Home
last modified time | relevance | path

Searched refs:sequence (Results 1 – 25 of 30) sorted by relevance

12

/openthread-latest/third_party/mbedtls/repo/tests/suites/
Dtest_suite_psa_crypto_util.data61 ECDSA DER -> Raw, 256bit, Wrong sequence tag
65 ECDSA DER -> Raw, 256bit, Invalid sequence length
133 # 512/521 bit sizes are useful to test sequence's length encoded with 2 bytes.
138 # 512/521 bit sizes are useful to test sequence's length encoded with 2 bytes.
143 # 512/521 bit sizes are useful to test sequence's length encoded with 2 bytes.
148 # 512/521 bit sizes are useful to test sequence's length encoded with 2 bytes.
Dtest_suite_pkcs5.data173 PBES2 Decrypt (bad KDF AlgId: not a sequence)
185 PBES2 Decrypt (bad PBKDF2 params: not a sequence)
221 PBES2 Decrypt (bad, PBKDF2 params explicit prf_alg not a sequence)
237 PBES2 Decrypt (bad enc_scheme_alg: not a sequence)
Dtest_suite_ecdsa.function270 /* try invalid sequence tag */
339 /* try invalid sequence tag */
Dtest_suite_pem.data56 # The output sequence's length is not multiple of block size (16 bytes). This
Dtest_suite_x509parse.function333 /* Get main sequence tag */
346 * Cannot be an empty sequence.
357 * Get the policy sequence
Dtest_suite_x509parse.data2834 X509 RSASSA-PSS parameters ASN1 (unknown tag in top-level sequence)
2966 X509 CSR ASN.1 (bad sequence: overlong)
2972 X509 CSR ASN.1 (bad CRI: not a sequence)
2984 X509 CSR ASN.1 (bad CRI.Name: not a sequence)
2999 X509 CSR ASN.1 (bad SubjectPublicKeyInfo: not a sequence)
3021 X509 CSR ASN.1 (bad sigAlg: not a sequence)
3054 X509 CSR ASN.1 (attributes: invalid sequence tag)
3070 X509 CSR ASN.1 (attributes: invalid extenstion request sequence tag)
3090 X509 CSR ASN.1 (extensions: invalid sequence tag)
3114 X509 CSR ASN.1 (extensions: invalid extension subject alt name sequence tag)
[all …]
Dtest_suite_x509write.function78 * The size of this temporary buffer is given by the sequence of functions
Dtest_suite_psa_crypto_pake.function212 * sequence, if no error appears then, this will be treated
Dtest_suite_rsa.data811 RSA parse public key - wrong sequence length
Dtest_suite_mps.function188 * single-step sequence of feed-fetch-commit-reclaim.
Dtest_suite_ssl.function3983 * Go through the handshake sequence, state by state, checking the early
4360 * Run handshakes going one state further in the handshake sequence at each
/openthread-latest/src/core/utils/
Dotns.cpp133 uint8_t sequence = aFrame.GetSequence(); in EmitTransmit() local
139 … EmitStatus("transmit=%d,%04x,%d,%04x", channel, frameControlField, sequence, dst.GetShort()); in EmitTransmit()
143 …EmitStatus("transmit=%d,%04x,%d,%s", channel, frameControlField, sequence, dst.ToString().AsCStrin… in EmitTransmit()
147 EmitStatus("transmit=%d,%04x,%d", channel, frameControlField, sequence); in EmitTransmit()
/openthread-latest/tests/scripts/thread-cert/
Dtest_ipv6.py286 sequence = any_mpl_sequence()
289 return MPLOption(S, M, V, sequence, seed_id)
527 … _type=0x6d), MPLOption(S=1, M=0, V=0, sequence=2, seed_id=bytearray([0x00, 0x18])))
609 self.assertEqual(2, ipv6_packet.extension_headers[0].options[0].value.sequence)
818 sequence = any_mpl_sequence()
821 mpl_option = MPLOption(S, M, V, sequence, seed_id)
827 expected_data = bytearray([(S << 6) | (M << 5) | (V << 4), sequence]) + seed_id
835 sequence = any_mpl_sequence()
838 data = bytearray([(S << 6) | (M << 5) | (V << 4), sequence]) + seed_id
847 self.assertEqual(sequence, mpl_option.sequence)
