/openthread-3.4.0/third_party/mbedtls/repo/programs/psa/ |
D | crypto_examples.c | 69 psa_status_t status; in cipher_operation() local 79 status = psa_cipher_update( operation, input + bytes_written, in cipher_operation() 82 ASSERT_STATUS( status, PSA_SUCCESS ); in cipher_operation() 88 status = psa_cipher_finish( operation, output + *output_len, in cipher_operation() 90 ASSERT_STATUS( status, PSA_SUCCESS ); in cipher_operation() 94 return( status ); in cipher_operation() 108 psa_status_t status; in cipher_encrypt() local 113 status = psa_cipher_encrypt_setup( &operation, key, alg ); in cipher_encrypt() 114 ASSERT_STATUS( status, PSA_SUCCESS ); in cipher_encrypt() 116 status = psa_cipher_generate_iv( &operation, iv, iv_size, &iv_len ); in cipher_encrypt() [all …]
|
D | key_ladder_demo.c | 92 status = DEMO_ERROR; \ 102 status = ( expr ); \ 103 if( status != PSA_SUCCESS ) \ 106 (int) status, \ 175 psa_status_t status = PSA_SUCCESS; in save_key() local 191 return( status ); in save_key() 201 psa_status_t status = PSA_SUCCESS; in generate() local 217 return( status ); in generate() 230 psa_status_t status = PSA_SUCCESS; in import_key_from_file() local 244 status = DEMO_ERROR; in import_key_from_file() [all …]
|
/openthread-3.4.0/third_party/mbedtls/repo/library/ |
D | psa_crypto_slot_management.c | 104 psa_status_t status = PSA_ERROR_CORRUPTION_DETECTED; in psa_get_and_lock_key_slot_in_memory() local 121 status = mbedtls_svc_key_id_equal( key, slot->attr.id ) ? in psa_get_and_lock_key_slot_in_memory() 135 status = ( slot_idx < MBEDTLS_PSA_KEY_SLOT_COUNT ) ? in psa_get_and_lock_key_slot_in_memory() 139 if( status == PSA_SUCCESS ) in psa_get_and_lock_key_slot_in_memory() 141 status = psa_lock_key_slot( slot ); in psa_get_and_lock_key_slot_in_memory() 142 if( status == PSA_SUCCESS ) in psa_get_and_lock_key_slot_in_memory() 146 return( status ); in psa_get_and_lock_key_slot_in_memory() 174 psa_status_t status = PSA_ERROR_CORRUPTION_DETECTED; in psa_get_empty_key_slot() local 180 status = PSA_ERROR_BAD_STATE; in psa_get_empty_key_slot() 217 status = psa_lock_key_slot( selected_slot ); in psa_get_empty_key_slot() [all …]
|
D | psa_crypto.c | 607 psa_status_t status = psa_allocate_buffer_to_slot( slot, in psa_copy_key_material_into_slot() local 609 if( status != PSA_SUCCESS ) in psa_copy_key_material_into_slot() 610 return( status ); in psa_copy_key_material_into_slot() 622 psa_status_t status = PSA_ERROR_CORRUPTION_DETECTED; in psa_import_key_into_slot() local 642 status = validate_unstructured_key_bit_size( type, *bits ); in psa_import_key_into_slot() 643 if( status != PSA_SUCCESS ) in psa_import_key_into_slot() 644 return( status ); in psa_import_key_into_slot() 969 psa_status_t status = PSA_ERROR_CORRUPTION_DETECTED; in psa_get_and_lock_key_slot_with_policy() local 972 status = psa_get_and_lock_key_slot( key, p_slot ); in psa_get_and_lock_key_slot_with_policy() 973 if( status != PSA_SUCCESS ) in psa_get_and_lock_key_slot_with_policy() [all …]
|
D | psa_crypto_driver_wrappers.c | 71 psa_status_t status = PSA_ERROR_CORRUPTION_DETECTED; in psa_driver_wrapper_init() local 74 status = psa_init_all_se_drivers( ); in psa_driver_wrapper_init() 75 if( status != PSA_SUCCESS ) in psa_driver_wrapper_init() 76 return( status ); in psa_driver_wrapper_init() 80 status = mbedtls_test_transparent_init( ); in psa_driver_wrapper_init() 81 if( status != PSA_SUCCESS ) in psa_driver_wrapper_init() 82 return( status ); in psa_driver_wrapper_init() 84 status = mbedtls_test_opaque_init( ); in psa_driver_wrapper_init() 85 if( status != PSA_SUCCESS ) in psa_driver_wrapper_init() 86 return( status ); in psa_driver_wrapper_init() [all …]
