/openthread-latest/third_party/mbedtls/repo/programs/psa/ |
D | key_ladder_demo.sh | 29 "$program" wrap master=master.key label=hello label=world \ 34 "$program" unwrap master=master.key label=hello label=world \ 41 …ram" unwrap master=master.key input=hello_world.wrap output=hellow_orld.txt label=hellow label=orld 45 "$program" save master=master.key label=hello \ 48 "$program" unwrap master=hello.key label=world \
|
/openthread-latest/tools/harness-automation/doc/ |
D | components.gv | 5 label="Windows"; 8 label="Automation Tool/Python"; 14 HarnessCase -> Chrome [label="selenium"]; 17 OpenThreadController -> DUT [label="serial port"];
|
/openthread-latest/tests/unit/ |
D | test_dns.cpp | 74 Dns::Name::LabelBuffer label; in TestDnsName() local 378 labelLength = sizeof(label); in TestDnsName() 379 SuccessOrQuit(Dns::Name::ReadLabel(*message, offset, label, labelLength)); in TestDnsName() 381 printf("Label[%d] = \"%s\"\n", index, label); in TestDnsName() 383 …VerifyOrQuit(strcmp(label, test.mLabels[index]) == 0, "Name::ReadLabel() did not get expected labe… in TestDnsName() 384 … VerifyOrQuit(labelLength == strlen(label), "Name::ReadLabel() returned incorrect label length"); in TestDnsName() 387 labelLength = sizeof(label); in TestDnsName() 388 VerifyOrQuit(Dns::Name::ReadLabel(*message, offset, label, labelLength) == kErrorNotFound, in TestDnsName() 417 strcpy(label, test.mLabels[index]); in TestDnsName() 419 SuccessOrQuit(Dns::Name::CompareLabel(*message, offset, label)); in TestDnsName() [all …]
|
/openthread-latest/src/cli/ |
D | cli_dns.cpp | 585 char label[OT_DNS_MAX_LABEL_SIZE]; in HandleDnsBrowseResponse() local 597 …while (otDnsBrowseResponseGetServiceInstance(aResponse, index, label, sizeof(label)) == OT_ERROR_N… in HandleDnsBrowseResponse() 599 OutputLine("%s", label); in HandleDnsBrowseResponse() 607 if (otDnsBrowseResponseGetServiceInfo(aResponse, label, &serviceInfo) == OT_ERROR_NONE) in HandleDnsBrowseResponse() 627 char label[OT_DNS_MAX_LABEL_SIZE]; in HandleDnsServiceResponse() local 631 …IgnoreError(otDnsServiceResponseGetServiceName(aResponse, label, sizeof(label), name, sizeof(name)… in HandleDnsServiceResponse() 633 OutputLine("DNS service resolution response for %s for service %s", label, name); in HandleDnsServiceResponse()
|
D | cli_srp_client.cpp | 687 char *label; in ProcessServiceAdd() local 707 label = strchr(string, ','); in ProcessServiceAdd() 709 if (label != nullptr) in ProcessServiceAdd() 717 *label++ = '\0'; in ProcessServiceAdd() 718 subTypeLabels[index] = label; in ProcessServiceAdd() 720 label = strchr(label, ','); in ProcessServiceAdd() 722 if (label == nullptr) in ProcessServiceAdd() 728 VerifyOrExit(label == nullptr, error = OT_ERROR_NO_BUFS); in ProcessServiceAdd()
|
D | cli_mdns.cpp | 294 char *label; in ParseServiceArgs() local 314 label = strchr(aBuffers.mString, ','); in ParseServiceArgs() 316 if (label != nullptr) in ParseServiceArgs() 320 *label++ = '\0'; in ParseServiceArgs() 323 aBuffers.mSubTypeLabels[aService.mSubTypeLabelsLength] = label; in ParseServiceArgs() 326 label = strchr(label, ','); in ParseServiceArgs() 328 if (label == nullptr) in ParseServiceArgs()
|
