Home
last modified time | relevance | path

Searched refs:ext (Results 1 – 23 of 23) sorted by relevance

/openthread-latest/tools/tcat_ble_client/auth-generate/
DMakefile38 DeviceCert1 DeviceCert2: ext/DeviceCert1.ext ext/DeviceCert2.ext
41 CommCert1 CommCert2 CommCert4: ext/CommCert1.ext ext/CommCert2.ext ext/CommCert4.ext
44 CommCert3: ext/CommCert3.ext
/openthread-latest/src/core/instance/
Dextension_example.cpp68 ExtensionBase *ext = reinterpret_cast<ExtensionBase *>(&sExtensionRaw); in Init() local
70 VerifyOrExit(!ext->mIsInitialized); in Init()
72 ext = new (&sExtensionRaw) Extension(aInstance); in Init()
75 return *ext; in Init()
/openthread-latest/third_party/mbedtls/repo/tests/suites/
Dtest_suite_pk.data69 PK can do ext: ECDSA(ANY)/NONE, invalid check STREAM_CIPHER
73 PK can do ext: ECDSA(ANY)/NONE, invalid check RSA_PKCS1V15_SIGN(SHA256)
77 PK can do ext: ECDSA(ANY)/NONE, invalid check RSA_PKCS1V15_CRYPT
81 PK can do ext: ECDSA(ANY)/NONE, invalid check RSA_PSS(SHA256)
85 PK can do ext: ECDSA(ANY)/NONE, invalid check ECDH
89 PK can do ext: ECDSA(ANY)/NONE, check ECDSA(SHA256)
93 PK can do ext: ECDSA(SHA256)/NONE, check ECDSA(SHA256)
97 PK can do ext: NONE/ECDSA(ANY_HASH), check ECDSA(SHA256)
101 PK can do ext: NONE/ECDSA(SHA256), check ECDSA(SHA256)
105 PK can do ext: ECDSA(SHA256)/NONE, invalid check ECDSA(ANY)
[all …]
Dtest_suite_ecp.data891 ECP write key ext: secp256r1, nominal
895 ECP write key ext: secp256r1, output longer by 1
899 ECP write key ext: secp256r1, output short by 1
903 ECP write key ext: secp256r1, output_size=0
907 ECP write key ext: secp256r1, top byte = 0, output_size=32
911 ECP write key ext: secp256r1, top byte = 0, output_size=31
915 ECP write key ext: secp256r1, top byte = 0, output_size=30
919 ECP write key ext: secp256r1, mostly-0 key, output_size=32
923 ECP write key ext: secp256r1, mostly-0 key, output_size=1
927 ECP write key ext: secp256r1, private key not set
[all …]
Dtest_suite_pkcs1_v21.data1057 RSASSA-PSS verify ext, 512-bit key, empty salt, good signature
1061 RSASSA-PSS verify ext, 512-bit key, empty salt, bad signature
1065 RSASSA-PSS verify ext, 522-bit key, SHA-512, empty salt, good signature
1069 RSASSA-PSS verify ext, 522-bit key, SHA-512, saltlen=64, good signature with saltlen=0
1073 RSASSA-PSS verify ext, 528-bit key, SHA-512, empty salt, good signature
1077 RSASSA-PSS verify ext, 528-bit key, SHA-512, saltlen=64, good signature with saltlen=0
1081 RSASSA-PSS verify ext, 512-bit key, SHA-512 (hash too large)
1085 RSASSA-PSS verify ext, 521-bit key, SHA-512, empty salt, bad signature
1089 RSASSA-PSS verify ext, 521-bit key, SHA-256, empty salt, good signature
1093 RSASSA-PSS verify ext, 521-bit key, SHA-256, empty salt, flipped-highest-bit signature
[all …]
Dtest_suite_x509parse.data1896 X509 CRT ASN1 (TBS, inv v3Ext, first ext inv tag)
1900 X509 CRT ASN1 (TBS, inv v3Ext, first ext length missing)
1904 X509 CRT ASN1 (TBS, inv v3Ext, inv first ext length encoding)
1908 X509 CRT ASN1 (TBS, inv v3Ext, first ext length out of bounds)
1912 X509 CRT ASN1 (TBS, inv v3Ext, first ext empty)
1916 X509 CRT ASN1 (TBS, inv v3Ext, first ext extnID inv tag)
1920 X509 CRT ASN1 (TBS, inv v3Ext, first ext extnID length missing)
