| /openthread-latest/third_party/mbedtls/repo/library/ |
| D | psa_crypto_pake.c | 160 uint8_t *peer = NULL, *user = NULL; in mbedtls_psa_pake_setup() local 196 peer = mbedtls_calloc(1, peer_len); in mbedtls_psa_pake_setup() 197 if (peer == NULL) { in mbedtls_psa_pake_setup() 214 status = psa_crypto_driver_pake_get_peer(inputs, peer, in mbedtls_psa_pake_setup() 241 memcmp(peer, jpake_server_id, actual_peer_len) == 0) { in mbedtls_psa_pake_setup() 245 memcmp(peer, jpake_client_id, actual_peer_len) == 0) { in mbedtls_psa_pake_setup() 261 mbedtls_free(user); mbedtls_free(peer); in mbedtls_psa_pake_setup() 272 mbedtls_free(user); mbedtls_free(peer); in mbedtls_psa_pake_setup()
|
| D | psa_crypto.c | 8379 memcpy(peer_id, inputs->peer, inputs->peer_len); in psa_crypto_driver_pake_get_peer() 8558 operation->data.inputs.peer = mbedtls_calloc(1, peer_id_len); in psa_pake_set_peer() 8559 if (operation->data.inputs.peer == NULL) { in psa_pake_set_peer() 8566 memcpy(operation->data.inputs.peer, peer_id, peer_id_len); in psa_pake_set_peer() 8666 mbedtls_free(inputs.peer); in psa_pake_complete_inputs() 8978 if (operation->data.inputs.peer != NULL) { in psa_pake_abort() 8979 mbedtls_free(operation->data.inputs.peer); in psa_pake_abort()
|
| D | ssl_tls.c | 1975 const uint8_t *peer = NULL; in mbedtls_ssl_set_hs_ecjpake_password_common() local 1992 peer = jpake_client_id; in mbedtls_ssl_set_hs_ecjpake_password_common() 1997 peer = jpake_server_id; in mbedtls_ssl_set_hs_ecjpake_password_common() 2006 status = psa_pake_set_peer(&ssl->handshake->psa_pake_ctx, peer, peer_len); in mbedtls_ssl_set_hs_ecjpake_password_common()
|
| /openthread-latest/src/cli/ |
| D | README_COAPS.md | 47 > coaps connect <peer-ip6-address> 132 - address: IPv6 address of the peer. 239 ### start \[check-peer-cert\|max-conn-attempts\] 243 …peer-cert` parameter determines if the peer-certificate check is enabled (default) or disabled. Th… 246 - Setting `check-peer-cert` to `true`: Has the same effect as as omitting the argument, which is th… 247 - Setting `check-peer-cert` to `false`: `check-peer-cert` value is `false`, and the `max-conn-attem… 248 - Specifying a number: `check-peer-cert` is `true`, and the `max-conn-attempts` value is the number…
|
| D | README_BR.md | 230 Get the list of peer BRs found in the Network Data. 240 The list of peer BRs specifically excludes the current device, even if it is itself acting as a BR. 256 Gets the number of peer BRs found in the Network Data. 260 The output indicates the minimum age among all peer BRs. Age is formatted as `{hh}:{mm}:{ss}` for h… 263 > br peer count 402 - `(peer BR)` is appended when the router is likely a peer BR connected to the same Thread mesh. Th…
|
| D | README_TCP.md | 123 Establishes a connection with the specified peer. 127 - ip: the peer's IP address. 128 - port: the peer's TCP port. 219 …CP connection associated with the example TCP endpoint. This promises the peer that no more data w…
|
| D | README_UDP.md | 99 Specifies the peer with which the socket is to be associated. 101 - ip: the peer's IP address. 102 - port: the peer's UDP port.
|
| D | cli.cpp | 7162 const otTrelPeer *peer; in Process() local 7186 while ((peer = otTrelGetNextPeer(GetInstancePtr(), &iterator)) != nullptr) in Process() 7191 OutputExtAddress(peer->mExtAddress); in Process() 7193 OutputBytes(peer->mExtPanId.m8); in Process() 7195 OutputSockAddrLine(peer->mSockAddr); in Process() 7202 OutputExtAddress(peer->mExtAddress); in Process() 7204 OutputBytes(peer->mExtPanId.m8); in Process() 7205 otIp6SockAddrToString(&peer->mSockAddr, string, sizeof(string)); in Process()
|
| D | README_HISTORY.md | 510 …` or `RX`). A failed transmission (e.g., if tx was aborted or no ack from peer for any of the mess…
|
| D | README.md | 1210 - TREL status and peer table 2038 Send a MLE Link Probe message to the peer. 3961 Get the TREL peer table in table format or as a list.
