Home
last modified time | relevance | path

Searched refs:valid (Results 1 – 25 of 57) sorted by relevance

123

/openthread-latest/third_party/mbedtls/repo/tests/data_files/dir4/
DReadme23 …nzero pathlen constraint on an intermediate CA with maximum number of elements in the chain (valid)
28 6. nonzero pathlen constraint on the root CA with maximum number of elements in the chain (valid)
33 … on the root CA with maximum number of elements and a self signed certificate in the chain (valid)
39 8. zero pathlen constraint on first intermediate CA (valid)
44 9. zero pathlen constraint on trusted root (valid)
/openthread-latest/third_party/mbedtls/repo/tests/suites/
Dtest_suite_lmots.data90 # This test uses the valid signature from hsslms interop test 1, and then
96 # This test uses the valid signature from hsslms interop test 1, and then
102 # This test uses the valid signature from hsslms interop test 1, and then
108 # This test uses the valid public key for hsslms interop test 1, imports it, and
114 # This test uses the valid public key for hsslms interop test 1, add an extra
119 # This test uses the valid public key for hsslms interop test 1, removes a byte,
124 # This test uses the valid public key for hsslms interop test 1, cuts it down so
130 # This test uses the valid public key for hsslms interop test 1, alters the
135 # This test uses the valid public key for hsslms interop test 1, alters the
Dtest_suite_ecdsa.data389 ECDSA verify valid pub key, invalid sig (r=0), 0 bytes of data
393 ECDSA verify valid pub key, invalid sig (r=0), 1 byte of data
397 ECDSA verify valid pub key, invalid sig (r>n-1), 32 bytes of data
401 ECDSA verify valid pub key, valid/incorrect sig, 0 bytes of data
405 ECDSA verify valid pub key, valid/incorrect sig, 1 byte of data
409 ECDSA verify valid pub key, valid/incorrect sig, 32 bytes of data
413 ECDSA verify valid public key, correct sig, 0 bytes of data
417 ECDSA verify valid pub key, correct sig, 1 byte of data
421 ECDSA verify valid pub key, correct sig, 32 bytes of data
Dtest_suite_lms.data190 # This test uses the data from hash-sigs interop test #1. This test has a valid
195 # This test uses the data from hash-sigs interop test #1. This test has a valid
201 # invalid LMOTS type (0x3) but a valid LMS type (0x6), and should fail.
206 # invalid LMOTS type (0x5) but a valid LMS type (0x6), and should fail.
222 # This test uses the valid public key for hsslms interop test 1, add an extra
227 # This test uses the valid public key for hsslms interop test 1, removes a byte,
232 # This test uses the valid public key for hsslms interop test 1, cuts it down so
238 # This test uses the valid public key for hsslms interop test 1, cuts it down so
244 # This test uses the valid public key for hsslms interop test 1, alters the
249 # This test uses the valid public key for hsslms interop test 1, alters the
[all …]
Dtest_suite_base64.data162 Base64 encode hex all valid input bytes #0
165 Base64 encode hex all valid input bytes #1
168 Base64 encode hex all valid input bytes #2
171 Base64 encode all valid output characters at all offsets
189 Base64 decode all valid input characters at all offsets
Dtest_suite_ecjpake.data10 ECJPAKE round one: client, valid
13 ECJPAKE round one: server, valid
118 ECJPAKE round two client: valid
184 ECJPAKE round two server: valid
Dtest_suite_pk.data4 PK valid parameters
7 PK write valid parameters
1558 Copy from PSA: valid EC (SECP_R1_256 + ECDSA + ANY_HASH)
1562 Copy from PSA: valid EC (SECP_R1_256 + ECDSA + SHA_256)
1566 Copy from PSA: valid EC (SECP_R1_256 + ECDSA + SHA_512)
1570 Copy from PSA: valid EC (SECP_R1_256 + DET_ECDSA + ANY_HASH)
1574 Copy from PSA: valid EC (SECP_R1_256 + DET_ECDSA + SHA_256)
1578 Copy from PSA: valid EC (SECP_R1_256 + DET_ECDSA + SHA_512)
1582 Copy from PSA: valid EC (SECP_R1_256 + ECDSA_ANY)
1586 Copy from PSA: valid EC (SECP_R1_521 + ECDSA + SHA_256)
[all …]
Dtest_suite_pem.data22 PEM read (unencrypted, valid)
59 PEM read (valid EC key encoded with AES-128-CBC)
Dtest_suite_block_cipher.function28 /* That size is valid for a key or an input/output block. */
Dtest_suite_x509parse.data494 # Parse the following valid DN:
838 X509 CRT verification #52 (CA keyUsage valid)
962 X509 CRT verification #82 (Not yet valid CA and valid CA)
966 X509 CRT verification #83 (valid CA and Not yet valid CA)
970 X509 CRT verification #84 (valid CA and Not yet valid CA)
