/openthread-latest/src/core/thread/ |
D | key_manager.cpp | 185 mNetworkKeyRef = Crypto::Storage::kInvalidKeyRef; in KeyManager() 186 mPskcRef = Crypto::Storage::kInvalidKeyRef; in KeyManager() 210 if (Crypto::Storage::IsKeyRefValid(mPskcRef)) in SetPskc() 263 if (Crypto::Storage::IsKeyRefValid(mNetworkKeyRef)) in SetNetworkKey() 289 Crypto::HmacSha256 hmac; in ComputeKeys() 291 Crypto::Key cryptoKey; in ComputeKeys() 311 Crypto::HkdfSha256 hkdf; in ComputeTrelKey() 313 Crypto::Key cryptoKey; in ComputeTrelKey() 548 if (Crypto::Storage::HasKey(mNetworkKeyRef)) in GetNetworkKey() 552 …SuccessOrAssert(Crypto::Storage::ExportKey(mNetworkKeyRef, aNetworkKey.m8, NetworkKey::kSize, keyL… in GetNetworkKey() [all …]
|
D | key_manager.hpp | 150 Error GenerateRandom(void) { return Random::Crypto::Fill(*this); } in GenerateRandom() 177 Error GenerateRandom(void) { return Random::Crypto::Fill(*this); } in GenerateRandom() 567 Crypto::HmacSha256::Hash mHash;
|
/openthread-latest/tests/unit/ |
D | test_hmac_sha256.cpp | 101 Crypto::Sha256 sha256; in TestSha256() 102 Crypto::Sha256::Hash hash; in TestSha256() 108 VerifyOrQuit(hash == static_cast<const Crypto::HmacSha256::Hash &>(testCase.mHash)); in TestSha256() 127 Crypto::Sha256 sha256; in TestSha256() 128 Crypto::Sha256::Hash hash; in TestSha256() 134 VerifyOrQuit(hash == static_cast<const Crypto::HmacSha256::Hash &>(testCase.mHash)); in TestSha256() 244 Crypto::HmacSha256 hmac; in TestHmacSha256() 245 Crypto::HmacSha256::Hash hash; in TestHmacSha256() 247 hmac.Start(static_cast<const Crypto::Key &>(testCase.mKey)); in TestHmacSha256() 251 VerifyOrQuit(hash == static_cast<const Crypto::HmacSha256::Hash &>(testCase.mHash)); in TestHmacSha256() [all …]
|
D | test_aes.cpp | 61 Crypto::AesCcm aesCcm; in TestMacBeaconFrame() 129 Crypto::AesCcm aesCcm; in TestMacCommandFrame() 136 …aesCcm.Payload(test + kHeaderLength, test + kHeaderLength, kPayloadLength, Crypto::AesCcm::kEncryp… in TestMacCommandFrame() 143 …aesCcm.Payload(test + kHeaderLength, test + kHeaderLength, kPayloadLength, Crypto::AesCcm::kDecryp… in TestMacCommandFrame() 159 aesCcm.Payload(*message, kHeaderLength, kPayloadLength, Crypto::AesCcm::kEncrypt); in TestMacCommandFrame() 168 aesCcm.Payload(*message, kHeaderLength, kPayloadLength, Crypto::AesCcm::kDecrypt); in TestMacCommandFrame() 198 Crypto::AesCcm aesCcm; in TestInPlaceAesCcmProcessing() 230 … aesCcm.Payload(*message, kHeaderLength, msgLength - kHeaderLength, Crypto::AesCcm::kEncrypt); in TestInPlaceAesCcmProcessing() 241 … aesCcm.Payload(*message, kHeaderLength, msgLength - kHeaderLength, Crypto::AesCcm::kDecrypt); in TestInPlaceAesCcmProcessing()
|
D | test_ecdsa.cpp | 45 namespace Crypto { namespace 189 ot::Crypto::TestEcdsaVector(); in main() 190 ot::Crypto::TestEcdsaKeyGenerationSignAndVerify(); in main()
|
D | test_hkdf_sha256.cpp | 133 Crypto::HkdfSha256 hkdf; in TestHkdfSha256() 135 Crypto::Key testInputKey; in TestHkdfSha256()