1924 X509 CRT ASN1 (TBS, inv v3Ext, first ext extnID inv length encoding)
1928 X509 CRT ASN1 (TBS, inv v3Ext, first ext extnID length out of bounds)
3370 X509 ext types accessor: ext type present
[all …]
Dtest_suite_x509write.data55 x509_csr_check:"data_files/server1.key":"data_files/server1.req.sha256.ext":MBEDTLS_MD_SHA256:0:0:0…
Dtest_suite_psa_crypto.data7507 PSA generate key ext: RSA, params.flags=1
7511 PSA generate key ext: RSA, empty e
7515 PSA generate key ext: RSA, e=3
7519 PSA generate key ext: RSA, e=3 with leading zeros
7527 #PSA generate key ext: RSA, e=3 with many leading zeros
7531 PSA generate key ext: RSA, e=513
7535 PSA generate key ext: RSA, e=65537
7539 PSA generate key ext: RSA, e=2^31-1
7543 PSA generate key ext: RSA, e=2^31+3 (too large for built-in RSA)
7547 PSA generate key ext: RSA, e=2^64+3 (too large for built-in RSA)
[all …]
/openthread-latest/third_party/mbedtls/repo/library/
Dx509_crl.c78 mbedtls_x509_buf *ext) in x509_get_crl_ext() argument
90 if ((ret = mbedtls_x509_get_ext(p, end, ext, 0)) != 0) { in x509_get_crl_ext()
94 end = ext->p + ext->len; in x509_get_crl_ext()
162 mbedtls_x509_buf *ext) in x509_get_crl_entry_ext() argument
172 ext->tag = **p; in x509_get_crl_entry_ext()
173 ext->p = *p; in x509_get_crl_entry_ext()
179 if ((ret = mbedtls_asn1_get_tag(p, end, &ext->len, in x509_get_crl_entry_ext()
182 ext->p = NULL; in x509_get_crl_entry_ext()
188 end = *p + ext->len; in x509_get_crl_entry_ext()
190 if (end != *p + ext->len) { in x509_get_crl_entry_ext()
Dx509write_crt.c330 const mbedtls_asn1_sequence *ext; in mbedtls_x509write_crt_set_ext_key_usage() local
341 for (ext = exts; ext->next != last_ext; ext = ext->next) { in mbedtls_x509write_crt_set_ext_key_usage()
343 if (ext->buf.tag != MBEDTLS_ASN1_OID) { in mbedtls_x509write_crt_set_ext_key_usage()
346 MBEDTLS_ASN1_CHK_ADD(len, mbedtls_asn1_write_raw_buffer(&c, buf, ext->buf.p, ext->buf.len)); in mbedtls_x509write_crt_set_ext_key_usage()
347 MBEDTLS_ASN1_CHK_ADD(len, mbedtls_asn1_write_len(&c, buf, ext->buf.len)); in mbedtls_x509write_crt_set_ext_key_usage()
349 last_ext = ext; in mbedtls_x509write_crt_set_ext_key_usage()
Dx509_create.c512 mbedtls_asn1_named_data *ext) in x509_write_extension() argument
517 MBEDTLS_ASN1_CHK_ADD(len, mbedtls_asn1_write_raw_buffer(p, start, ext->val.p + 1, in x509_write_extension()
518 ext->val.len - 1)); in x509_write_extension()
519 MBEDTLS_ASN1_CHK_ADD(len, mbedtls_asn1_write_len(p, start, ext->val.len - 1)); in x509_write_extension()
522 if (ext->val.p[0] != 0) { in x509_write_extension()
526 MBEDTLS_ASN1_CHK_ADD(len, mbedtls_asn1_write_raw_buffer(p, start, ext->oid.p, in x509_write_extension()
527 ext->oid.len)); in x509_write_extension()
528 MBEDTLS_ASN1_CHK_ADD(len, mbedtls_asn1_write_len(p, start, ext->oid.len)); in x509_write_extension()
Dssl_tls12_server.c896 unsigned char *buf, *p, *ext; in ssl_parse_client_hello() local
1315 ext = buf + ext_offset + 2; in ssl_parse_client_hello()
1316 MBEDTLS_SSL_DEBUG_BUF(3, "client hello extensions", ext, ext_len); in ssl_parse_client_hello()
1327 ext_id = MBEDTLS_GET_UINT16_BE(ext, 0); in ssl_parse_client_hello()
1328 ext_size = MBEDTLS_GET_UINT16_BE(ext, 2); in ssl_parse_client_hello()
