Home
last modified time | relevance | path

Searched refs:label (Results 1 – 25 of 35) sorted by relevance

12

/openthread-latest/third_party/mbedtls/repo/programs/psa/
Dkey_ladder_demo.sh29 "$program" wrap master=master.key label=hello label=world \
34 "$program" unwrap master=master.key label=hello label=world \
41 …ram" unwrap master=master.key input=hello_world.wrap output=hellow_orld.txt label=hellow label=orld
45 "$program" save master=master.key label=hello \
48 "$program" unwrap master=hello.key label=world \
/openthread-latest/tools/harness-automation/doc/
Dcomponents.gv5 label="Windows";
8 label="Automation Tool/Python";
14 HarnessCase -> Chrome [label="selenium"];
17 OpenThreadController -> DUT [label="serial port"];
/openthread-latest/tests/unit/
Dtest_dns.cpp74 Dns::Name::LabelBuffer label; in TestDnsName() local
378 labelLength = sizeof(label); in TestDnsName()
379 SuccessOrQuit(Dns::Name::ReadLabel(*message, offset, label, labelLength)); in TestDnsName()
381 printf("Label[%d] = \"%s\"\n", index, label); in TestDnsName()
383 …VerifyOrQuit(strcmp(label, test.mLabels[index]) == 0, "Name::ReadLabel() did not get expected labe… in TestDnsName()
384 … VerifyOrQuit(labelLength == strlen(label), "Name::ReadLabel() returned incorrect label length"); in TestDnsName()
387 labelLength = sizeof(label); in TestDnsName()
388 VerifyOrQuit(Dns::Name::ReadLabel(*message, offset, label, labelLength) == kErrorNotFound, in TestDnsName()
417 strcpy(label, test.mLabels[index]); in TestDnsName()
419 SuccessOrQuit(Dns::Name::CompareLabel(*message, offset, label)); in TestDnsName()
[all …]
/openthread-latest/src/cli/
Dcli_dns.cpp585 char label[OT_DNS_MAX_LABEL_SIZE]; in HandleDnsBrowseResponse() local
597 …while (otDnsBrowseResponseGetServiceInstance(aResponse, index, label, sizeof(label)) == OT_ERROR_N… in HandleDnsBrowseResponse()
599 OutputLine("%s", label); in HandleDnsBrowseResponse()
607 if (otDnsBrowseResponseGetServiceInfo(aResponse, label, &serviceInfo) == OT_ERROR_NONE) in HandleDnsBrowseResponse()
627 char label[OT_DNS_MAX_LABEL_SIZE]; in HandleDnsServiceResponse() local
631 …IgnoreError(otDnsServiceResponseGetServiceName(aResponse, label, sizeof(label), name, sizeof(name)… in HandleDnsServiceResponse()
633 OutputLine("DNS service resolution response for %s for service %s", label, name); in HandleDnsServiceResponse()
Dcli_srp_client.cpp687 char *label; in ProcessServiceAdd() local
707 label = strchr(string, ','); in ProcessServiceAdd()
709 if (label != nullptr) in ProcessServiceAdd()
717 *label++ = '\0'; in ProcessServiceAdd()
718 subTypeLabels[index] = label; in ProcessServiceAdd()
720 label = strchr(label, ','); in ProcessServiceAdd()
722 if (label == nullptr) in ProcessServiceAdd()
728 VerifyOrExit(label == nullptr, error = OT_ERROR_NO_BUFS); in ProcessServiceAdd()
Dcli_mdns.cpp294 char *label; in ParseServiceArgs() local
314 label = strchr(aBuffers.mString, ','); in ParseServiceArgs()
316 if (label != nullptr) in ParseServiceArgs()
320 *label++ = '\0'; in ParseServiceArgs()
323 aBuffers.mSubTypeLabels[aService.mSubTypeLabelsLength] = label; in ParseServiceArgs()
326 label = strchr(label, ','); in ParseServiceArgs()
328 if (label == nullptr) in ParseServiceArgs()
DREADME.md1460 ### dns service \<service-instance-label\> \<service-name\> \[DNS server IP\] \[DNS server port\] \…