|
/openthread-latest/src/core/mac/ |
D | mac_types.cpp | 60 IgnoreError(Random::Crypto::Fill(*this)); in GenerateRandom() 331 SuccessOrAssert(Crypto::Storage::ImportKey(keyRef, Crypto::Storage::kKeyTypeAes, in SetFrom() 332 Crypto::Storage::kKeyAlgorithmAesEcb, in SetFrom() 333 … (aIsExportable ? Crypto::Storage::kUsageExport : 0) | in SetFrom() 334 … Crypto::Storage::kUsageEncrypt | Crypto::Storage::kUsageDecrypt, in SetFrom() 335 … Crypto::Storage::kTypeVolatile, aKey.GetBytes(), Key::kSize)); in SetFrom() 350 if (Crypto::Storage::IsKeyRefValid(GetKeyRef())) in ExtractKey() 354 SuccessOrAssert(Crypto::Storage::ExportKey(GetKeyRef(), aKey.m8, Key::kSize, keySize)); in ExtractKey() 361 void KeyMaterial::ConvertToCryptoKey(Crypto::Key &aCryptoKey) const in ConvertToCryptoKey() 373 Crypto::Storage::DestroyKey(GetKeyRef()); in DestroyKey()
|
/openthread-latest/src/core/crypto/ |
D | ecdsa.hpp | 52 namespace Crypto { namespace 234 … return Crypto::Storage::ImportKey(mKeyRef, Storage::kKeyTypeEcdsa, Storage::kKeyAlgorithmEcdsa, in ImportKeyPair() 340 DefineCoreType(otPlatCryptoEcdsaSignature, Crypto::Ecdsa::P256::Signature); 341 DefineCoreType(otPlatCryptoEcdsaKeyPair, Crypto::Ecdsa::P256::KeyPair); 342 DefineCoreType(otPlatCryptoEcdsaPublicKey, Crypto::Ecdsa::P256::PublicKey);
|
D | sha256.hpp | 55 namespace Crypto { namespace 148 DefineCoreType(otCryptoSha256Hash, Crypto::Sha256::Hash);
|
D | storage.cpp | 39 namespace Crypto { namespace 50 SuccessOrAssert(Crypto::Storage::ExportKey(GetKeyRef(), aKeyBuffer, aKeyLength, readKeyLength)); in ExtractKey()
|
D | mbedtls.cpp | 52 namespace Crypto { namespace 177 IgnoreError(ot::Random::Crypto::FillBuffer(aBuffer, static_cast<uint16_t>(aSize))); in CryptoSecurePrng()
|
D | storage.hpp | 49 namespace Crypto { namespace 389 DefineCoreType(otCryptoKey, Crypto::Key);
|
D | mbedtls.hpp | 61 namespace Crypto { namespace
|
D | aes_ecb.hpp | 46 namespace Crypto { namespace
|
D | hkdf_sha256.hpp | 47 namespace Crypto { namespace
|
D | aes_ecb.cpp | 39 namespace Crypto { namespace
|
/openthread-latest/third_party/mbedtls/repo/docs/ |
D | use-psa-crypto.md | 7 - enables new APIs for using keys handled by PSA Crypto, such as 28 - `MBEDTLS_PSA_CRYPTO_C` enables the implementation of the PSA Crypto API. 32 PSA Crypto but you're not required to call `psa_crypto_init()` before calling 34 - `MBEDTLS_USE_PSA_CRYPTO` means that X.509 and TLS will use PSA Crypto as 36 supported by PSA Crypto, see "Internal Changes" below for a complete list of 43 uses PSA crypto. The parts of the TLS 1.3 code that will use PSA Crypto or not 52 **Historical note:** This option was introduced at a time when PSA Crypto was 56 TLS, as well as some of PK for technical reasons. Nowadays PSA Crypto is no 58 its use in other modules opt-in. However, PSA Crypto functions require that 76 **Benefits:** isolation of long-term secrets, use of PSA Crypto drivers.