|
D | psa_crypto_storage.c | 95 psa_status_t status; in psa_crypto_storage_load() local 100 status = psa_its_get_info( data_identifier, &data_identifier_info ); in psa_crypto_storage_load() 101 if( status != PSA_SUCCESS ) in psa_crypto_storage_load() 102 return( status ); in psa_crypto_storage_load() 104 status = psa_its_get( data_identifier, 0, (uint32_t) data_size, data, &data_length ); in psa_crypto_storage_load() 108 return( status ); in psa_crypto_storage_load() 145 psa_status_t status; in psa_crypto_storage_store() local 152 status = psa_its_set( data_identifier, (uint32_t) data_length, data, 0 ); in psa_crypto_storage_store() 153 if( status != PSA_SUCCESS ) in psa_crypto_storage_store() 158 status = psa_its_get_info( data_identifier, &data_identifier_info ); in psa_crypto_storage_store() [all …]
|
D | psa_crypto_mac.c | 51 psa_status_t status; in psa_hmac_setup_internal() local 70 status = psa_hash_compute( hash_alg, key, key_length, in psa_hmac_setup_internal() 72 if( status != PSA_SUCCESS ) in psa_hmac_setup_internal() 94 status = psa_hash_setup( &hmac->hash_ctx, hash_alg ); in psa_hmac_setup_internal() 95 if( status != PSA_SUCCESS ) in psa_hmac_setup_internal() 98 status = psa_hash_update( &hmac->hash_ctx, ipad, block_size ); in psa_hmac_setup_internal() 103 return( status ); in psa_hmac_setup_internal() 123 psa_status_t status; in psa_hmac_finish_internal() local 125 status = psa_hash_finish( &hmac->hash_ctx, tmp, sizeof( tmp ), &hash_size ); in psa_hmac_finish_internal() 126 if( status != PSA_SUCCESS ) in psa_hmac_finish_internal() [all …]
|
D | psa_crypto_rsa.c | 60 psa_status_t status; in psa_check_rsa_key_byte_aligned() local 62 status = mbedtls_to_psa_error( in psa_check_rsa_key_byte_aligned() 64 if( status == PSA_SUCCESS ) in psa_check_rsa_key_byte_aligned() 67 status = PSA_ERROR_NOT_SUPPORTED; in psa_check_rsa_key_byte_aligned() 70 return( status ); in psa_check_rsa_key_byte_aligned() 77 psa_status_t status; in mbedtls_psa_rsa_load_representation() local 84 status = mbedtls_to_psa_error( in mbedtls_psa_rsa_load_representation() 87 status = mbedtls_to_psa_error( in mbedtls_psa_rsa_load_representation() 89 if( status != PSA_SUCCESS ) in mbedtls_psa_rsa_load_representation() 96 status = PSA_ERROR_INVALID_ARGUMENT; in mbedtls_psa_rsa_load_representation() [all …]
|
D | psa_crypto_ecp.c | 54 psa_status_t status; in mbedtls_psa_ecp_load_representation() local 110 status = PSA_ERROR_NOT_SUPPORTED; in mbedtls_psa_ecp_load_representation() 114 status = mbedtls_to_psa_error( in mbedtls_psa_ecp_load_representation() 116 if( status != PSA_SUCCESS ) in mbedtls_psa_ecp_load_representation() 123 status = mbedtls_to_psa_error( in mbedtls_psa_ecp_load_representation() 127 if( status != PSA_SUCCESS ) in mbedtls_psa_ecp_load_representation() 131 status = mbedtls_to_psa_error( in mbedtls_psa_ecp_load_representation() 133 if( status != PSA_SUCCESS ) in mbedtls_psa_ecp_load_representation() 139 status = mbedtls_to_psa_error( in mbedtls_psa_ecp_load_representation() 144 if( status != PSA_SUCCESS ) in mbedtls_psa_ecp_load_representation() [all …]