1462 …rvice instance. Service instance label is provided first, followed by the service name (note that …
1468 ### dns servicehost \<service-instance-label\> \<service-name\> \[DNS server IP\] \[DNS server port…
1472 Service instance label is provided first, followed by the service name (note that service instance
/openthread-latest/third_party/mbedtls/repo/library/
Dssl_tls13_keys.h114 const unsigned char *label, size_t label_len,
200 const unsigned char *label, size_t label_len,
Dssl_tls13_keys.c101 const unsigned char *label, size_t label_len, in ssl_tls13_hkdf_encode_label() argument
127 memcpy(p, label, label_len); in ssl_tls13_hkdf_encode_label()
143 const unsigned char *label, size_t label_len, in mbedtls_ssl_tls13_hkdf_expand_label() argument
176 label, label_len, in mbedtls_ssl_tls13_hkdf_expand_label()
298 const unsigned char *label, size_t label_len, in mbedtls_ssl_tls13_derive_secret() argument
328 label, label_len, in mbedtls_ssl_tls13_derive_secret()
Dssl_tls.c402 const char *label,
431 const char *label,
442 const char *label,
468 const char *label, in mbedtls_ssl_tls_prf() argument
491 return tls_prf(secret, slen, label, random, rlen, dstbuf, dlen); in mbedtls_ssl_tls_prf()
6684 const unsigned char *label, size_t label_length, in setup_psa_key_derivation() argument
6727 label, label_length); in setup_psa_key_derivation()
6748 const char *label, in tls_prf_generic() argument
6787 (unsigned char const *) label, in tls_prf_generic()
6788 (size_t) strlen(label), in tls_prf_generic()
[all …]
Drsa.c1763 const unsigned char *label, size_t label_len, in mbedtls_rsa_rsaes_oaep_encrypt() argument
1801 ret = compute_hash((mbedtls_md_type_t) ctx->hash_id, label, label_len, p); in mbedtls_rsa_rsaes_oaep_encrypt()
1918 const unsigned char *label, size_t label_len, in mbedtls_rsa_rsaes_oaep_decrypt() argument
1978 label, label_len, lhash); in mbedtls_rsa_rsaes_oaep_decrypt()
Dpsa_crypto.c5511 if (operation->ctx.tls12_prf.label != NULL) { in psa_key_derivation_abort()
5512 mbedtls_zeroize_and_free(operation->ctx.tls12_prf.label, in psa_key_derivation_abort()
5725 tls12_prf->label, in psa_key_derivation_tls12_prf_generate_next_block()
5766 status = psa_mac_update(&hmac, tls12_prf->label, tls12_prf->label_length); in psa_key_derivation_tls12_prf_generate_next_block()
6912 prf->label = mbedtls_calloc(1, data_length); in psa_tls12_prf_set_label()
6913 if (prf->label == NULL) { in psa_tls12_prf_set_label()
6917 memcpy(prf->label, data, data_length); in psa_tls12_prf_set_label()
/openthread-latest/third_party/mbedtls/repo/include/mbedtls/
Drsa.h685 const unsigned char *label, size_t label_len,
811 const unsigned char *label, size_t label_len,
Dssl.h5588 const char *label,
/openthread-latest/src/posix/platform/
Dspi_interface.cpp258 char label[] = "SOC_THREAD_RESET"; in InitResetPin() local
265 mResetGpioValueFd = SetupGpioHandle(fd, aLine, GPIOHANDLE_REQUEST_OUTPUT, label); in InitResetPin()
272 char label[] = "THREAD_SOC_INT"; in InitIntPin() local
280 …lueFd = SetupGpioEvent(fd, aLine, GPIOHANDLE_REQUEST_INPUT, GPIOEVENT_REQUEST_FALLING_EDGE, label); in InitIntPin()
/openthread-latest/third_party/mbedtls/repo/include/psa/
Dcrypto_builtin_key_derivation.h82 uint8_t *MBEDTLS_PRIVATE(label);
/openthread-latest/src/core/net/
