Home
last modified time | relevance | path

Searched refs:peer (Results 1 – 25 of 27) sorted by relevance

12

/openthread-latest/third_party/mbedtls/repo/library/
Dpsa_crypto_pake.c160 uint8_t *peer = NULL, *user = NULL; in mbedtls_psa_pake_setup() local
196 peer = mbedtls_calloc(1, peer_len); in mbedtls_psa_pake_setup()
197 if (peer == NULL) { in mbedtls_psa_pake_setup()
214 status = psa_crypto_driver_pake_get_peer(inputs, peer, in mbedtls_psa_pake_setup()
241 memcmp(peer, jpake_server_id, actual_peer_len) == 0) { in mbedtls_psa_pake_setup()
245 memcmp(peer, jpake_client_id, actual_peer_len) == 0) { in mbedtls_psa_pake_setup()
261 mbedtls_free(user); mbedtls_free(peer); in mbedtls_psa_pake_setup()
272 mbedtls_free(user); mbedtls_free(peer); in mbedtls_psa_pake_setup()
Dpsa_crypto.c8379 memcpy(peer_id, inputs->peer, inputs->peer_len); in psa_crypto_driver_pake_get_peer()
8558 operation->data.inputs.peer = mbedtls_calloc(1, peer_id_len); in psa_pake_set_peer()
8559 if (operation->data.inputs.peer == NULL) { in psa_pake_set_peer()
8566 memcpy(operation->data.inputs.peer, peer_id, peer_id_len); in psa_pake_set_peer()
8666 mbedtls_free(inputs.peer); in psa_pake_complete_inputs()
8978 if (operation->data.inputs.peer != NULL) { in psa_pake_abort()
8979 mbedtls_free(operation->data.inputs.peer); in psa_pake_abort()
Dssl_tls.c1975 const uint8_t *peer = NULL; in mbedtls_ssl_set_hs_ecjpake_password_common() local
1992 peer = jpake_client_id; in mbedtls_ssl_set_hs_ecjpake_password_common()
1997 peer = jpake_server_id; in mbedtls_ssl_set_hs_ecjpake_password_common()
2006 status = psa_pake_set_peer(&ssl->handshake->psa_pake_ctx, peer, peer_len); in mbedtls_ssl_set_hs_ecjpake_password_common()
/openthread-latest/src/cli/
DREADME_COAPS.md47 > coaps connect <peer-ip6-address>
132 - address: IPv6 address of the peer.
239 ### start \[check-peer-cert\|max-conn-attempts\]
243peer-cert` parameter determines if the peer-certificate check is enabled (default) or disabled. Th…
246 - Setting `check-peer-cert` to `true`: Has the same effect as as omitting the argument, which is th…
247 - Setting `check-peer-cert` to `false`: `check-peer-cert` value is `false`, and the `max-conn-attem…
248 - Specifying a number: `check-peer-cert` is `true`, and the `max-conn-attempts` value is the number…
DREADME_BR.md230 Get the list of peer BRs found in the Network Data.
240 The list of peer BRs specifically excludes the current device, even if it is itself acting as a BR.
256 Gets the number of peer BRs found in the Network Data.
260 The output indicates the minimum age among all peer BRs. Age is formatted as `{hh}:{mm}:{ss}` for h…
263 > br peer count
402 - `(peer BR)` is appended when the router is likely a peer BR connected to the same Thread mesh. Th…
DREADME_TCP.md123 Establishes a connection with the specified peer.
127 - ip: the peer's IP address.
128 - port: the peer's TCP port.
219 …CP connection associated with the example TCP endpoint. This promises the peer that no more data w…
DREADME_UDP.md99 Specifies the peer with which the socket is to be associated.
101 - ip: the peer's IP address.
102 - port: the peer's UDP port.
Dcli.cpp7162 const otTrelPeer *peer; in Process() local
7186 while ((peer = otTrelGetNextPeer(GetInstancePtr(), &iterator)) != nullptr) in Process()
7191 OutputExtAddress(peer->mExtAddress); in Process()
7193 OutputBytes(peer->mExtPanId.m8); in Process()
7195 OutputSockAddrLine(peer->mSockAddr); in Process()
7202 OutputExtAddress(peer->mExtAddress); in Process()
7204 OutputBytes(peer->mExtPanId.m8); in Process()
7205 otIp6SockAddrToString(&peer->mSockAddr, string, sizeof(string)); in Process()
DREADME_HISTORY.md510 …` or `RX`). A failed transmission (e.g., if tx was aborted or no ack from peer for any of the mess…
DREADME.md1210 - TREL status and peer table
2038 Send a MLE Link Probe message to the peer.
3961 Get the TREL peer table in table format or as a list.
/openthread-latest/tests/toranj/cli/
Dtest-706-multi-radio-trel-peer-addr-port-change-discovery.py79 for peer in peers:
81 if peer['Ext MAC Address'] == peer_node.get_ext_addr():
82 verify(peer_node.trel_test_get_sock_addr() == peer['IPv6 Socket Address'])
Dtest-503-peer-tbr-discovery.py121 verify(any([rloc16 in peer for peer in peers]))
