/openthread-latest/third_party/mbedtls/repo/tests/suites/ |
D | test_suite_cipher.camellia.data | 9 CAMELLIA Encrypt and decrypt 0 bytes [#1] 17 CAMELLIA Encrypt and decrypt 2 bytes [#1] 21 CAMELLIA Encrypt and decrypt 7 bytes [#1] 25 CAMELLIA Encrypt and decrypt 8 bytes [#1] 29 CAMELLIA Encrypt and decrypt 9 bytes [#1] 33 CAMELLIA Encrypt and decrypt 15 bytes [#1] 37 CAMELLIA Encrypt and decrypt 16 bytes [#1] 41 CAMELLIA Encrypt and decrypt 17 bytes [#1] 45 CAMELLIA Encrypt and decrypt 31 bytes [#1] 49 CAMELLIA Encrypt and decrypt 32 bytes [#1] [all …]
|
D | test_suite_cipher.des.data | 13 DES Encrypt and decrypt 0 bytes [#1] 21 DES Encrypt and decrypt 2 bytes 25 DES Encrypt and decrypt 7 bytes 29 DES Encrypt and decrypt 8 bytes 33 DES Encrypt and decrypt 9 bytes 37 DES Encrypt and decrypt 15 bytes 41 DES Encrypt and decrypt 16 bytes 45 DES Encrypt and decrypt 17 bytes 49 DES Encrypt and decrypt 31 bytes 53 DES Encrypt and decrypt 32 bytes [#1] [all …]
|
D | test_suite_cipher.null.data | 1 NULL Encrypt and decrypt 0 bytes 5 NULL Encrypt and decrypt 1 bytes 9 NULL Encrypt and decrypt 2 bytes 13 NULL Encrypt and decrypt 7 bytes 17 NULL Encrypt and decrypt 8 bytes 21 NULL Encrypt and decrypt 9 bytes 25 NULL Encrypt and decrypt 15 bytes 29 NULL Encrypt and decrypt 16 bytes 33 NULL Encrypt and decrypt 31 bytes 37 NULL Encrypt and decrypt 32 bytes [all …]
|
D | test_suite_bignum_mod_raw.function | 130 size_t bytes = limbs * sizeof(mbedtls_mpi_uint); 142 TEST_CF_SECRET(X, bytes); 143 TEST_CF_SECRET(Y, bytes); 147 TEST_CF_PUBLIC(X, bytes); 148 TEST_CF_PUBLIC(Y, bytes); 150 TEST_ASSERT(memcmp(X, Y, bytes) != 0); 153 TEST_CF_SECRET(X, bytes); 154 TEST_CF_SECRET(Y, bytes); 158 TEST_CF_PUBLIC(X, bytes); 159 TEST_CF_PUBLIC(Y, bytes); [all …]
|
D | test_suite_cipher.aria.data | 5 ARIA-128 CCM*-NO-TAG - Encrypt and decrypt 0 bytes 13 ARIA-128 CCM*-NO-TAG - Encrypt and decrypt 2 bytes 17 ARIA-128 CCM*-NO-TAG - Encrypt and decrypt 7 bytes 21 ARIA-128 CCM*-NO-TAG - Encrypt and decrypt 8 bytes 25 ARIA-128 CCM*-NO-TAG - Encrypt and decrypt 9 bytes 29 ARIA-128 CCM*-NO-TAG - Encrypt and decrypt 15 bytes 33 ARIA-128 CCM*-NO-TAG - Encrypt and decrypt 16 bytes 37 ARIA-128 CCM*-NO-TAG - Encrypt and decrypt 17 bytes 41 ARIA-128 CCM*-NO-TAG - Encrypt and decrypt 31 bytes 45 ARIA-128 CCM*-NO-TAG - Encrypt and decrypt 32 bytes [all …]
|
D | test_suite_cipher.chacha20.data | 9 ChaCha20 Encrypt and decrypt 0 bytes 13 ChaCha20 Encrypt and decrypt 1 bytes 17 ChaCha20 Encrypt and decrypt 2 bytes 21 ChaCha20 Encrypt and decrypt 7 bytes 25 ChaCha20 Encrypt and decrypt 8 bytes 29 ChaCha20 Encrypt and decrypt 9 bytes 33 ChaCha20 Encrypt and decrypt 15 bytes 37 ChaCha20 Encrypt and decrypt 16 bytes 41 ChaCha20 Encrypt and decrypt 17 bytes 45 ChaCha20 Encrypt and decrypt 31 bytes [all …]
|
D | test_suite_cipher.aes.data | 9 AES-128 CBC - Encrypt and decrypt 0 bytes with PKCS7 padding 17 AES-128 CBC - Encrypt and decrypt 2 bytes with PKCS7 padding 21 AES-128 CBC - Encrypt and decrypt 7 bytes with PKCS7 padding 25 AES-128 CBC - Encrypt and decrypt 8 bytes with PKCS7 padding 29 AES-128 CBC - Encrypt and decrypt 9 bytes with PKCS7 padding 33 AES-128 CBC - Encrypt and decrypt 15 bytes with PKCS7 padding 37 AES-128 CBC - Encrypt and decrypt 16 bytes with PKCS7 padding 41 AES-128 CBC - Encrypt and decrypt 17 bytes with PKCS7 padding 45 AES-128 CBC - Encrypt and decrypt 31 bytes with PKCS7 padding 49 AES-128 CBC - Encrypt and decrypt 32 bytes with PKCS7 padding [all …]