[all …]
Dipv6.py821 def __init__(self, S, M, V, sequence, seed_id): argument
825 self.sequence = sequence
831 return bytearray([smv, self.sequence]) + self.seed_id
841 sequence = ord(data.read(1))
844 return cls(s, m, v, sequence, seed_id)
850 …MPLOption(S={}, M={}, V={}, sequence={}, seed_id={})".format(self.S, self.M, self.V, self.sequence,
Dsimulator.py448 event_time, sequence, addr, type, datalen = event
451 event_time, sequence, addr, type, datalen, data = event
/openthread-latest/src/cli/
DREADME_SRP_SERVER.md175 Get or set the sequence number used with anycast address mode.
177 The sequence number is included in "DNS/SRP Service Anycast Address" entry published in the Network…
DREADME_SRP_CLIENT.md345 …ow hex-string format and is treated as an already encoded TXT data byte sequence. It is also optio…
DREADME_NETDATA.md257 … [<version>]` to publish "DNS/SRP Service Anycast Address" with a given sequence number and versio…
/openthread-latest/src/core/mac/
Dmac.cpp1656 uint32_t sequence; in ProcessReceiveSecurity() local
1661 sequence = BigEndian::ReadUint32(aFrame.GetKeySource()); in ProcessReceiveSecurity()
1662 VerifyOrExit(((sequence & 0x7f) + 1) == keyid, error = kErrorSecurity); in ProcessReceiveSecurity()
1664 … macKey = (sequence == keyManager.GetCurrentKeySequence()) ? mLinks.GetCurrentMacKey(aFrame) in ProcessReceiveSecurity()
1665 … : &keyManager.GetTemporaryMacKey(sequence); in ProcessReceiveSecurity()
/openthread-latest/third_party/mbedtls/repo/docs/architecture/
Dpsa-crypto-implementation-structure.md60 …sa_generate_key(), psa_key_derivation_output_key() and psa_copy_key() go by the following sequence:
173 * For new functions: incorrect function call sequence, driver dispatch (in `tests/suites/test_suite…
174 * For key derivation algorithms: variation on the sequence of input steps, variation on the output …
Dpsa-storage-resilience.md17 …tarts during a sequence of storage modifications $M_1, M_2, \ldots, M_n$, we know that when the sy…
167 …fore calling the driver's key creation entry point. Therefore the normal sequence of operations is:
180 …he key file until after the key has been destroyed. Therefore the normal sequence of operations is:
196 …ta until it has been created in the secure element. Therefore the normal sequence of operations is:
204 … the key file before contacting the secure element. Therefore the normal sequence of operations is:
221 …y's metadata before creating in the secure element. Therefore the normal sequence of operations is:
229 …ct the secure element before removing the key file. Therefore the normal sequence of operations is:
Dtls13-support.md366 handlers is split into a sequence of stages.
/openthread-latest/third_party/mbedtls/repo/docs/architecture/psa-migration/
Dpsa-legacy-bridges.md186 …-size concatenation of (r,s), whereas X.509 and pk use an ASN.1 DER encoding of the sequence (r,s).
/openthread-latest/third_party/mbedtls/repo/docs/architecture/psa-thread-safety/
Dpsa-thread-safety.md213 …ree_key_slot` and load the key back into the reserved slot. This entire sequence is done during a …
/openthread-latest/third_party/mbedtls/repo/docs/proposed/
Dpsa-driver-interface.md187 …erate on an existing key, the `psa_key_id_t` parameter is replaced by a sequence of three paramete…
196 …in key creation, the `psa_key_id_t *` output parameter is replaced by a sequence of parameters tha…
855 Here is a suggested call sequence for entropy collection that leverages these flags:

12