D | README.md | 1460 ### dns service \<service-instance-label\> \<service-name\> \[DNS server IP\] \[DNS server port\] \… 1462 …rvice instance. Service instance label is provided first, followed by the service name (note that … 1468 ### dns servicehost \<service-instance-label\> \<service-name\> \[DNS server IP\] \[DNS server port… 1472 Service instance label is provided first, followed by the service name (note that service instance …
|
/openthread-latest/third_party/mbedtls/repo/library/ |
D | ssl_tls13_keys.h | 114 const unsigned char *label, size_t label_len, 200 const unsigned char *label, size_t label_len,
|
D | ssl_tls13_keys.c | 101 const unsigned char *label, size_t label_len, in ssl_tls13_hkdf_encode_label() argument 127 memcpy(p, label, label_len); in ssl_tls13_hkdf_encode_label() 143 const unsigned char *label, size_t label_len, in mbedtls_ssl_tls13_hkdf_expand_label() argument 176 label, label_len, in mbedtls_ssl_tls13_hkdf_expand_label() 298 const unsigned char *label, size_t label_len, in mbedtls_ssl_tls13_derive_secret() argument 328 label, label_len, in mbedtls_ssl_tls13_derive_secret()
|
D | ssl_tls.c | 402 const char *label, 431 const char *label, 442 const char *label, 468 const char *label, in mbedtls_ssl_tls_prf() argument 491 return tls_prf(secret, slen, label, random, rlen, dstbuf, dlen); in mbedtls_ssl_tls_prf() 6684 const unsigned char *label, size_t label_length, in setup_psa_key_derivation() argument 6727 label, label_length); in setup_psa_key_derivation() 6748 const char *label, in tls_prf_generic() argument 6787 (unsigned char const *) label, in tls_prf_generic() 6788 (size_t) strlen(label), in tls_prf_generic() [all …]
|
D | rsa.c | 1763 const unsigned char *label, size_t label_len, in mbedtls_rsa_rsaes_oaep_encrypt() argument 1801 ret = compute_hash((mbedtls_md_type_t) ctx->hash_id, label, label_len, p); in mbedtls_rsa_rsaes_oaep_encrypt() 1918 const unsigned char *label, size_t label_len, in mbedtls_rsa_rsaes_oaep_decrypt() argument 1978 label, label_len, lhash); in mbedtls_rsa_rsaes_oaep_decrypt()
|
D | psa_crypto.c | 5511 if (operation->ctx.tls12_prf.label != NULL) { in psa_key_derivation_abort() 5512 mbedtls_zeroize_and_free(operation->ctx.tls12_prf.label, in psa_key_derivation_abort() 5725 tls12_prf->label, in psa_key_derivation_tls12_prf_generate_next_block() 5766 status = psa_mac_update(&hmac, tls12_prf->label, tls12_prf->label_length); in psa_key_derivation_tls12_prf_generate_next_block() 6912 prf->label = mbedtls_calloc(1, data_length); in psa_tls12_prf_set_label() 6913 if (prf->label == NULL) { in psa_tls12_prf_set_label() 6917 memcpy(prf->label, data, data_length); in psa_tls12_prf_set_label()
|
/openthread-latest/third_party/mbedtls/repo/include/mbedtls/ |
D | rsa.h | 685 const unsigned char *label, size_t label_len, 811 const unsigned char *label, size_t label_len,
|
D | ssl.h | 5588 const char *label,
|
/openthread-latest/src/posix/platform/ |
D | spi_interface.cpp | 258 char label[] = "SOC_THREAD_RESET"; in InitResetPin() local 265 mResetGpioValueFd = SetupGpioHandle(fd, aLine, GPIOHANDLE_REQUEST_OUTPUT, label); in InitResetPin() 272 char label[] = "THREAD_SOC_INT"; in InitIntPin() local 280 …lueFd = SetupGpioEvent(fd, aLine, GPIOHANDLE_REQUEST_INPUT, GPIOEVENT_REQUEST_FALLING_EDGE, label); in InitIntPin()
|
/openthread-latest/third_party/mbedtls/repo/include/psa/ |
D | crypto_builtin_key_derivation.h | 82 uint8_t *MBEDTLS_PRIVATE(label);
|
/openthread-latest/src/core/net/ |