1340 ret = mbedtls_ssl_parse_server_name_ext(ssl, ext + 4, in ssl_parse_client_hello()
1341 ext + 4 + ext_size); in ssl_parse_client_hello()
1354 ret = ssl_parse_renegotiation_info(ssl, ext + 4, ext_size); in ssl_parse_client_hello()
1364 ret = mbedtls_ssl_parse_sig_alg_ext(ssl, ext + 4, ext + 4 + ext_size); in ssl_parse_client_hello()
1379 ret = ssl_parse_supported_groups_ext(ssl, ext + 4, ext_size); in ssl_parse_client_hello()
[all …]
Dssl_tls12_client.c1185 unsigned char *buf, *ext; in ssl_parse_server_hello() local
1443 ext = buf + 40 + n; in ssl_parse_server_hello()
1450 unsigned int ext_id = MBEDTLS_GET_UINT16_BE(ext, 0); in ssl_parse_server_hello()
1451 unsigned int ext_size = MBEDTLS_GET_UINT16_BE(ext, 2); in ssl_parse_server_hello()
1468 if ((ret = ssl_parse_renegotiation_info(ssl, ext + 4, in ssl_parse_server_hello()
1481 ext + 4, ext_size)) != 0) { in ssl_parse_server_hello()
1493 ext + 4, in ssl_parse_server_hello()
1506 ext + 4, ext_size)) != 0) { in ssl_parse_server_hello()
1519 ext + 4, ext_size)) != 0) { in ssl_parse_server_hello()
1531 ext + 4, ext_size)) != 0) { in ssl_parse_server_hello()
[all …]
Dx509_internal.h44 mbedtls_x509_buf *ext, int tag);
Dx509.c769 mbedtls_x509_buf *ext, int tag) in mbedtls_x509_get_ext() argument
777 ret = mbedtls_asn1_get_tag(p, end, &ext->len, in mbedtls_x509_get_ext()
783 ext->tag = MBEDTLS_ASN1_CONTEXT_SPECIFIC | MBEDTLS_ASN1_CONSTRUCTED | tag; in mbedtls_x509_get_ext()
784 ext->p = *p; in mbedtls_x509_get_ext()
785 end = *p + ext->len; in mbedtls_x509_get_ext()
/openthread-latest/third_party/mbedtls/repo/scripts/
Dgenerate_visualc_files.pl142 my ($path, $template, $dir, $ext) = @_;
166 content_to_file( $content, "$dir/$appname.$ext" );
/openthread-latest/third_party/mbedtls/repo/configs/ext/
DREADME.md18 https://git.trustedfirmware.org/TF-M/trusted-firmware-m.git/tree/lib/ext/mbedcrypto/mbedcrypto_conf…
/openthread-latest/third_party/mbedtls/repo/tests/scripts/
Dcheck_files.py151 _root, ext = os.path.splitext(filepath)
152 return ext in ('.bat', '.dsp', '.dsw', '.sln', '.vcxproj')
Dall.sh3395 cp configs/ext/crypto_config_profile_medium.h "$CRYPTO_CONFIG_H"
/openthread-latest/src/cli/
DREADME.md2260 id:02 rloc16:0x0800 ext-addr:8aa57d2c603fe16c ver:4 - me - leader
2262 id:46 rloc16:0xb800 ext-addr:fe109d277e0175cc ver:4
2264 id:33 rloc16:0x8400 ext-addr:d2e511a146b9e54d ver:4
2266 id:51 rloc16:0xcc00 ext-addr:9aab43ababf05352 ver:4
2269 id:57 rloc16:0xe400 ext-addr:dae9c4c0e9da55ff ver:4
2279 id:62 rloc16:0xf800 ext-addr:ce349873897233a5 ver:4 - me - br
2286 id:02 rloc16:0x0800 ext-addr:8aa57d2c603fe16c ver:4 - leader - br
2296 id:33 rloc16:0x8400 ext-addr:d2e511a146b9e54d ver:4
2303 id:51 rloc16:0xcc00 ext-addr:9aab43ababf05352 ver:4
2310 id:57 rloc16:0xe400 ext-addr:dae9c4c0e9da55ff ver:4
[all …]
/openthread-latest/doc/
DDoxyfile.in308 # using this tag. The format is ext=language, where ext is a file extension, and
953 # *.ext= (so without naming a filter).
/openthread-latest/third_party/mbedtls/repo/tests/data_files/
DMakefile1440 server1.req.sha256.ext: server1.key
/openthread-latest/third_party/mbedtls/repo/
DChangeLog1083 * Add the function mbedtls_x509_crt_has_ext_type() to access the ext types