/openthread-latest/third_party/jlink/SEGGER_RTT_V640/Syscalls/ |
D | SEGGER_RTT_Syscalls_IAR.c | 83 size_t __write(int handle, const unsigned char * buffer, size_t size); 101 size_t __write(int handle, const unsigned char * buffer, size_t size) { in __write() argument 102 (void) handle; /* Not used, avoid warning */ in __write() 117 size_t __write_buffered(int handle, const unsigned char * buffer, size_t size) { in __write_buffered() argument 118 (void) handle; /* Not used, avoid warning */ in __write_buffered()
|
/openthread-latest/tools/harness-automation/autothreadharness/ |
D | open_thread_controller.py | 60 self.handle = None 90 if self.handle: 91 self.handle.close() 92 self.handle = None 100 self.handle = socket.create_connection(address) 101 self.handle.setblocking(0) 105 self.handle = socket.create_connection((host, port)) 106 self.handle.setblocking(0) 109 self.handle = serial.Serial(self.port, 115200, timeout=0, xonxoff=True) 114 return self.handle.recv(size) [all …]
|
/openthread-latest/third_party/mbedtls/repo/include/psa/ |
D | crypto_compat.h | 41 static inline int psa_key_handle_is_null(psa_key_handle_t handle) in psa_key_handle_is_null() argument 43 return mbedtls_svc_key_id_is_null(handle); in psa_key_handle_is_null() 107 psa_key_handle_t *handle); 147 psa_status_t psa_close_key(psa_key_handle_t handle);
|
D | crypto_struct.h | 72 mbedtls_psa_client_handle_t handle; member 97 mbedtls_psa_client_handle_t handle; member 133 mbedtls_psa_client_handle_t handle; member 161 mbedtls_psa_client_handle_t handle; member 204 mbedtls_psa_client_handle_t handle; member 426 mbedtls_psa_client_handle_t handle; member 464 mbedtls_psa_client_handle_t handle; member
|
D | crypto_extra.h | 1837 mbedtls_psa_client_handle_t handle; member
|
/openthread-latest/third_party/mbedtls/repo/library/ |
D | psa_crypto_slot_management.c | 546 psa_status_t psa_open_key(mbedtls_svc_key_id_t key, psa_key_handle_t *handle) in psa_open_key() argument 555 *handle = PSA_KEY_HANDLE_INIT; in psa_open_key() 563 *handle = key; in psa_open_key() 569 *handle = PSA_KEY_HANDLE_INIT; in psa_open_key() 574 psa_status_t psa_close_key(psa_key_handle_t handle) in psa_close_key() argument 579 if (psa_key_handle_is_null(handle)) { in psa_close_key() 590 status = psa_get_and_lock_key_slot_in_memory(handle, &slot); in psa_close_key()
|
/openthread-latest/tools/harness-thci/ |
D | OpenThread_WpanCtl.py | 69 self.handle = None 134 return self.handle.recv(size) 136 return self.handle.read(size) 141 self.handle.sendall(data) 143 self.handle.write(data) 216 ssh_stdin, ssh_stdout, ssh_stderr = self.handle.exec_command(cmd) 707 self.handle = serial.Serial(self.port, 115200, timeout=0.2) 720 input_data = self.handle.read(self.handle.inWaiting()) 724 self.handle.write('\n') 729 self.handle.write(self.username + '\n') [all …]
|
/openthread-latest/third_party/mbedtls/repo/tests/suites/ |
D | test_suite_psa_crypto_slot_management.function | 205 psa_key_handle_t handle = PSA_KEY_HANDLE_INIT; 255 PSA_ASSERT(psa_open_key(id, &handle)); 256 TEST_ASSERT(!psa_key_handle_is_null(handle)); 257 PSA_ASSERT(psa_get_key_attributes(handle, &attributes)); 288 PSA_ASSERT(psa_open_key(id, &handle)); 316 PSA_ASSERT(psa_close_key(handle)); 322 * Test that the key handle and identifier are now not referring to an 325 TEST_EQUAL(psa_get_key_attributes(handle, &read_attributes), 327 TEST_EQUAL(psa_close_key(handle), PSA_ERROR_INVALID_HANDLE); 426 psa_key_handle_t handle = mbedtls_svc_key_id_make(0xdead, 0xdead); [all …]
|
D | test_suite_psa_crypto_slot_management.data | 34 Persistent slot, check after restart with live handle, id=min 99 Persistent slot, check after restart with live handle, persistence=2 205 invalid handle: 0 208 invalid handle: never opened 211 invalid handle: already closed 214 invalid handle: huge
|