Dsrp_advertising_proxy.cpp1010 char label[Dns::Name::kMaxLabelSize]; in RegisterService() local
1013 …noreError(Server::Service::ParseSubTypeServiceName(subTypeName.AsCString(), label, sizeof(label))); in RegisterService()
1014 SuccessOrExit(error = labelString.Set(label)); in RegisterService()
Dsrp_server.cpp1424 Dns::Name::LabelBuffer label; in InformUpdateHandlerOrCommit() local
1426 IgnoreError(Service::ParseSubTypeServiceName(subType.AsCString(), label)); in InformUpdateHandlerOrCommit()
1427 LogInfo(" sub-type: %s", label); in InformUpdateHandlerOrCommit()
1963 Dns::Name::LabelBuffer label; in Log() local
1965 IgnoreError(ParseSubTypeServiceName(subType.AsCString(), label)); in Log()
Ddnssd_server.cpp466 Name::LabelBuffer label; in ParseQueryName() local
467 uint8_t labelLength = sizeof(label); in ParseQueryName()
470 SuccessOrExit(error = Name::ReadLabel(*mMessage, offset, label, labelLength)); in ParseQueryName()
472 if ((mType == kPtrQuery) && StringMatch(label, kSubLabel, kStringCaseInsensitiveMatch)) in ParseQueryName()
Dsrp_client.cpp149 const char *label; in SetState() local
151 for (uint16_t index = 0; (label = GetSubTypeLabelAt(index)) != nullptr; index++) in SetState()
153 string.Append("%s\"%s\"", (index != 0) ? ", " : "", label); in SetState()
/openthread-latest/third_party/mbedtls/repo/tests/suites/
Dtest_suite_psa_crypto_driver_wrappers.function2490 data_t *label,
2549 label->x, label->len,
2580 label->x, label->len,
2613 data_t *label,
2657 label->x, label->len,
2684 data_t *label,
2730 label->x, label->len,
Dtest_suite_ssl.function1955 char *label, data_t *result_str, int exp_ret)
1967 label, random->x, random->len,
2606 /* The goto below is used to avoid an "unused label" warning.*/
2631 /* The goto below is used to avoid an "unused label" warning.*/
2644 /* The goto below is used to avoid an "unused label" warning.*/
2673 /* The goto below is used to avoid an "unused label" warning.*/
2702 /* The goto below is used to avoid an "unused label" warning.*/
2717 /* The goto below is used to avoid an "unused label" warning.*/
2729 /* The goto below is used to avoid an "unused label" warning.*/
2744 /* The goto below is used to avoid an "unused label" warning.*/
[all …]
Dtest_suite_psa_crypto.function8466 data_t *label,
8502 label->x, label->len,
8512 /* If the label is empty, the test framework puts a non-null pointer
8513 * in label->x. Test that a null pointer works as well. */
8514 if (label->len == 0) {
8521 NULL, label->len,
8550 data_t *label)
8592 label->x, label->len,
8601 label->x, label->len,
8626 data_t *label,
[all …]
Dtest_suite_psa_crypto.data5054 PSA encrypt: RSA OAEP-SHA-256, good, with label
5062 PSA encrypt: RSA OAEP-SHA-384, good, with label
5106 PSA encrypt-decrypt: RSA OAEP-SHA-256, with label
5134 PSA decrypt: RSA OAEP-SHA-256, 0 bytes, with label
5142 PSA decrypt: RSA OAEP-SHA-256, 30 bytes, with label
5150 PSA decrypt: RSA OAEP-SHA-256, 30 bytes, wrong label (should be empty)
5154 PSA decrypt: RSA OAEP-SHA-256, 30 bytes, wrong label (empty)
5158 PSA decrypt: RSA OAEP-SHA-256, 30 bytes, wrong label (same length)
5360 PSA key derivation: HKDF-SHA-256, reject label step
5393 PSA key derivation: TLS 1.2 PRF SHA-256, missing label
[all …]
Dtest_suite_psa_crypto_se_driver_hal.function56 * label `exit`.
74 * jump directly to the `exit` label. If this returns any other

12