|
D | test_suite_cipher.chachapoly.data | 5 ChaCha20+Poly1305 Encrypt and decrypt 0 bytes 9 ChaCha20+Poly1305 Encrypt and decrypt 1 bytes 13 ChaCha20+Poly1305 Encrypt and decrypt 2 bytes 17 ChaCha20+Poly1305 Encrypt and decrypt 7 bytes 21 ChaCha20+Poly1305 Encrypt and decrypt 8 bytes 25 ChaCha20+Poly1305 Encrypt and decrypt 9 bytes 29 ChaCha20+Poly1305 Encrypt and decrypt 15 bytes 33 ChaCha20+Poly1305 Encrypt and decrypt 16 bytes 37 ChaCha20+Poly1305 Encrypt and decrypt 17 bytes 41 ChaCha20+Poly1305 Encrypt and decrypt 31 bytes [all …]
|
D | test_suite_bignum_core.function | 28 size_t bytes = limbs * sizeof(*A); 37 TEST_MEMORY_COMPARE(X, bytes, S, bytes); 40 memcpy(X, A, bytes); 42 TEST_MEMORY_COMPARE(X, bytes, S, bytes); 45 memcpy(X, B, bytes); 47 TEST_MEMORY_COMPARE(X, bytes, S, bytes); 49 if (memcmp(A, B, bytes) == 0) { 54 TEST_MEMORY_COMPARE(X, bytes, S, bytes); 57 memcpy(X, A, bytes); 59 TEST_MEMORY_COMPARE(X, bytes, S, bytes); [all …]
|
D | test_suite_cipher.padding.data | 68 Check PKCS padding #6 (too few padding bytes) 72 Check PKCS padding #7 (non-uniform padding bytes #1) 76 Check PKCS padding #7 (non-uniform padding bytes #2) 80 Check PKCS padding #7 (non-uniform padding bytes #3) 84 Check PKCS padding #7 (non-uniform padding bytes #4) 88 Check PKCS padding #7 (non-uniform padding bytes #5) 92 Check PKCS padding #7 (non-uniform padding bytes #6) 96 Check PKCS padding #7 (non-uniform padding bytes #7) 100 Check PKCS padding #7 (non-uniform padding bytes #8) 104 Check PKCS padding #7 (non-uniform padding bytes #9) [all …]
|
D | test_suite_psa_its.data | 1 Set/get/remove 0 bytes 4 Set/get/remove 42 bytes 7 Set/get/remove 1000 bytes 40 Get 0 bytes of 10 at 10 46 Get 0 bytes of 10 at 0 52 Get 2 bytes of 10 at 1 61 Get 0 bytes of 10 at 11: out of range
|
D | test_suite_bignum_mod.function | 120 const size_t bytes = limbs * sizeof(mbedtls_mpi_uint); 131 TEST_MEMORY_COMPARE(rX.p, bytes, rR.p, bytes); 134 memcpy(rX.p, rA.p, bytes); 136 TEST_MEMORY_COMPARE(rX.p, bytes, rR.p, bytes); 139 memcpy(rX.p, rB.p, bytes); 141 TEST_MEMORY_COMPARE(rX.p, bytes, rR.p, bytes); 144 if (memcmp(rA.p, rB.p, bytes) == 0) { 146 TEST_MEMORY_COMPARE(rX.p, bytes, rR.p, bytes); 149 memcpy(rX.p, rA.p, bytes); 151 TEST_MEMORY_COMPARE(rX.p, bytes, rR.p, bytes); [all …]
|
D | test_suite_bignum_core.misc.data | 194 mbedtls_mpi_core_lt_ct: x>y (64 bit x, first bytes equal) 197 mbedtls_mpi_core_lt_ct: x<y (64 bit y, first bytes equal) 224 mbedtls_mpi_core_lt_ct: x>y (32 bit x, first bytes equal) 227 mbedtls_mpi_core_lt_ct: x<y (32 bit y, first bytes equal) 320 mbedtls_mpi_core_cond_assign: copy 256 bytes of limbs 341 mbedtls_mpi_core_cond_swap: copy 256 bytes of limbs 428 Fill random core: 0 bytes 449 Fill random core: 8 bytes, RNG stops before 452 Fill random core: 8 bytes, RNG just sufficient 455 Fill random core: 8 bytes, RNG not exhausted [all …]
|