D | srp_advertising_proxy.cpp | 1010 char label[Dns::Name::kMaxLabelSize]; in RegisterService() local 1013 …noreError(Server::Service::ParseSubTypeServiceName(subTypeName.AsCString(), label, sizeof(label))); in RegisterService() 1014 SuccessOrExit(error = labelString.Set(label)); in RegisterService()
|
D | srp_server.cpp | 1424 Dns::Name::LabelBuffer label; in InformUpdateHandlerOrCommit() local 1426 IgnoreError(Service::ParseSubTypeServiceName(subType.AsCString(), label)); in InformUpdateHandlerOrCommit() 1427 LogInfo(" sub-type: %s", label); in InformUpdateHandlerOrCommit() 1963 Dns::Name::LabelBuffer label; in Log() local 1965 IgnoreError(ParseSubTypeServiceName(subType.AsCString(), label)); in Log()
|
D | dnssd_server.cpp | 466 Name::LabelBuffer label; in ParseQueryName() local 467 uint8_t labelLength = sizeof(label); in ParseQueryName() 470 SuccessOrExit(error = Name::ReadLabel(*mMessage, offset, label, labelLength)); in ParseQueryName() 472 if ((mType == kPtrQuery) && StringMatch(label, kSubLabel, kStringCaseInsensitiveMatch)) in ParseQueryName()
|
D | srp_client.cpp | 149 const char *label; in SetState() local 151 for (uint16_t index = 0; (label = GetSubTypeLabelAt(index)) != nullptr; index++) in SetState() 153 string.Append("%s\"%s\"", (index != 0) ? ", " : "", label); in SetState()
|
/openthread-latest/third_party/mbedtls/repo/tests/suites/ |
D | test_suite_psa_crypto_driver_wrappers.function | 2490 data_t *label, 2549 label->x, label->len, 2580 label->x, label->len, 2613 data_t *label, 2657 label->x, label->len, 2684 data_t *label, 2730 label->x, label->len,
|
D | test_suite_ssl.function | 1955 char *label, data_t *result_str, int exp_ret) 1967 label, random->x, random->len, 2606 /* The goto below is used to avoid an "unused label" warning.*/ 2631 /* The goto below is used to avoid an "unused label" warning.*/ 2644 /* The goto below is used to avoid an "unused label" warning.*/ 2673 /* The goto below is used to avoid an "unused label" warning.*/ 2702 /* The goto below is used to avoid an "unused label" warning.*/ 2717 /* The goto below is used to avoid an "unused label" warning.*/ 2729 /* The goto below is used to avoid an "unused label" warning.*/ 2744 /* The goto below is used to avoid an "unused label" warning.*/ [all …]
|
D | test_suite_psa_crypto.function | 8466 data_t *label, 8502 label->x, label->len, 8512 /* If the label is empty, the test framework puts a non-null pointer 8513 * in label->x. Test that a null pointer works as well. */ 8514 if (label->len == 0) { 8521 NULL, label->len, 8550 data_t *label) 8592 label->x, label->len, 8601 label->x, label->len, 8626 data_t *label, [all …]
|
D | test_suite_psa_crypto.data | 5054 PSA encrypt: RSA OAEP-SHA-256, good, with label 5062 PSA encrypt: RSA OAEP-SHA-384, good, with label 5106 PSA encrypt-decrypt: RSA OAEP-SHA-256, with label 5134 PSA decrypt: RSA OAEP-SHA-256, 0 bytes, with label 5142 PSA decrypt: RSA OAEP-SHA-256, 30 bytes, with label 5150 PSA decrypt: RSA OAEP-SHA-256, 30 bytes, wrong label (should be empty) 5154 PSA decrypt: RSA OAEP-SHA-256, 30 bytes, wrong label (empty) 5158 PSA decrypt: RSA OAEP-SHA-256, 30 bytes, wrong label (same length) 5360 PSA key derivation: HKDF-SHA-256, reject label step 5393 PSA key derivation: TLS 1.2 PRF SHA-256, missing label [all …]
|
D | test_suite_psa_crypto_se_driver_hal.function | 56 * label `exit`. 74 * jump directly to the `exit` label. If this returns any other
|