|
D | psa_crypto_aead.c | 82 psa_status_t status = PSA_ERROR_CORRUPTION_DETECTED; in psa_aead_setup() local 109 status = mbedtls_to_psa_error( in psa_aead_setup() 112 if( status != PSA_SUCCESS ) in psa_aead_setup() 113 return( status ); in psa_aead_setup() 128 status = mbedtls_to_psa_error( in psa_aead_setup() 131 if( status != PSA_SUCCESS ) in psa_aead_setup() 132 return( status ); in psa_aead_setup() 145 status = mbedtls_to_psa_error( in psa_aead_setup() 148 if( status != PSA_SUCCESS ) in psa_aead_setup() 149 return( status ); in psa_aead_setup() [all …]
|
D | psa_crypto_cipher.c | 272 psa_status_t status = PSA_ERROR_CORRUPTION_DETECTED; in psa_cipher_update_ecb() local 279 status = PSA_SUCCESS; in psa_cipher_update_ecb() 299 status = mbedtls_to_psa_error( in psa_cipher_update_ecb() 305 if( status != PSA_SUCCESS ) in psa_cipher_update_ecb() 317 status = mbedtls_to_psa_error( in psa_cipher_update_ecb() 322 if( status != PSA_SUCCESS ) in psa_cipher_update_ecb() 340 status = PSA_SUCCESS; in psa_cipher_update_ecb() 343 return( status ); in psa_cipher_update_ecb() 351 psa_status_t status = PSA_ERROR_CORRUPTION_DETECTED; in mbedtls_psa_cipher_update() local 377 status = psa_cipher_update_ecb( &operation->ctx.cipher, in mbedtls_psa_cipher_update() [all …]
|
D | psa_crypto_se.c | 145 psa_status_t status; in psa_load_se_persistent_data() local 149 status = psa_get_se_driver_its_file_uid( driver, &uid ); in psa_load_se_persistent_data() 150 if( status != PSA_SUCCESS ) in psa_load_se_persistent_data() 151 return( status ); in psa_load_se_persistent_data() 169 psa_status_t status; in psa_save_se_persistent_data() local 172 status = psa_get_se_driver_its_file_uid( driver, &uid ); in psa_save_se_persistent_data() 173 if( status != PSA_SUCCESS ) in psa_save_se_persistent_data() 174 return( status ); in psa_save_se_persistent_data() 200 psa_status_t status; in psa_find_se_slot_for_key() local 222 status = p_validate_slot_number( &driver->u.context, in psa_find_se_slot_for_key() [all …]
|
D | psa_its_file.c | 126 psa_status_t status; in psa_its_get_info() local 128 status = psa_its_read_file( uid, p_info, &stream ); in psa_its_get_info() 131 return( status ); in psa_its_get_info() 140 psa_status_t status; in psa_its_get() local 145 status = psa_its_read_file( uid, &info, &stream ); in psa_its_get() 146 if( status != PSA_SUCCESS ) in psa_its_get() 148 status = PSA_ERROR_INVALID_ARGUMENT; in psa_its_get() 158 status = PSA_ERROR_STORAGE_FAILURE; in psa_its_get() 172 status = PSA_SUCCESS; in psa_its_get() 179 return( status ); in psa_its_get() [all …]
|
D | psa_crypto_hash.c | 378 psa_status_t status; in mbedtls_psa_hash_finish() local 393 status = PSA_ERROR_BUFFER_TOO_SMALL; in mbedtls_psa_hash_finish() 448 status = mbedtls_to_psa_error( ret ); in mbedtls_psa_hash_finish() 451 if( status == PSA_SUCCESS ) in mbedtls_psa_hash_finish() 453 return( status ); in mbedtls_psa_hash_finish() 465 psa_status_t status = PSA_ERROR_CORRUPTION_DETECTED; in mbedtls_psa_hash_compute() local 469 status = mbedtls_psa_hash_setup( &operation, alg ); in mbedtls_psa_hash_compute() 470 if( status != PSA_SUCCESS ) in mbedtls_psa_hash_compute() 472 status = mbedtls_psa_hash_update( &operation, input, input_length ); in mbedtls_psa_hash_compute() 473 if( status != PSA_SUCCESS ) in mbedtls_psa_hash_compute() [all …]
