| /openthread-latest/third_party/mbedtls/repo/tests/suites/ |
| D | test_suite_shax.data | 188 SHA3_224 short #0 192 SHA3_224 short #1 196 SHA3_224 short #2 200 SHA3_224 short #3 204 SHA3_224 short #4 208 SHA3_224 short #5 212 SHA3_224 short #6 216 SHA3_224 short #7 220 SHA3_224 short #8 224 SHA3_224 short #9 [all …]
|
| D | test_suite_pkcs1_v15.data | 27 RSAES-V15 Decryption Test Vector Padding too short 7 35 RSAES-V15 Decryption Test Vector Padding too short 5 43 RSAES-V15 Decryption Test Vector Padding too short 0 88 RSAES-V15 decoding: padding too short (0) 91 RSAES-V15 decoding: padding too short (7)
|
| D | test_suite_bignum_mod.misc.data | 22 mpi_mod_sub with modulus too long/both inputs too short 34 mpi_mod_sub with first input too short 37 mpi_mod_sub with second input too short 49 mbedtls_mpi_mod_inv non-Mont. form - A too short 64 mbedtls_mpi_mod_inv 32-bit Mont. form - A too short 80 mbedtls_mpi_mod_inv 64-bit Mont. form - A too short 87 mpi_mod_add with modulus too long/both inputs too short 99 mpi_mod_add with first input too short 102 mpi_mod_add with second input too short
|
| D | test_suite_nist_kw.data | 39 NIST KW lengths #5 KW plaintext too short (2 to 2^54 - 1 semiblocks) 42 NIST KW lengths #6 KWP plaintext too short (1 to 2^32 - 1 octets) 45 NIST KW lengths #8 KW ciphertext too short (3 to 2^54 semiblocks) 48 NIST KW lengths #9 KWP ciphertext too short (2 to 2^29 semiblocks) 60 NIST KW lengths #13 KW wrapping output buffer too short 63 NIST KW lengths #14 KWP wrapping output buffer too short 66 NIST KW lengths #15 KW unwrapping output buffer too short 69 NIST KW lengths #16 KWP unwrapping output buffer too short
|
| D | test_suite_ecp.data | 236 ECP read binary #4 (non-zero, invalid ilen, too short) 240 ECP read binary #4a (non-zero, invalid ilen, too short) 244 ECP read binary #4b (non-zero, invalid ilen, too short) 288 ECP read binary #9 (Curve25519, too short) 312 ECP read binary #15 (Curve448, too short) 404 ECP tls read group #1 (record too short) 429 ECP check privkey #1 (short weierstrass, too small) 433 ECP check privkey #2 (short weierstrass, smallest) 437 ECP check privkey #3 (short weierstrass, biggest) 441 ECP check privkey #4 (short weierstrass, too big) [all …]
|
| D | test_suite_ssl.data | 1648 Record crypt, AES-128-CCM, 1.2, short tag 1652 Record crypt, AES-128-CCM, 1.2, short tag, CID 4+4 1656 Record crypt, AES-128-CCM, 1.2, short tag, CID 4+0 1676 Record crypt, AES-192-CCM, 1.2, short tag 1680 Record crypt, AES-192-CCM, 1.2, short tag, CID 4+4 1684 Record crypt, AES-192-CCM, 1.2, short tag, CID 4+0 1704 Record crypt, AES-256-CCM, 1.2, short tag 1708 Record crypt, AES-256-CCM, 1.2, short tag, CID 4+4 1712 Record crypt, AES-256-CCM, 1.2, short tag, CID 4+0 1728 Record crypt, CAMELLIA-128-CCM, 1.2, short tag [all …]
|
| D | test_suite_asn1parse.data | 58 length=0 (short form) 67 length=1 (short form) 82 length=2 (short form) 97 length=127 (short form)
|
| D | test_suite_asn1write.data | 232 ASN.1 Write / Read Length #0 (Len = 0, short form) 235 ASN.1 Write / Read Length #1 (Len = 127, short form)
|
| D | test_suite_ecjpake.data | 127 ECJPAKE round two client: ECParams too short
|
| D | test_suite_asn1write.function | 307 /* Write an OCTET STRING with a short length encoding */
|