/openthread-latest/third_party/mbedtls/repo/tests/suites/
Dtest_suite_psa_crypto_pake.data45 PSA PAKE: set empty peer
53 PSA PAKE: set invalid peer
61 PSA PAKE: peer already set
65 PSA PAKE: user and peer both servers
69 PSA PAKE: user and peer both clients
242 PSA PAKE: input getters: peer
Dtest_suite_psa_crypto_pake.function63 /* The only two JPAKE user/peer identifiers supported for the time being. */
611 uint8_t *peer = (uint8_t *) peer_arg;
639 TEST_EQUAL(psa_pake_set_peer(&operation, peer, peer_len),
671 SETUP_ALWAYS_CHECK_STEP(psa_pake_set_peer(&operation, peer, peer_len),
677 SETUP_CONDITIONAL_CHECK_STEP(psa_pake_set_peer(&operation, peer, peer_len),
1147 uint8_t peer_ret[20] = { 0 }; // max peer length is 20 bytes
1162 uint8_t *peer = (uint8_t *) peers[i];
1177 PSA_ASSERT(psa_pake_set_peer(&operation, peer, peer_len));
1196 TEST_MEMORY_COMPARE(peer_ret, buffer_len_ret, peer, peer_len);
Dtest_suite_ecjpake.function65 /* Load my private and public keys, and peer's public keys */
/openthread-latest/tests/toranj/
Dstart.sh164 run cli/test-706-multi-radio-trel-peer-addr-port-change-discovery.py
209 run cli/test-503-peer-tbr-discovery.py
/openthread-latest/third_party/mbedtls/repo/tests/include/test/
Dssl_helpers.h160 struct mbedtls_test_mock_socket *peer; member
/openthread-latest/third_party/mbedtls/repo/tests/src/test_helpers/
Dssl_helpers.c334 if (socket->peer != NULL) { in mbedtls_test_mock_socket_close()
335 memset(socket->peer, 0, sizeof(*socket->peer)); in mbedtls_test_mock_socket_close()
371 peer1->peer = peer2; in mbedtls_test_mock_socket_connect()
372 peer2->peer = peer1; in mbedtls_test_mock_socket_connect()
/openthread-latest/third_party/mbedtls/repo/include/psa/
Dcrypto_extra.h1784 uint8_t *MBEDTLS_PRIVATE(peer);
/openthread-latest/third_party/mbedtls/repo/docs/
Dpsa-transition.md1128 4. Send `our_pub` to the peer. Retrieve the peer's public key and import it into `their_pub`. These…
1138 …* `their_pub`: a buffer of the same size, to hold the peer's key. This can be the same as `our_pub…
1142 4. Send `our_pub` to the peer. Retrieve the peer's public key and import it into `their_pub`. These…
1157 2. Send the ServerKeyExchange message to the peer.
1158 3. Retrieve the peer's public key.
1159 4. Call `mbedtls_ecdh_read_public` or `mbedtls_dhm_read_public` on the peer's public key, then call…
1168 2. Send the ServerKeyExchange message to the peer.
1169 3. Retrieve the peer's public key.
1176 …ty that receives a message indicating both the choice of curve or group, and the peer's public key.
1178 …TLS ServerKeyExchange message received from the peer, which encodes the selected curve/group and t…
[all …]
D3.0-migration-guide.md705 AES-GCM, AES-CCM or ChachaPoly for example) and if your peer doesn't support
714 AES-GCM, AES-CCM or ChachaPoly for example) and if your peer doesn't support
825 and if your peer doesn't support any, encourage them to upgrade their software.
/openthread-latest/third_party/mbedtls/repo/3rdparty/p256-m/p256-m/
Dp256-m.c1234 const uint8_t priv[32], const uint8_t peer[64]) in p256_ecdh_shared_secret()
1248 ret = point_from_bytes(px, py, peer); in p256_ecdh_shared_secret()
DREADME.md183 certificates (otherwise, add one 'verify' for each link in the peer's
285 function doesn't include validation of the peer's public key, which should be
/openthread-latest/third_party/mbedtls/repo/docs/architecture/
Dtls13-support.md368 The sending of data to the peer only occurs in `mbedtls_ssl_handshake_step`
/openthread-latest/third_party/mbedtls/repo/
DChangeLog192 tickets compared to peer using a millisecond clock (observed with GnuTLS).
491 * Fix the J-PAKE driver interface for user and peer to accept any values
746 * Allow setting user and peer identifiers for EC J-PAKE operation
1209 * Fix a TLS 1.3 handshake failure when the peer Finished message has not
2787 incoming record with the correct connection data even after the peer has
2829 client programs to fail at the peer's certificate verification
2863 mbedtls_ssl_session structure which otherwise stores the peer's
2902 the peer CRT chain and session ticket twice.
3177 with the peer, as well as by a new per-connection MTU option, set using
3317 deep copy of the session, and the peer certificate is not lost. Fixes #926.
[all …]

12