer, aSize); in otRandomCryptoFillBuffer()
/openthread-latest/third_party/mbedtls/repo/tests/suites/
Dtest_suite_block_cipher.function115 /* Now initilize PSA Crypto */
119 /* After PSA Crypto init */

1234