/openthread-latest/src/posix/platform/ |
D | netif.cpp | 440 } req; in UpdateUnicastLinux() local 442 memset(&req, 0, sizeof(req)); in UpdateUnicastLinux() 444 req.nh.nlmsg_len = NLMSG_LENGTH(sizeof(struct ifaddrmsg)); in UpdateUnicastLinux() 445 req.nh.nlmsg_flags = NLM_F_REQUEST | NLM_F_ACK | (aIsAdded ? (NLM_F_CREATE | NLM_F_EXCL) : 0); in UpdateUnicastLinux() 446 req.nh.nlmsg_type = aIsAdded ? RTM_NEWADDR : RTM_DELADDR; in UpdateUnicastLinux() 447 req.nh.nlmsg_pid = 0; in UpdateUnicastLinux() 448 req.nh.nlmsg_seq = ++sNetlinkSequence; in UpdateUnicastLinux() 450 req.ifa.ifa_family = AF_INET6; in UpdateUnicastLinux() 451 req.ifa.ifa_prefixlen = aAddressInfo.mPrefixLength; in UpdateUnicastLinux() 452 req.ifa.ifa_flags = IFA_F_NODAD; in UpdateUnicastLinux() [all …]
|
D | spi_interface.cpp | 202 struct gpiohandle_request req; in SetupGpioHandle() local 205 assert(strlen(aLabel) < sizeof(req.consumer_label)); in SetupGpioHandle() 207 req.flags = aHandleFlags; in SetupGpioHandle() 208 req.lines = 1; in SetupGpioHandle() 209 req.lineoffsets[0] = aLine; in SetupGpioHandle() 210 req.default_values[0] = 1; in SetupGpioHandle() 212 snprintf(req.consumer_label, sizeof(req.consumer_label), "%s", aLabel); in SetupGpioHandle() 214 VerifyOrDie((ret = ioctl(aFd, GPIO_GET_LINEHANDLE_IOCTL, &req)) != -1, OT_EXIT_ERROR_ERRNO); in SetupGpioHandle() 216 return req.fd; in SetupGpioHandle() 225 struct gpioevent_request req; in SetupGpioEvent() local [all …]
|
D | infra_if.cpp | 675 struct gaicb *req = (struct gaicb *)sv.sival_ptr; in DiscoverNat64PrefixDone() local 676 struct addrinfo *res = (struct addrinfo *)req->ar_result; in DiscoverNat64PrefixDone() 680 VerifyOrExit((char *)req->ar_name == kWellKnownIpv4OnlyName); in DiscoverNat64PrefixDone() 747 freeaddrinfo((struct addrinfo *)req->ar_request); in DiscoverNat64PrefixDone() 748 free(req); in DiscoverNat64PrefixDone()
|
/openthread-latest/third_party/mbedtls/repo/tests/data_files/ |
D | Makefile | 51 test-ca.req.sha256: $(test_ca_key_file_rsa) 53 all_intermediate += test-ca.req.sha256 55 parse_input/test-ca.crt test-ca.crt: $(test_ca_key_file_rsa) test-ca.req.sha256 56 …$(MBEDTLS_CERT_WRITE) is_ca=1 serial=3 request_file=test-ca.req.sha256 selfsign=1 issuer_name="C=N… 74 test-ca-sha1.crt: $(test_ca_key_file_rsa) test-ca.req.sha256 75 …$(MBEDTLS_CERT_WRITE) is_ca=1 serial=3 request_file=test-ca.req.sha256 selfsign=1 issuer_name="C=N… 82 test-ca-sha256.crt: $(test_ca_key_file_rsa) test-ca.req.sha256 83 …$(MBEDTLS_CERT_WRITE) is_ca=1 serial=3 request_file=test-ca.req.sha256 selfsign=1 issuer_name="C=N… 91 …$(OPENSSL) req -x509 -new -nodes -key $(test_ca_key_file_rsa) -passin "pass:$(test_ca_pwd_rsa)" -s… 95 …$(OPENSSL) req -x509 -new -nodes -key $(test_ca_key_file_rsa) -passin "pass:$(test_ca_pwd_rsa)" -s… [all …]
|
D | server1_csr.opensslconf | 1 [ req ]
|
D | authorityKeyId_subjectKeyId.conf | 1 [req]
|
D | test-ca.opensslconf | 1 [req]
|
D | Readme-x509.txt | 74 .req*: CSR, not certificate
|
/openthread-latest/third_party/mbedtls/repo/programs/x509/ |