|
| /openthread-latest/tests/toranj/cli/ |
| D | test-706-multi-radio-trel-peer-addr-port-change-discovery.py | 79 for peer in peers: 81 if peer['Ext MAC Address'] == peer_node.get_ext_addr(): 82 verify(peer_node.trel_test_get_sock_addr() == peer['IPv6 Socket Address'])
|
| D | test-503-peer-tbr-discovery.py | 121 verify(any([rloc16 in peer for peer in peers]))
|
| /openthread-latest/third_party/mbedtls/repo/tests/suites/ |
| D | test_suite_psa_crypto_pake.data | 45 PSA PAKE: set empty peer 53 PSA PAKE: set invalid peer 61 PSA PAKE: peer already set 65 PSA PAKE: user and peer both servers 69 PSA PAKE: user and peer both clients 242 PSA PAKE: input getters: peer
|
| D | test_suite_psa_crypto_pake.function | 63 /* The only two JPAKE user/peer identifiers supported for the time being. */ 611 uint8_t *peer = (uint8_t *) peer_arg; 639 TEST_EQUAL(psa_pake_set_peer(&operation, peer, peer_len), 671 SETUP_ALWAYS_CHECK_STEP(psa_pake_set_peer(&operation, peer, peer_len), 677 SETUP_CONDITIONAL_CHECK_STEP(psa_pake_set_peer(&operation, peer, peer_len), 1147 uint8_t peer_ret[20] = { 0 }; // max peer length is 20 bytes 1162 uint8_t *peer = (uint8_t *) peers[i]; 1177 PSA_ASSERT(psa_pake_set_peer(&operation, peer, peer_len)); 1196 TEST_MEMORY_COMPARE(peer_ret, buffer_len_ret, peer, peer_len);
|
| D | test_suite_ecjpake.function | 65 /* Load my private and public keys, and peer's public keys */
|
| /openthread-latest/tests/toranj/ |
| D | start.sh | 164 run cli/test-706-multi-radio-trel-peer-addr-port-change-discovery.py 209 run cli/test-503-peer-tbr-discovery.py
|
| /openthread-latest/third_party/mbedtls/repo/tests/include/test/ |
| D | ssl_helpers.h | 160 struct mbedtls_test_mock_socket *peer; member
|
| /openthread-latest/third_party/mbedtls/repo/tests/src/test_helpers/ |
| D | ssl_helpers.c | 334 if (socket->peer != NULL) { in mbedtls_test_mock_socket_close() 335 memset(socket->peer, 0, sizeof(*socket->peer)); in mbedtls_test_mock_socket_close() 371 peer1->peer = peer2; in mbedtls_test_mock_socket_connect() 372 peer2->peer = peer1; in mbedtls_test_mock_socket_connect()
|
| /openthread-latest/third_party/mbedtls/repo/include/psa/ |
| D | crypto_extra.h | 1784 uint8_t *MBEDTLS_PRIVATE(peer);
|
| /openthread-latest/third_party/mbedtls/repo/docs/ |
| D | psa-transition.md | 1128 4. Send `our_pub` to the peer. Retrieve the peer's public key and import it into `their_pub`. These… 1138 …* `their_pub`: a buffer of the same size, to hold the peer's key. This can be the same as `our_pub… 1142 4. Send `our_pub` to the peer. Retrieve the peer's public key and import it into `their_pub`. These… 1157 2. Send the ServerKeyExchange message to the peer. 1158 3. Retrieve the peer's public key. 1159 4. Call `mbedtls_ecdh_read_public` or `mbedtls_dhm_read_public` on the peer's public key, then call… 1168 2. Send the ServerKeyExchange message to the peer. 1169 3. Retrieve the peer's public key. 1176 …ty that receives a message indicating both the choice of curve or group, and the peer's public key. 1178 …TLS ServerKeyExchange message received from the peer, which encodes the selected curve/group and t… [all …]
|
| D | 3.0-migration-guide.md | 705 AES-GCM, AES-CCM or ChachaPoly for example) and if your peer doesn't support 714 AES-GCM, AES-CCM or ChachaPoly for example) and if your peer doesn't support 825 and if your peer doesn't support any, encourage them to upgrade their software.
|
| /openthread-latest/third_party/mbedtls/repo/3rdparty/p256-m/p256-m/ |
| D | p256-m.c | 1234 const uint8_t priv[32], const uint8_t peer[64]) in p256_ecdh_shared_secret() 1248 ret = point_from_bytes(px, py, peer); in p256_ecdh_shared_secret()
|
| D | README.md | 183 certificates (otherwise, add one 'verify' for each link in the peer's 285 function doesn't include validation of the peer's public key, which should be
|
| /openthread-latest/third_party/mbedtls/repo/docs/architecture/ |
| D | tls13-support.md | 368 The sending of data to the peer only occurs in `mbedtls_ssl_handshake_step`
|
| /openthread-latest/third_party/mbedtls/repo/ |
| D | ChangeLog | 192 tickets compared to peer using a millisecond clock (observed with GnuTLS). 491 * Fix the J-PAKE driver interface for user and peer to accept any values 746 * Allow setting user and peer identifiers for EC J-PAKE operation 1209 * Fix a TLS 1.3 handshake failure when the peer Finished message has not 2787 incoming record with the correct connection data even after the peer has 2829 client programs to fail at the peer's certificate verification 2863 mbedtls_ssl_session structure which otherwise stores the peer's 2902 the peer CRT chain and session ticket twice. 3177 with the peer, as well as by a new per-connection MTU option, set using 3317 deep copy of the session, and the peer certificate is not lost. Fixes #926. [all …]
|