974 X509 CRT verification #85 (Not yet valid CA and valid CA)
978 X509 CRT verification #86 (Not yet valid CA and invalid CA)
1082 X509 CRT parse CN: IPv4 valid address
1127 X509 CRT parse CN: IPv6 valid address
1130 X509 CRT parse CN: IPv6 valid address shorthand
[all …]
Dtest_suite_net.function113 /* In principle, mbedtls_net_poll() with valid arguments should succeed.
Dtest_suite_lms.function91 /* Test negative cases if the input data is valid */
Dtest_suite_psa_crypto_metadata.function102 * possibly turn a valid encoding into another valid encoding. Here in
106 * The expected parity is even so that 0 is considered a valid encoding.
Dtest_suite_asn1parse.function37 /* Since we have a valid element start (tag and length), retrieve and
234 * valid depending on what the trailing garbage is. */
335 /* An INTEGER with no content is not valid. */
Dtest_suite_lmots.function91 /* Test negative cases if the input data is valid */
Dtest_suite_bignum.function17 /* Only +1 and -1 are valid sign bits, not e.g. 0 */
1277 * is a valid value. However, negating it (`-n`) has undefined behavior
1399 /* Test mbedtls_mpi_mod_int(): never valid */
1403 /* Test mbedtls_mpi_random(): never valid */
/openthread-latest/src/core/meshcop/
Dmeshcop.cpp83 bool valid = false; in IsPskdValid() local
96 valid = true; in IsPskdValid()
99 return valid; in IsPskdValid()
/openthread-latest/third_party/mbedtls/repo/library/
Dconstant_time.c137 mbedtls_ct_condition_t valid = mbedtls_ct_bool_and(mbedtls_ct_uint_ge(i, skip_head), in mbedtls_ct_memcmp_partial() local
139 diff |= mbedtls_ct_uint_if_else_0(valid, d); in mbedtls_ct_memcmp_partial()
/openthread-latest/third_party/mbedtls/repo/doxygen/
Dmbedtls.doxyfile37 # This is perfectly valid as far as Doxygen is concerned. However, with
/openthread-latest/src/cli/
DREADME_HISTORY.md102 …ad:beef:cafe:c4cb:caba:8d55:e30b prefixlen:64 origin:slaac scope:14 preferred:yes valid:yes rloc:no
103 …ad:beef:cafe:c4cb:caba:8d55:e30b prefixlen:64 origin:slaac scope:14 preferred:yes valid:yes rloc:no
104 …dded address:fd00:0:0:0:0:0:0:1 prefixlen:64 origin:manual scope:14 preferred:yes valid:yes rloc:no
105 …s:fdde:ad00:beef:0:0:ff:fe00:fc00 prefixlen:64 origin:thread scope:3 preferred:no valid:yes rloc:no
106 …:fdde:ad00:beef:0:0:ff:fe00:5400 prefixlen:64 origin:thread scope:3 preferred:no valid:yes rloc:yes
505 - Destination IPv6 address and port number (port number is valid for UDP/TCP, it is zero otherwise).
508 - Message checksum (valid for UDP, TCP, or ICMP6 message)
DREADME.md1298 …The channel to discover on. If no channel is provided, the discovery will cover all valid channels.
1764 - `valid`: valid flag (boolean)
1768 fd5e:18fa:f4a5:b8:0:ff:fe00:fc00 origin:thread plen:64 preferred:0 valid:1
1769 fd5e:18fa:f4a5:b8:0:ff:fe00:dc00 origin:thread plen:64 preferred:0 valid:1
1770 fd5e:18fa:f4a5:b8:f8e:5d95:87a0:e82c origin:thread plen:64 preferred:0 valid:1
1771 fe80:0:0:0:4891:b191:e277:8826 origin:thread plen:64 preferred:1 valid:1
2042 - length: The length of the Probe message, valid range: [0, 64].
2571 - A valid CIDR must have a non-zero prefix length.
3162 Add a valid prefix to the Network Data.
3401 Add a valid external route to the Network Data.
[all …]
/openthread-latest/etc/cmake/
Doptions.cmake135 # Declares a multi-value OT cmake config with `name` with valid
157 … message(FATAL_ERROR "${name}=\"${${name}}\" - unknown value, valid values " "${${values}}")
288 message(FATAL_ERROR "Invalid value for OT_PLATFORM - valid values are:" "${OT_PLATFORM_VALUES}")
298 …message(FATAL_ERROR "Invalid value for OT_THREAD_VERSION - valid values are: " "${OT_THREAD_VERSIO…
/openthread-latest/src/core/net/
Ddns_types.cpp1322 bool valid = false; in VerifyTxtData() local
1340 valid = (curEntryLength == 0); in VerifyTxtData()
1343 return valid; in VerifyTxtData()
/openthread-latest/src/core/diags/
DREADME.md172 - length: The length of packet. The valid range is [3, 127].
188 - length: The length of packet. The valid range is [3, 127].
/openthread-latest/third_party/mbedtls/repo/docs/architecture/
Dpsa-crypto-implementation-structure.md26 * checking PSA API arguments and translating them into valid arguments for the necessary calls to t…
159 * Attempt to perform an operation with a combination of key type and algorithm that is not valid or…
165 * `scripts/mbedtls_dev/asymmetric_key_data.py` contains valid key data for asymmetric key types.

123