D | cert_req.c | 110 int write_certificate_request(mbedtls_x509write_csr *req, const char *output_file, in write_certificate_request() argument 120 if ((ret = mbedtls_x509write_csr_pem(req, output_buf, 4096, f_rng, p_rng)) < 0) { in write_certificate_request() 148 mbedtls_x509write_csr req; in main() local 160 mbedtls_x509write_csr_init(&req); in main() 387 mbedtls_x509write_csr_set_md_alg(&req, opt.md_alg); in main() 391 ret = mbedtls_x509write_csr_set_key_usage(&req, opt.key_usage); in main() 401 ret = mbedtls_x509write_csr_set_ns_cert_type(&req, opt.ns_cert_type); in main() 411 ret = mbedtls_x509write_csr_set_subject_alternative_name(&req, opt.san_list); in main() 442 if ((ret = mbedtls_x509write_csr_set_subject_name(&req, opt.subject_name)) != 0) { in main() 463 mbedtls_x509write_csr_set_key(&req, &key); in main() [all …]
|
/openthread-latest/third_party/tcplp/bsdtcp/ |
D | tcp_fastopen.c | 718 error = sysctl_handle_int(oidp, &new, 0, req); 719 if (error == 0 && req->newptr) { 746 error = sysctl_handle_int(oidp, &new, 0, req); 747 if (error == 0 && req->newptr) { 773 error = sysctl_handle_int(oidp, &new, 0, req); 774 if (error == 0 && req->newptr) { 811 if (req->oldptr != NULL || req->oldlen != 0) 813 if (req->newptr == NULL) 815 if (req->newlen != sizeof(newkey)) 817 error = SYSCTL_IN(req, newkey, sizeof(newkey)); [all …]
|
/openthread-latest/third_party/mbedtls/repo/tests/data_files/dir-maxpath/ |
D | long.sh | 15 $OPENSSL req -new -x509 -subj "/C=UK/O=mbed TLS/CN=CA00" $OPT \ 28 $OPENSSL req -new -subj "/C=UK/O=mbed TLS/CN=CA${ME}" \ 30 $OPENSSL x509 -req -CA ${UP}.crt -CAkey ${UP}.key -set_serial 1 $OPT \
|
/openthread-latest/third_party/mbedtls/repo/scripts/ |
D | min_requirements.py | 31 def adjust_requirement(self, req: str) -> str: 35 split_req = req.split(';', 1) 63 for req in self.requirements: 64 out.write(req + '\n')
|
/openthread-latest/third_party/mbedtls/repo/tests/suites/ |
D | test_suite_x509write.function | 148 mbedtls_x509write_csr req; 204 mbedtls_x509write_csr_init(&req); 211 mbedtls_x509write_csr_set_md_alg(&req, md_type); 212 mbedtls_x509write_csr_set_key(&req, &key); 213 TEST_ASSERT(mbedtls_x509write_csr_set_subject_name(&req, subject_name) == 0); 215 TEST_ASSERT(mbedtls_x509write_csr_set_key_usage(&req, key_usage) == 0); 218 TEST_ASSERT(mbedtls_x509write_csr_set_ns_cert_type(&req, cert_type) == 0); 221 TEST_ASSERT(csr_set_extended_key_usage(&req, MBEDTLS_OID_SERVER_AUTH, 224 TEST_ASSERT(mbedtls_x509write_csr_set_subject_alternative_name(&req, san_list) == 0); 227 ret = mbedtls_x509write_csr_pem(&req, buf, sizeof(buf), [all …]
|
D | test_suite_x509write.data | 3 x509_csr_check:"data_files/server1.key":"data_files/server1.req.sha1":MBEDTLS_MD_SHA1:0:0:0:0:0 7 x509_csr_check:"data_files/server1.key":"data_files/server1.req.sha224":MBEDTLS_MD_SHA224:0:0:0:0:0 11 x509_csr_check:"data_files/server1.key":"data_files/server1.req.sha256":MBEDTLS_MD_SHA256:0:0:0:0:0 15 x509_csr_check:"data_files/server1.key":"data_files/server1.req.sha384":MBEDTLS_MD_SHA384:0:0:0:0:0 19 x509_csr_check:"data_files/server1.key":"data_files/server1.req.sha512":MBEDTLS_MD_SHA512:0:0:0:0:0 23 x509_csr_check:"data_files/server1.key":"data_files/server1.req.md5":MBEDTLS_MD_MD5:0:0:0:0:0 27 x509_csr_check:"data_files/server1.key":"data_files/server1.req.key_usage":MBEDTLS_MD_SHA1:MBEDTLS_… 35 x509_csr_check:"data_files/server1.key":"data_files/server1.req.key_usage_empty":MBEDTLS_MD_SHA1:0:… 39 x509_csr_check:"data_files/server1.key":"data_files/server1.req.cert_type":MBEDTLS_MD_SHA1:0:0:MBED… 43 x509_csr_check:"data_files/server1.key":"data_files/server1.req.cert_type_empty":MBEDTLS_MD_SHA1:0:… [all …]