D | test_suite_asn1parse.data | 10 Prefixes of OCTET STRING, length=0 (0 length bytes) 64 length=0 (2 length bytes) 73 length=1 (2 length bytes) 76 length=1 (3 length bytes) 79 length=1 (4 length bytes) 88 length=2 (2 length bytes) 91 length=2 (3 length bytes) 94 length=2 (4 length bytes) 103 length=128 (2 length bytes) 109 length=255 (2 length bytes) [all …]
|
D | test_suite_psa_crypto_driver_wrappers.data | 318 PSA symmetric encrypt validation: AES-CTR, 16 bytes, good 322 PSA symmetric encrypt validation: AES-CTR, 15 bytes, good 326 PSA symmetric encrypt validation: AES-CTR, 16 bytes, fallback 330 PSA symmetric encrypt validation: AES-CTR, 15 bytes, fallback 334 PSA symmetric encrypt multipart: AES-CTR, 16 bytes, good 338 PSA symmetric encrypt multipart: AES-CTR, 15 bytes, good 342 PSA symmetric encrypt multipart: AES-CTR, 16 bytes, fallback 346 PSA symmetric encrypt multipart: AES-CTR, 15 bytes, fallback 350 PSA symmetric encrypt multipart: AES-CTR, 16 bytes, fake 354 PSA symmetric encrypt multipart: AES-CTR, 15 bytes, fake [all …]
|
D | test_suite_lms.data | 18 # word at the start of the key/sig. We strip these 4 bytes from the signature 22 # signature bytes will differ due to randomization): 32 # message1 = bytes.fromhex('60da1a17c88c59da8a730e6ca8effd37') 43 # signature bytes will differ due to randomization), after generating the 46 # message2 = bytes.fromhex('92d036bde8c45b8bb5dea2a072560b1e29fc4bb7dc4549ce90bccee8a6e962a1') 58 # "levels" word at the start of the key/sig. We strip these 4 bytes from the 62 # signature bytes will differ due to randomization): 90 # 4-byte "levels" word at the start of the key/sig. We strip these 4 bytes from 94 # signature bytes will differ due to randomization): 118 # 4-byte "levels" word at the start of the key/sig. We strip these 4 bytes from [all …]
|
/openthread-latest/third_party/mbedtls/repo/scripts/mbedtls_dev/ |
D | psa_storage.py | 109 material: bytes #pylint: disable=used-before-assignment argument 127 ) -> bytes: #pylint: disable=used-before-assignment 141 def bytes(self) -> bytes: member in Key 168 return self.bytes().hex() 186 self.assertEqual(key.bytes(), bytes.fromhex(expected_hex)) 197 self.assertEqual(key.bytes(), bytes.fromhex(expected_hex)) 205 self.assertEqual(key.bytes(), bytes.fromhex(expected_hex))
|
/openthread-latest/tools/tcat_ble_client/tlv/ |
D | tlv.py | 35 def __init__(self, type: int = None, value: bytes = None): argument 37 self.value: bytes = value 43 def parse_tlvs(data: bytes) -> List[TLV]: argument 53 def from_bytes(data: bytes) -> TLV: argument 58 def set_from_bytes(self, data: bytes): argument 68 def to_bytes(self) -> bytes:
|
/openthread-latest/examples/platforms/utils/ |
D | link_metrics.cpp | 93 uint8_t bytes = 0; in GetEnhAckData() local 99 aData[bytes++] = aLqi; in GetEnhAckData() 103 aData[bytes++] = static_cast<uint8_t>(GetLinkMargin(aRssi) * 255 / in GetEnhAckData() 106 if (bytes < kEnhAckProbingDataMaxLen && mLinkMetrics.mRssi) in GetEnhAckData() 108 aData[bytes++] = in GetEnhAckData() 113 return bytes; in GetEnhAckData() 242 uint8_t bytes = 0; in otLinkMetricsEnhAckGenData() local 247 bytes = dataInfo->GetEnhAckData(aLqi, aRssi, aData); in otLinkMetricsEnhAckGenData() 250 return bytes; in otLinkMetricsEnhAckGenData()
|
/openthread-latest/third_party/mbedtls/repo/docs/architecture/ |