|
/openthread-3.4.0/third_party/mbedtls/repo/tests/suites/ |
D | test_suite_psa_crypto_entropy.function | 125 psa_status_t status; 145 status = remove_seed_file( ); 146 TEST_ASSERT( ( status == PSA_SUCCESS ) || 147 ( status == PSA_ERROR_DOES_NOT_EXIST ) ); 148 status = mbedtls_psa_inject_entropy( seed, seed_length_a ); 149 TEST_EQUAL( status, expected_status_a ); 150 status = mbedtls_psa_inject_entropy( seed, seed_length_b ); 151 TEST_EQUAL( status, expected_status_b ); 166 psa_status_t status; 174 status = remove_seed_file( ); [all …]
|
D | test_suite_psa_crypto_driver_wrappers.function | 524 psa_status_t status; 611 status = psa_cipher_finish( &operation, 619 TEST_EQUAL( status, expected_status ); 656 psa_status_t status; 744 status = psa_cipher_finish( &operation, 752 TEST_EQUAL( status, expected_status ); 784 psa_status_t status; 825 status = psa_cipher_decrypt( key, alg, input, input_buffer_size, output, 830 TEST_EQUAL( status, expected_status ); 853 psa_status_t status; [all …]
|
D | test_suite_psa_crypto_init.function | 152 psa_status_t status; 156 status = psa_crypto_init( ); 157 PSA_ASSERT( status ); 158 status = psa_crypto_init( ); 159 PSA_ASSERT( status ); 181 psa_status_t status; 186 status = psa_crypto_init( ); 187 PSA_ASSERT( status ); 190 status = psa_generate_random( random, sizeof( random ) ); 191 TEST_EQUAL( status, PSA_ERROR_BAD_STATE ); [all …]
|
/openthread-3.4.0/third_party/mbedtls/repo/docs/ |
D | getting_started.md | 77 psa_status_t status; 85 status = psa_crypto_init(); 86 if (status != PSA_SUCCESS) { 98 status = psa_import_key(&attributes, key, key_len, &key_id); 99 if (status != PSA_SUCCESS) { 130 psa_status_t status; 144 status = psa_crypto_init(); 145 if (status != PSA_SUCCESS) { 157 status = psa_import_key(&attributes, key, key_len, &key_id); 158 if (status != PSA_SUCCESS) { [all …]
|
/openthread-3.4.0/tools/harness-simulation/posix/etc/ |
D | server.patch | 9 sudo service rsyslog status || sudo service rsyslog start || die 'Failed to start rsyslog!' 10 sudo service dbus status || sudo service dbus start || die 'Failed to start dbus!' 12 …sudo service avahi-daemon status || sudo service avahi-daemon start || die 'Failed to start avahi!' 13 …sudo service otbr-agent status || sudo service otbr-agent start || die 'Failed to start otbr-agent… 14 …without WEB_GUI || sudo service otbr-web status || sudo service otbr-web start || die 'Failed to s… 15 + sudo service commissionerd status || sudo service commissionerd start || die 'Failed to st…
|
/openthread-3.4.0/script/ |
D | check-core-makefiles | 42 status=$(git status --porcelain) 44 if [ -n "${status}" ]; then
|
/openthread-3.4.0/third_party/mbedtls/repo/tests/src/drivers/ |
D | test_driver_signature.c | 221 psa_status_t status = PSA_ERROR_CORRUPTION_DETECTED; in mbedtls_test_transparent_signature_sign_message() local 244 status = libtestdriver1_mbedtls_psa_hash_compute( in mbedtls_test_transparent_signature_sign_message() 248 status = mbedtls_psa_hash_compute( in mbedtls_test_transparent_signature_sign_message() 254 status = PSA_ERROR_NOT_SUPPORTED; in mbedtls_test_transparent_signature_sign_message() 256 if( status != PSA_SUCCESS ) in mbedtls_test_transparent_signature_sign_message() 257 return status; in mbedtls_test_transparent_signature_sign_message() 298 psa_status_t status = PSA_ERROR_CORRUPTION_DETECTED; in mbedtls_test_transparent_signature_verify_message() local 309 status = libtestdriver1_mbedtls_psa_hash_compute( in mbedtls_test_transparent_signature_verify_message() 313 status = mbedtls_psa_hash_compute( in mbedtls_test_transparent_signature_verify_message() 319 status = PSA_ERROR_NOT_SUPPORTED; in mbedtls_test_transparent_signature_verify_message() [all …]
