Home
last modified time | relevance | path

Searched refs:keys (Results 1 – 25 of 81) sorted by relevance

1234

/openthread-latest/third_party/mbedtls/repo/library/
Dssl_ticket.c69 mbedtls_ssl_ticket_key *key = ctx->keys + index; in ssl_ticket_gen_key()
123 mbedtls_ssl_ticket_key * const key = ctx->keys + ctx->active; in ssl_ticket_update_keys()
140 if ((status = psa_destroy_key(ctx->keys[ctx->active].key)) != PSA_SUCCESS) { in ssl_ticket_update_keys()
160 mbedtls_ssl_ticket_key * const key = ctx->keys + idx; in mbedtls_ssl_ticket_rotate()
260 ctx->keys[0].alg = alg; in mbedtls_ssl_ticket_setup()
261 ctx->keys[0].key_type = key_type; in mbedtls_ssl_ticket_setup()
262 ctx->keys[0].key_bits = key_bits; in mbedtls_ssl_ticket_setup()
264 ctx->keys[1].alg = alg; in mbedtls_ssl_ticket_setup()
265 ctx->keys[1].key_type = key_type; in mbedtls_ssl_ticket_setup()
266 ctx->keys[1].key_bits = key_bits; in mbedtls_ssl_ticket_setup()
[all …]
Daesce.c159 block = vaeseq_u8(block, vld1q_u8(keys)); \
161 keys += 16
167 unsigned char *keys, in aesce_encrypt_block() argument
189 block = vaeseq_u8(block, vld1q_u8(keys)); in aesce_encrypt_block()
190 keys += 16; in aesce_encrypt_block()
195 block = veorq_u8(block, vld1q_u8(keys)); in aesce_encrypt_block()
222 block = vaesdq_u8(block, vld1q_u8(keys)); \
224 keys += 16
230 unsigned char *keys, in aesce_decrypt_block() argument
252 block = vaesdq_u8(block, vld1q_u8(keys)); in aesce_decrypt_block()
[all …]
Dpsa_crypto_cipher.c314 uint8_t keys[24]; in psa_cipher_setup() local
315 memcpy(keys, key_buffer, 16); in psa_cipher_setup()
316 memcpy(keys + 16, key_buffer, 8); in psa_cipher_setup()
318 keys, in psa_cipher_setup()
Dssl_tls13_keys.c269 mbedtls_ssl_key_set *keys) in mbedtls_ssl_tls13_make_traffic_keys() argument
275 keys->client_write_key, key_len, in mbedtls_ssl_tls13_make_traffic_keys()
276 keys->client_write_iv, iv_len); in mbedtls_ssl_tls13_make_traffic_keys()
283 keys->server_write_key, key_len, in mbedtls_ssl_tls13_make_traffic_keys()
284 keys->server_write_iv, iv_len); in mbedtls_ssl_tls13_make_traffic_keys()
289 keys->key_len = key_len; in mbedtls_ssl_tls13_make_traffic_keys()
290 keys->iv_len = iv_len; in mbedtls_ssl_tls13_make_traffic_keys()
/openthread-latest/third_party/mbedtls/repo/tests/scripts/
Dgenerate_tls13_compat_tests.py111 self._cert_sig_algs = list(CERTIFICATES.keys())
580 parser.add_argument('server', choices=SERVER_CLASSES.keys(), nargs='?',
581 default=list(SERVER_CLASSES.keys())[0],
583 parser.add_argument('client', choices=CLIENT_CLASSES.keys(), nargs='?',
584 default=list(CLIENT_CLASSES.keys())[0],
586 parser.add_argument('cipher', choices=CIPHER_SUITE_IANA_VALUE.keys(), nargs='?',
587 default=list(CIPHER_SUITE_IANA_VALUE.keys())[0],
589 parser.add_argument('sig_alg', choices=SIG_ALG_IANA_VALUE.keys(), nargs='?',
590 default=list(SIG_ALG_IANA_VALUE.keys())[0],
592 parser.add_argument('named_group', choices=NAMED_GROUP_IANA_VALUE.keys(), nargs='?',
[all …]
Dpsa_collect_statuses.py64 for function in sorted(self.functions.keys()):
66 names = [self.status_names[value] for value in fdata.keys()]
Ddepends.py389 self.all_config_symbols = set(conf.settings.keys())
544 options.tasks = sorted(domain_data.domains.keys())
547 for domain_name in sorted(getattr(domain_data, arg).keys()):
/openthread-latest/third_party/mbedtls/repo/programs/ssl/