D | mbed-crypto-storage-specification.md | 51 All integers are encoded in little-endian order in 8-bit bytes. 55 * magic (8 bytes): `"PSA\0KEY\0"` 56 * version (4 bytes): 0 57 * type (4 bytes): `psa_key_type_t` value 58 * policy usage flags (4 bytes): `psa_key_usage_t` value 59 * policy usage algorithm (4 bytes): `psa_algorithm_t` value 60 * key material length (4 bytes) 189 * Magic header (8 bytes): `"PSA\0ITS\0"` 201 All integers are encoded in little-endian order in 8-bit bytes. 205 * magic (8 bytes): `"PSA\0KEY\0"` [all …]
|
/openthread-latest/tools/tcat_ble_client/cli/ |
D | base_commands.py | 89 return TLV(TcatTLVType.APPLICATION.value, bytes('Hello world!', 'ascii')).to_bytes() 115 return TLV(TcatTLVType.DECOMMISSION.value, bytes()).to_bytes() 127 return TLV(TcatTLVType.GET_DEVICE_ID.value, bytes()).to_bytes() 139 return TLV(TcatTLVType.GET_EXT_PAN_ID.value, bytes()).to_bytes() 151 return TLV(TcatTLVType.GET_PROVISIONING_URL.value, bytes()).to_bytes() 163 return TLV(TcatTLVType.GET_NETWORK_NAME.value, bytes()).to_bytes() 206 return TLV(TcatTLVType.THREAD_START.value, bytes()).to_bytes() 218 return TLV(TcatTLVType.THREAD_STOP.value, bytes()).to_bytes()
|
/openthread-latest/tools/tcat_ble_client/dataset/ |
D | dataset.py | 23 initial_dataset = bytes([ 45 def set_from_bytes(self, bytes): argument 46 for tlv in TLV.parse_tlvs(bytes): 52 res = bytes()
|
/openthread-latest/tests/scripts/thread-cert/ |
D | net_crypto.py | 70 return cipher.encrypt_and_digest(bytes(data)) 91 dec_data = cipher.decrypt_and_verify(bytes(enc_data), bytes(mic)) 159 return bytes(eui64 + struct.pack(">LB", frame_counter, security_level)) 175 return bytes(mhr + auxiliary_security_header + extra_open_fields) 223 return bytes(source_eui64[:8] + struct.pack(">LB", frame_counter, security_level)) 239 return bytes(source_address.packed + destination_address.packed + auxiliary_security_header)
|
/openthread-latest/tools/tcat_ble_client/ble/ |
D | ble_stream_secure.py | 107 async def send(self, bytes): argument 108 self.ssl_object.write(bytes) 136 async def send_with_resp(self, bytes): argument 137 await self.send(bytes) 144 data = TLV(TcatTLVType.DISCONNECT.value, bytes()).to_bytes()
|
/openthread-latest/examples/platforms/simulation/ |
D | mdns_socket.c | 305 int bytes; in otPlatMdnsSendMulticast() local 320 bytes = sendto(sMdnsFd4, buffer, length, 0, (struct sockaddr *)&addr, sizeof(addr)); in otPlatMdnsSendMulticast() 322 VerifyOrDie((bytes == length), "sendTo(sMdnsFd4) failed"); in otPlatMdnsSendMulticast() 333 bytes = sendto(sMdnsFd6, buffer, length, 0, (struct sockaddr *)&addr6, sizeof(addr6)); in otPlatMdnsSendMulticast() 335 VerifyOrDie((bytes == length), "sendTo(sMdnsFd6) failed"); in otPlatMdnsSendMulticast() 349 int bytes; in otPlatMdnsSendUnicast() local 365 bytes = sendto(sMdnsFd4, buffer, length, 0, (struct sockaddr *)&addr, sizeof(addr)); in otPlatMdnsSendUnicast() 367 VerifyOrDie((bytes == length), "sendTo(sMdnsFd4) failed"); in otPlatMdnsSendUnicast() 378 bytes = sendto(sMdnsFd6, buffer, length, 0, (struct sockaddr *)&addr6, sizeof(addr6)); in otPlatMdnsSendUnicast() 380 VerifyOrDie((bytes == length), "sendTo(sMdnsFd6) failed"); in otPlatMdnsSendUnicast()
|