/openthread-latest/third_party/mbedtls/repo/tests/suites/ |
D | test_suite_psa_crypto_util.data | 61 ECDSA DER -> Raw, 256bit, Wrong sequence tag 65 ECDSA DER -> Raw, 256bit, Invalid sequence length 133 # 512/521 bit sizes are useful to test sequence's length encoded with 2 bytes. 138 # 512/521 bit sizes are useful to test sequence's length encoded with 2 bytes. 143 # 512/521 bit sizes are useful to test sequence's length encoded with 2 bytes. 148 # 512/521 bit sizes are useful to test sequence's length encoded with 2 bytes.
|
D | test_suite_pkcs5.data | 173 PBES2 Decrypt (bad KDF AlgId: not a sequence) 185 PBES2 Decrypt (bad PBKDF2 params: not a sequence) 221 PBES2 Decrypt (bad, PBKDF2 params explicit prf_alg not a sequence) 237 PBES2 Decrypt (bad enc_scheme_alg: not a sequence)
|
D | test_suite_ecdsa.function | 270 /* try invalid sequence tag */ 339 /* try invalid sequence tag */
|
D | test_suite_pem.data | 56 # The output sequence's length is not multiple of block size (16 bytes). This
|
D | test_suite_x509parse.function | 333 /* Get main sequence tag */ 346 * Cannot be an empty sequence. 357 * Get the policy sequence
|
D | test_suite_x509parse.data | 2834 X509 RSASSA-PSS parameters ASN1 (unknown tag in top-level sequence) 2966 X509 CSR ASN.1 (bad sequence: overlong) 2972 X509 CSR ASN.1 (bad CRI: not a sequence) 2984 X509 CSR ASN.1 (bad CRI.Name: not a sequence) 2999 X509 CSR ASN.1 (bad SubjectPublicKeyInfo: not a sequence) 3021 X509 CSR ASN.1 (bad sigAlg: not a sequence) 3054 X509 CSR ASN.1 (attributes: invalid sequence tag) 3070 X509 CSR ASN.1 (attributes: invalid extenstion request sequence tag) 3090 X509 CSR ASN.1 (extensions: invalid sequence tag) 3114 X509 CSR ASN.1 (extensions: invalid extension subject alt name sequence tag) [all …]
|
D | test_suite_x509write.function | 78 * The size of this temporary buffer is given by the sequence of functions
|
D | test_suite_psa_crypto_pake.function | 212 * sequence, if no error appears then, this will be treated
|
D | test_suite_rsa.data | 811 RSA parse public key - wrong sequence length
|
D | test_suite_mps.function | 188 * single-step sequence of feed-fetch-commit-reclaim.
|
D | test_suite_ssl.function | 3983 * Go through the handshake sequence, state by state, checking the early 4360 * Run handshakes going one state further in the handshake sequence at each
|
/openthread-latest/src/core/utils/ |
D | otns.cpp | 133 uint8_t sequence = aFrame.GetSequence(); in EmitTransmit() local 139 … EmitStatus("transmit=%d,%04x,%d,%04x", channel, frameControlField, sequence, dst.GetShort()); in EmitTransmit() 143 …EmitStatus("transmit=%d,%04x,%d,%s", channel, frameControlField, sequence, dst.ToString().AsCStrin… in EmitTransmit() 147 EmitStatus("transmit=%d,%04x,%d", channel, frameControlField, sequence); in EmitTransmit()
|
/openthread-latest/tests/scripts/thread-cert/ |
D | test_ipv6.py | 286 sequence = any_mpl_sequence() 289 return MPLOption(S, M, V, sequence, seed_id) 527 … _type=0x6d), MPLOption(S=1, M=0, V=0, sequence=2, seed_id=bytearray([0x00, 0x18]))) 609 self.assertEqual(2, ipv6_packet.extension_headers[0].options[0].value.sequence) 818 sequence = any_mpl_sequence() 821 mpl_option = MPLOption(S, M, V, sequence, seed_id) 827 expected_data = bytearray([(S << 6) | (M << 5) | (V << 4), sequence]) + seed_id 835 sequence = any_mpl_sequence() 838 data = bytearray([(S << 6) | (M << 5) | (V << 4), sequence]) + seed_id 847 self.assertEqual(sequence, mpl_option.sequence) [all …]
|