|
D | driver-only-builds.md | 20 - `MBEDTLS_PSA_CRYPTO_C` (enabled by default) - this enables PSA Crypto. 22 TLS use PSA Crypto. You need to enable this if you're using PK, X.509 or TLS 34 means the algorithm will be available in the PSA Crypto API. 49 the PSA Crypto API, as well as for use of the PK, X.509 and TLS modules when 92 In such a build, all crypto operations (via the PSA Crypto API, or non-PSA 105 - for code that uses only the PSA Crypto API: `PSA_WANT_ALG_xxx` from 179 In such builds, all crypto operations via the PSA Crypto API will work as 191 - for code that uses only the PSA Crypto API: `PSA_WANT_ECC_xxx` from 293 `MBEDTLS_PKCS1_V21`, and RSA will still work in PSA Crypto. 298 PSA Crypto works. In particular, PK, X.509 and TLS will _not_ work with [all …]
|
/openthread-latest/third_party/mbedtls/repo/framework/ |
D | README.md | 3 …on-independent build and test framework for [TF-PSA-Crypto](https://github.com/Mbed-TLS/TF-PSA-Cry… 8 * You want to build, test or contribute to TF-PSA-Crypto, and you are working from a snapshot of a …
|
/openthread-latest/src/core/utils/ |
D | slaac_address.cpp | 425 Crypto::Sha256 sha256; in GenerateIid() 426 Crypto::Sha256::Hash hash; in GenerateIid() 494 error = Random::Crypto::Fill(aKey); in GetIidSecretKey() 498 IgnoreError(Random::Crypto::Fill(aKey)); in GetIidSecretKey()
|
/openthread-latest/src/core/meshcop/ |
D | dataset_manager.hpp | 241 using KeyRef = Crypto::Storage::KeyRef; 242 using KeyRefManager = Crypto::Storage::KeyRefManager; 243 using KeyRefType = Crypto::Storage::KeyRefManager::Type;
|
D | tcat_agent.cpp | 710 SuccessOrExit(error = Random::Crypto::Fill(mRandomChallenge)); in HandleRequestRandomNumberChallenge() 727 Crypto::HmacSha256::Hash hash; in HandleRequestPskdHash() 738 Crypto::HmacSha256::Hash::kSize)); in HandleRequestPskdHash() 752 Crypto::HmacSha256::Hash hash; in VerifyHash() 754 VerifyOrExit(aLength == Crypto::HmacSha256::Hash::kSize, error = kErrorSecurity); in VerifyHash() 765 void TcatAgent::CalculateHash(uint64_t aChallenge, const char *aBuf, size_t aBufLen, Crypto::HmacSh… in CalculateHash() 768 Crypto::Key cryptoKey; in CalculateHash() 769 Crypto::HmacSha256 hmac; in CalculateHash()
|
D | secure_transport.cpp | 202 mbedtls_ssl_conf_rng(&mConf, Crypto::MbedTls::CryptoSecurePrng, nullptr); in Setup() 281 … rval = mbedtls_ssl_cookie_setup(&mCookieCtx, Crypto::MbedTls::CryptoSecurePrng, nullptr); in Setup() 324 error = (error == kErrorNone) ? Crypto::MbedTls::MapError(rval) : error; in Setup() 364 SuccessOrExit(error = Crypto::MbedTls::MapError(mbedtls_ssl_write(&mSsl, buffer, length))); in Send() 915 Crypto::Sha256::Hash kek; in HandleMbedtlsExportKeys() 916 Crypto::Sha256 sha256; in HandleMbedtlsExportKeys() 961 Crypto::Sha256::Hash kek; in HandleMbedtlsExportKeys() 962 Crypto::Sha256 sha256; in HandleMbedtlsExportKeys() 1127 Crypto::MbedTls::CryptoSecurePrng, nullptr); in SetSecureKeys()
|
/openthread-latest/src/core/api/ |
D | random_crypto_api.cpp | 44 return Random::Crypto::FillBuffer(aBuffer, aSize); in otRandomCryptoFillBuffer()
|
/openthread-latest/third_party/mbedtls/repo/tests/suites/ |
D | test_suite_block_cipher.function | 115 /* Now initilize PSA Crypto */ 119 /* After PSA Crypto init */
|