|
/openthread-3.4.0/tools/harness-simulation/posix/sniffer_sim/ |
D | sniffer.py | 88 return sniffer_pb2.StartResponse(status=sniffer_pb2.OPERATION_ERROR) 123 return sniffer_pb2.StartResponse(status=sniffer_pb2.OK) 146 return sniffer_pb2.FilterNodesResponse(status=sniffer_pb2.OPERATION_ERROR) 179 return sniffer_pb2.FilterNodesResponse(status=sniffer_pb2.OPERATION_ERROR) 185 return sniffer_pb2.FilterNodesResponse(status=sniffer_pb2.VALUE_ERROR) 190 return sniffer_pb2.FilterNodesResponse(status=sniffer_pb2.OK) 199 return sniffer_pb2.StopResponse(status=sniffer_pb2.OPERATION_ERROR) 214 return sniffer_pb2.StopResponse(status=sniffer_pb2.OK)
|
/openthread-3.4.0/third_party/mbedtls/repo/tests/src/ |
D | psa_exercise_key.c | 76 psa_status_t status = psa_get_key_slot_number( &attributes, &slot_number ); in check_key_attributes_sanity() local 82 TEST_EQUAL( status, 0 ); in check_key_attributes_sanity() 87 TEST_EQUAL( status, PSA_ERROR_INVALID_ARGUMENT ); in check_key_attributes_sanity() 194 psa_status_t status; in exercise_cipher_key() local 214 status = psa_cipher_finish( &operation, in exercise_cipher_key() 222 TEST_ASSERT( status == PSA_SUCCESS || in exercise_cipher_key() 223 status == PSA_ERROR_INVALID_PADDING ); in exercise_cipher_key() 225 PSA_ASSERT( status ); in exercise_cipher_key() 401 psa_status_t status = in exercise_asymmetric_encryption_key() local 407 TEST_ASSERT( status == PSA_SUCCESS || in exercise_asymmetric_encryption_key() [all …]
|
/openthread-3.4.0/tests/scripts/thread-cert/ |
D | test_network_layer.py | 260 status = any_status() 262 status_obj = network_layer.Status(status) 265 actual_status = status_obj.status 268 self.assertEqual(status, actual_status) 272 status = any_status() 274 status_obj = network_layer.Status(status) 277 self.assertEqual(status_obj, network_layer.Status(status)) 284 status = any_status() 288 data = bytearray([status]) 295 self.assertEqual(status, status_obj.status)
|
/openthread-3.4.0/src/core/thread/ |
D | link_metrics.cpp | 136 uint8_t status; in HandleReport() local 159 SuccessOrExit(error = Tlv::Read<StatusSubTlv>(aMessage, offset, status)); in HandleReport() 222 hasStatus ? static_cast<Status>(status) : kStatusSuccess); in HandleReport() 310 uint8_t status; in HandleManagementResponse() local 328 SuccessOrExit(error = Tlv::Read<StatusSubTlv>(aMessage, offset, status)); in HandleManagementResponse() 341 mMgmtResponseCallback.Invoke(&aAddress, status); in HandleManagementResponse() 702 Status status = kStatusSuccess; in ConfigureForwardTrackingSeries() local 704 VerifyOrExit(0 < aSeriesId, status = kStatusOtherError); in ConfigureForwardTrackingSeries() 715 VerifyOrExit(seriesInfo != nullptr, status = kStatusSeriesIdNotRecognized); in ConfigureForwardTrackingSeries() 722 VerifyOrExit(seriesInfo == nullptr, status = kStatusSeriesIdAlreadyRegistered); in ConfigureForwardTrackingSeries() [all …]
|