Dssl_test_common_source.c23 eap_tls_keys *keys = (eap_tls_keys *) p_expkey; in eap_tls_key_derivation() local
29 if (secret_len != sizeof(keys->master_secret)) { in eap_tls_key_derivation()
33 memcpy(keys->master_secret, secret, sizeof(keys->master_secret)); in eap_tls_key_derivation()
34 memcpy(keys->randbytes, client_random, 32); in eap_tls_key_derivation()
35 memcpy(keys->randbytes + 32, server_random, 32); in eap_tls_key_derivation()
36 keys->tls_prf_type = tls_prf_type; in eap_tls_key_derivation()
117 dtls_srtp_keys *keys = (dtls_srtp_keys *) p_expkey; in dtls_srtp_key_derivation() local
123 if (secret_len != sizeof(keys->master_secret)) { in dtls_srtp_key_derivation()
127 memcpy(keys->master_secret, secret, sizeof(keys->master_secret)); in dtls_srtp_key_derivation()
128 memcpy(keys->randbytes, client_random, 32); in dtls_srtp_key_derivation()
[all …]
/openthread-latest/tools/tcat_ble_client/cli/
Dcli.py77 command_pool = self._commands.keys()
83 if words[0] not in self._commands.keys():
92 if nextarg in current_command._subcommands.keys():
100 command_pool = current_command._subcommands.keys()
117 if command not in self._commands.keys():
Dcommand.py52 if len(args) > 0 and args[0] in self._subcommands.keys():
73 if 'help' in self._subcommands.keys():
/openthread-latest/third_party/mbedtls/repo/tests/suites/
Dtest_suite_psa_crypto_slot_management.function17 /**< Terminate and reinitialize without closing/destroying keys */
50 /* Closing the key invalidate only volatile keys, not persistent ones. */
59 /* Purging the key just purges RAM data of persistent keys. */
83 /* All keys must have been closed. */
87 /* Some keys may remain behind, and we're testing that this
800 mbedtls_svc_key_id_t *keys = NULL;
808 TEST_CALLOC(keys, max_keys);
818 &keys[i]);
823 TEST_ASSERT(!mbedtls_svc_key_id_is_null(keys[i]));
825 TEST_ASSERT(!mbedtls_svc_key_id_equal(keys[i], keys[j]));
[all …]
Dtest_suite_aes.xts.data36 # 128-bit keys with 32 byte sector
48 # 128-bit keys with 512 byte sector
69 # 256-bit keys with 512 byte sector
92 # 128-bit keys with sector size not evenly divisible by 16 bytes
Dtest_suite_pkparse.function73 /* Whether a pk key can do ECDSA. Opaque keys are not supported since this
74 * test suite does not create opaque keys. */
78 * keys on Montgomery curves, which can only do ECDH, so we'll have
242 /* PSA keys are already checked on import so nothing to do here. */
304 /* Montgomery keys have specific bits set to either 0 or 1 depending on
/openthread-latest/third_party/mbedtls/repo/docs/architecture/testing/
Dpsa-storage-format-testing.md31 Use a similar approach for files other than keys where possible and relevant.
39 If the way certain keys are stored changes, and we don't deliberately decide to stop supporting old…
45 …rage) (files containing one key's metadata and, except for some secure element keys, key material).
56 This section describes the desired test cases for keys created with the current storage format vers…
70 ### Enumeration of test cases for keys
72 Objective: ensure that the coverage is sufficient to have assurance that all keys are stored correc…
85 … knowledge of what attributes (sizes, algorithms, …) and content to use for keys of a certain type.
94 …persistence levels. We may also want to have negative tests ensuring that keys with a not-supporte…
103 * HMAC keys longer than the block size: pre-hashed or not?
104 * DES keys: was parity enforced?