D | ipv6.py | 821 def __init__(self, S, M, V, sequence, seed_id): argument 825 self.sequence = sequence 831 return bytearray([smv, self.sequence]) + self.seed_id 841 sequence = ord(data.read(1)) 844 return cls(s, m, v, sequence, seed_id) 850 …MPLOption(S={}, M={}, V={}, sequence={}, seed_id={})".format(self.S, self.M, self.V, self.sequence,
|
D | simulator.py | 448 event_time, sequence, addr, type, datalen = event 451 event_time, sequence, addr, type, datalen, data = event
|
/openthread-latest/src/cli/ |
D | README_SRP_SERVER.md | 175 Get or set the sequence number used with anycast address mode. 177 The sequence number is included in "DNS/SRP Service Anycast Address" entry published in the Network…
|
D | README_SRP_CLIENT.md | 345 …ow hex-string format and is treated as an already encoded TXT data byte sequence. It is also optio…
|
D | README_NETDATA.md | 257 … [<version>]` to publish "DNS/SRP Service Anycast Address" with a given sequence number and versio…
|
/openthread-latest/src/core/mac/ |
D | mac.cpp | 1656 uint32_t sequence; in ProcessReceiveSecurity() local 1661 sequence = BigEndian::ReadUint32(aFrame.GetKeySource()); in ProcessReceiveSecurity() 1662 VerifyOrExit(((sequence & 0x7f) + 1) == keyid, error = kErrorSecurity); in ProcessReceiveSecurity() 1664 … macKey = (sequence == keyManager.GetCurrentKeySequence()) ? mLinks.GetCurrentMacKey(aFrame) in ProcessReceiveSecurity() 1665 … : &keyManager.GetTemporaryMacKey(sequence); in ProcessReceiveSecurity()
|
/openthread-latest/third_party/mbedtls/repo/docs/architecture/ |
D | psa-crypto-implementation-structure.md | 60 …sa_generate_key(), psa_key_derivation_output_key() and psa_copy_key() go by the following sequence: 173 * For new functions: incorrect function call sequence, driver dispatch (in `tests/suites/test_suite… 174 * For key derivation algorithms: variation on the sequence of input steps, variation on the output …
|
D | psa-storage-resilience.md | 17 …tarts during a sequence of storage modifications $M_1, M_2, \ldots, M_n$, we know that when the sy… 167 …fore calling the driver's key creation entry point. Therefore the normal sequence of operations is: 180 …he key file until after the key has been destroyed. Therefore the normal sequence of operations is: 196 …ta until it has been created in the secure element. Therefore the normal sequence of operations is: 204 … the key file before contacting the secure element. Therefore the normal sequence of operations is: 221 …y's metadata before creating in the secure element. Therefore the normal sequence of operations is: 229 …ct the secure element before removing the key file. Therefore the normal sequence of operations is:
|
D | tls13-support.md | 366 handlers is split into a sequence of stages.
|
/openthread-latest/third_party/mbedtls/repo/docs/architecture/psa-migration/ |
D | psa-legacy-bridges.md | 186 …-size concatenation of (r,s), whereas X.509 and pk use an ASN.1 DER encoding of the sequence (r,s).
|
/openthread-latest/third_party/mbedtls/repo/docs/architecture/psa-thread-safety/ |
D | psa-thread-safety.md | 213 …ree_key_slot` and load the key back into the reserved slot. This entire sequence is done during a …
|
/openthread-latest/third_party/mbedtls/repo/docs/proposed/ |
D | psa-driver-interface.md | 187 …erate on an existing key, the `psa_key_id_t` parameter is replaced by a sequence of three paramete… 196 …in key creation, the `psa_key_id_t *` output parameter is replaced by a sequence of parameters tha… 855 Here is a suggested call sequence for entropy collection that leverages these flags:
|