D | test_suite_psa_crypto_se_driver_hal.function | 869 psa_key_handle_t handle; 925 TEST_ASSERT(psa_open_key(returned_id, &handle) == 977 TEST_EQUAL(psa_open_key(returned_id, &handle), 1004 psa_key_handle_t handle; 1068 TEST_EQUAL(psa_open_key(id, &handle), PSA_ERROR_DOES_NOT_EXIST); 1095 psa_key_handle_t handle; 1152 TEST_EQUAL(psa_open_key(id, &handle), PSA_ERROR_DOES_NOT_EXIST); 1213 psa_key_handle_t handle; 1269 TEST_EQUAL(psa_open_key(id, &handle), PSA_ERROR_DOES_NOT_EXIST); 1462 psa_key_handle_t handle; [all …]
|
D | test_suite_random.data | 37 # An external RNG is supposed to handle arbitrary request lengths. Test it
|
D | test_suite_psa_crypto_driver_wrappers.function | 876 psa_key_handle_t handle = 0; 893 PSA_ASSERT(psa_import_key(&attributes, key_in->x, key_in->len, &handle)); 913 actual_status = psa_export_public_key(handle, 918 actual_status = psa_export_key(handle, 936 psa_destroy_key(handle); 2960 /* Offset applied to output_data in order to handle cases where verify()
|
D | test_suite_psa_crypto.function | 6866 * Note: This test can currently only handle ECDSA. 7040 * Note: This test can currently only handle ECDSA. 7258 * Note: This test can currently only handle ECDSA. 7262 * non deterministic ECDSA, but this test can also handle deterministic. 7462 * Note: This test can currently only handle ECDSA. 7628 * Note: This test can currently only handle ECDSA. 7760 * Note: This test can currently only handle ECDSA. 7915 * Note: This test can currently only handle ECDSA. 8038 * Note: This test can currently only handle ECDSA.
|
D | test_suite_pk.function | 127 * same size. For simplicity, we only handle a subset of configurations, 144 * same family. For simplicity, we only handle a subset of configurations,
|
/openthread-latest/tools/gerrit/ |
D | README.md | 46 c551e3035 [posix] handle signals SIGHUP or SIGTERM and exit (#2930)
|
/openthread-latest/tools/tcat_ble_client/ |
D | GENERATING_CERTIFICATES.md | 13 …issioner certificates and TCAT Device certificates. The scripts can also handle multiple CAs, and …
|
/openthread-latest/src/cli/ |
D | README_SRP_SERVER.md | 233 - running: The SRP server is active and will handle service registrations.
|
D | README_DATASET.md | 133 …to specify active or pending timestamps because the Dataset Updater will handle this. If specified…
|
/openthread-latest/third_party/mbedtls/repo/docs/ |
D | tls13-early-data.md | 170 could be adapted to handle early data in the following way:
|
D | 3.0-migration-guide.md | 571 way to handle those extensions. 774 to handle failures in the key export callback, for example by
|
/openthread-latest/tests/toranj/ |
D | README_CLI.md | 173 …oop (REPL) model in python) and do not need a separate process to run to handle/dispatch events (w…
|
/openthread-latest/third_party/mbedtls/repo/docs/architecture/testing/ |
D | driver-interface-test-strategy.md | 129 … so that a driver can reject a request at runtime and let another driver handle the request. For e…
|
/openthread-latest/third_party/mbedtls/repo/3rdparty/p256-m/p256-m/ |
D | README.md | 507 case. For curve orders that don't meet this criterion, we can just handle that 517 id" parameter and handle variable-sized input/output.
|
/openthread-latest/third_party/mbedtls/repo/ |
D | ChangeLog | 735 subidentifiers can be valid, but Mbed TLS cannot currently handle them. 1788 rather than PSA_ERROR_DOES_NOT_EXIST for an invalid handle, bringing them 3347 * Fix the cert_write example to handle certificates signed with elliptic 5052 * Defines to handle UEFI environment under MSVC 5351 * ssl_write_certificate_request() can handle empty ca_chain 5418 * Correctly handle CertificateRequest message in client for <= TLS 1.1 5488 POLARSSL_MODE_CFB, to also handle different block size CFB modes. 5538 * ssl_write_certificate_request() can handle empty ca_chain 5586 * Correctly handle empty SSL/TLS packets (Found by James Yonan) 5970 * Correctly handle the case in padlock_xcryptcbc() when input or [all …]
|
/openthread-latest/third_party/mbedtls/repo/docs/architecture/psa-migration/ |
D | psa-legacy-bridges.md | 168 …example, it's ok for pkwrite, because we've upgraded the pkwrite code to handle `MBEDTLS_PK_OPAQUE…
|