[all …]
/openthread-latest/tests/scripts/thread-cert/
Dtest_dnssd.py174 self.assertEqual({'ins1', 'ins2', 'ins3'}, set(service_instances.keys()))
178 self.assertEqual({'ins1', 'ins3'}, set(service_instances.keys()))
184 self.assertEqual({'ins1'}, set(service_instances.keys()))
207 self.assertEqual({'ins1', 'ins2', 'ins3', 'ins4'}, set(service_instances.keys()))
Ddebug.py98 print(self.test_case.nodes.keys())
Dv1_2_test_multicast_listener_registration.py457 self.assertEqual(all_mas, set(self.nodes[BBR_1].multicast_listener_list().keys()))
476 self.assertEqual(all_mas, set(self.nodes[BBR_1].multicast_listener_list().keys()))
484 self.assertEqual(all_mas, set(self.nodes[BBR_1].multicast_listener_list().keys()))
499 self.assertEqual(table, set(self.nodes[BBR_1].multicast_listener_list().keys()))
503 self.assertEqual(table, set(self.nodes[BBR_1].multicast_listener_list().keys()))
517 self.assertEqual(table, set(self.nodes[BBR_1].multicast_listener_list().keys()))
528 self.assertEqual(table, set(self.nodes[BBR_1].multicast_listener_list().keys()))
/openthread-latest/third_party/mbedtls/repo/scripts/
Dgenerate_psa_constants.py264 return ''.join([make(k, d[k]) for k in sorted(d.keys())])
269 return ''.join([make(k, d[k]) for k in sorted(d.keys())])
292 return ''.join([make(k, d[k]) for k in sorted(d.keys())])
Dabi_check.py468 missing = frozenset(old_tests.keys()).difference(new_tests.keys())
503 shared_modules = list(set(self.old_version.modules.keys()) &
504 set(self.new_version.modules.keys()))
/openthread-latest/tests/scripts/thread-cert/border_router/
Dtest_multi_thread_networks.py153 self.assertEqual(set(delta_counters.keys()), set(expect_delta.keys()))
/openthread-latest/third_party/mbedtls/repo/docs/architecture/
Dpsa-storage-resilience.md34 For a transparent key, all key management operations (creation or destruction) on persistent keys r…
38 * [Key management for stateful secure element keys](#designing-key-management-for-secure-element-ke…
40 …n the library design, and we do not need to perform any testing of resilience for transparent keys.
44 ## Designing key management for secure element keys
46 …in a stateful secure element, i.e. a secure element that stores keys. This excludes keys in a stat…
54 ### Dual management of keys: the problem argument
121 … cannot be used for this purpose because there is no way to enumerate all keys (and even if there …
133 …ions will explore the format of the transaction list, as well as how many keys it needs to contain.
154 From the analysis above, assuming that all keys are treated in the same way, there are 4 possible s…
211 Recovery means removing all traces of all keys on the transaction list. This means following the de…
[all …]
/openthread-latest/third_party/mbedtls/repo/docs/
Duse-psa-crypto.md7 - enables new APIs for using keys handled by PSA Crypto, such as
70 ### PSA-held (opaque) keys in the PK layer
96 ### PSA-held (opaque) keys for TLS pre-shared keys (PSK)
109 ### PSA-held (opaque) keys for TLS 1.2 EC J-PAKE key exchange
/openthread-latest/third_party/mbedtls/repo/include/mbedtls/
Dssl_ticket.h72 mbedtls_ssl_ticket_key MBEDTLS_PRIVATE(keys)[2]; /*!< ticket protection keys */
/openthread-latest/third_party/mbedtls/repo/docs/architecture/psa-migration/
Dpsa-legacy-bridges.md41 …API has features that are not present (yet) in PSA, notably parsing and formatting asymmetric keys.
54 * Key management: parsing, generating, deriving and formatting cryptographic keys.
55 * Data manipulation other than keys. In practice, most data formats within the scope of the legacy …
63 * Manipulating data formats, other than keys, where the PSA API is lacking.
75 …do not provide the same functionality. A typical example is parsing and formatting asymmetric keys.
78 …e-mixing-happens)”, we focus the gap analysis on two topics: metadata and keys. This chapter explo…
92 Hashes do not involve keys, and involves no nontrivial data format. Therefore the only gap is with …
118keys can also be further classified according to their curve. The legacy API also supports DHM (Di…
125 ECC keys are also involved in EC-JPAKE, but this happens internally: the EC-JPAKE interface only ne…
127 Since there is no algorithm that can be used with multiple types, and PSA keys have a policy that (…
[all …]
/openthread-latest/third_party/mbedtls/repo/docs/architecture/psa-thread-safety/
Dpsa-thread-safety.md5 …key management API](https://arm-software.github.io/psa-api/crypto/1.1/api/keys/management.html) an…
53 … management functions](https://arm-software.github.io/psa-api/crypto/1.1/api/keys/management.html):
92 1. The key identifier does not exist. This is a functional requirement for persistent keys: any thr…
93 2. The resources from the key have been freed. This allows threads to create similar keys immediate…
119 …here is no overlap between their calls. All threads share the same set of keys, as soon as one thr…
188 …he key store while holding `mbedtls_threading_key_slot_mutex`, the set of keys within the key stor…
194 The union of this set and the set of persistent keys not currently loaded into slots is our abstrac…
206 …`PSA_SLOT_FILLING`. If not found, it will see if there are any persistent keys loaded which do not…
211 ##### Re-loading persistent keys
213 As described above, persistent keys can be kicked out of the key slot array provided they are not c…
[all …]

1234