|
D | test_suite_x509parse.data | 323 mbedtls_x509_csr_info:"data_files/parse_input/server1.req.md5":"CSR version \: 1\nsubject name \… 327 mbedtls_x509_csr_info:"data_files/parse_input/server1.req.sha1":"CSR version \: 1\nsubject name … 331 mbedtls_x509_csr_info:"data_files/parse_input/server1.req.sha224":"CSR version \: 1\nsubject name… 335 mbedtls_x509_csr_info:"data_files/parse_input/server1.req.sha256":"CSR version \: 1\nsubject name… 339 mbedtls_x509_csr_info:"data_files/parse_input/server1.req.sha384":"CSR version \: 1\nsubject name… 343 mbedtls_x509_csr_info:"data_files/parse_input/server1.req.sha512":"CSR version \: 1\nsubject name… 347 mbedtls_x509_csr_info:"data_files/parse_input/server1.req.commas.sha256":"CSR version \: 1\nsubje… 351 mbedtls_x509_csr_info:"data_files/parse_input/server5.req.sha1":"CSR version \: 1\nsubject name … 355 mbedtls_x509_csr_info:"data_files/parse_input/server5.req.sha224":"CSR version \: 1\nsubject name… 359 mbedtls_x509_csr_info:"data_files/parse_input/server5.req.sha256":"CSR version \: 1\nsubject name… [all …]
|
/openthread-latest/tools/tcat_ble_client/auth-generate/ |
D | create-cert-ca.sh | 46 openssl req -new -key "ca/${NAME}_key.pem" -out "${NAME}.csr" \ 52 -extensions "${NAME}" -req -in "${NAME}.csr" \
|
D | create-cert-tcat-commissioner.sh | 52 openssl req -new -key "keys/${NAME}_key.pem" -out "${NAME}.csr" -subj \ 59 "${NAME}" -req -in "${NAME}.csr" -out "output/${NAME}/commissioner_cert.pem" \
|
D | create-cert-tcat-device.sh | 57 openssl req -new -key "keys/${NAME}_key.pem" -out "${NAME}.csr" -subj \ 64 "${NAME}" -req -in "${NAME}.csr" -out "output/${NAME}/device_cert.pem" \
|
/openthread-latest/tools/tcat_ble_client/ |
D | GENERATING_CERTIFICATES.md | 41 openssl req -new -sha256 -key ca_key.pem -out ca.csr 47 openssl req -x509 -sha256 -days 365 -key ca_key.pem -in ca.csr -out ca_cert.pem 67 openssl req -new -sha256 -key commissioner_key.pem -out commissioner.csr -config commissioner.cnf 73 openssl x509 -req -in commissioner.csr -CA ca_cert.pem -CAkey ca_key.pem -out commissioner_cert.pem… 93 [ req ]
|
/openthread-latest/tools/harness-automation/autothreadharness/ |
D | open_thread_controller.py | 191 def _req(self, req): argument 202 logger.debug('DUT> %s', req) 210 self._sendline(req) 211 self._expect(req)
|
/openthread-latest/third_party/mbedtls/repo/docs/architecture/psa-migration/ |
D | psa-limitations.md | 291 server9.req.sha1 295 server9.req.sha224 299 server9.req.sha256 303 server9.req.sha384 307 server9.req.sha512
|
/openthread-latest/src/posix/ |
D | README.md | 107 nrfutil pkg generate --hw-version 52 --sd-req=0x00 \
|
/openthread-latest/src/cli/ |
D | README_COAPS.md | 80 > openssl req -x509 -new -key ec_private.pem -out x509_cert.pem -days 30
|
D | README.md | 161 …ure the response status for DUA.req with meshLocalIid in payload. Without meshLocalIid, simply res… 228 Configure the response status for the next MLR.req.
|