| D | test_suite_pk.data | 573 Verify ext RSA #15 (PKCS1 v2.1, salt_len = ANY, sig_len too short) 577 Verify ext RSA #16 (PKCS1 v2.1, salt_len = max, sig_len too short) 581 Verify ext RSA #17 (PKCS1 v2.1, salt_len = ANY, wrong message, sig_len too short) 585 Verify ext RSA #18 (PKCS1 v2.1, salt_len = max, wrong message, sig_len too short)
|
| D | test_suite_psa_crypto.data | 691 PSA import EC keypair: explicit bit-size, too short 1783 PSA MAC setup: algorithm known but not supported, short key 2255 PSA symmetric encrypt: AES-ECB, input too short (15 bytes) 2259 PSA symmetric encrypt: AES-CBC-nopad, input too short 2343 PSA symmetric encrypt multipart: AES-ECB, input too short (15 bytes) 2347 PSA symmetric encrypt multipart: AES-CBC-nopad, input too short 2403 PSA symmetric decrypt: AES-CBC-PKCS#7, input too short (15 bytes) 2407 PSA symmetric decrypt: AES-ECB, input too short (15 bytes) 2411 PSA symmetric decrypt: AES-CBC-nopad, input too short (5 bytes) 2415 PSA symmetric decrypt: CCM*-no-tag, input too short (15 bytes) [all …]
|
| /openthread-latest/third_party/mbedtls/repo/scripts/mbedtls_dev/ |
| D | crypto_knowledge.py | 25 short = original 26 short = re.sub(r'\bPSA_(?:ALG|DH_FAMILY|ECC_FAMILY|KEY_[A-Z]+)_', r'', short) 27 short = re.sub(r' +', r'', short) 29 short = re.sub(r'PUBLIC_KEY\b', r'PUB', short) 30 short = re.sub(r'KEY_PAIR\b', r'PAIR', short) 31 short = re.sub(r'\bBRAINPOOL_P', r'BP', short) 32 short = re.sub(r'\bMONTGOMERY\b', r'MGM', short) 33 short = re.sub(r'AEAD_WITH_SHORTENED_TAG\b', r'AEAD_SHORT', short) 34 short = re.sub(r'\bDETERMINISTIC_', r'DET_', short) 35 short = re.sub(r'\bKEY_AGREEMENT\b', r'KA', short) [all …]
|
| D | crypto_data_tests.py | 91 short = b'abc' 92 hash_short = calc(short) 102 [short.hex(), hash_short])
|
| /openthread-latest/tools/cp-caps/ |
| D | README.md | 178 TX ver:2003,Cmd,seq,dst[addr:short,pan:id],src[addr:no,pan:no],sec:no,ie:no,plen:0 ----------------… 179 RX ver:2003,Cmd,seq,dst[addr:short,pan:id],src[addr:no,pan:no],sec:no,ie:no,plen:0 ----------------… 182 TX ver:2006,Cmd,seq,dst[addr:short,pan:id],src[addr:short,pan:no],sec:l5,ie:no,plen:0 -------------… 183 RX ver:2006,Cmd,seq,dst[addr:short,pan:id],src[addr:short,pan:no],sec:l5,ie:no,plen:0 -------------… 188 TX ver:2006,Data,seq,dst[addr:short,pan:id],src[addr:short,pan:id],sec:no,ie:no,plen:0 ------------… 189 RX ver:2006,Data,seq,dst[addr:short,pan:id],src[addr:short,pan:id],sec:no,ie:no,plen:0 ------------… 192 TX ver:2006,Data,seq,dst[addr:short,pan:id],src[addr:no,pan:no],sec:no,ie:no,plen:0 ---------------… 193 RX ver:2006,Data,seq,dst[addr:short,pan:id],src[addr:no,pan:no],sec:no,ie:no,plen:0 ---------------… 210 TX ver:2015,Data,seq,dst[addr:short,pan:id],src[addr:short,pan:id],sec:no,ie:no,plen:0 ------------… 211 RX ver:2015,Data,seq,dst[addr:short,pan:id],src[addr:short,pan:id],sec:no,ie:no,plen:0 ------------… [all …]
|
| /openthread-latest/third_party/mbedtls/repo/tests/scripts/ |
| D | generate_psa_tests.py | 526 short = lifetime 527 short = re.sub(r'PSA_KEY_LIFETIME_FROM_PERSISTENCE_AND_LOCATION', 528 r'', short) 529 short = crypto_knowledge.short_expression(short) 530 description = 'lifetime: ' + short 556 short: Optional[str] = None, 570 if short is None: 574 key1.description += short 589 yield self.key_for_usage_flags(known_flags, short='all known')
|
| /openthread-latest/third_party/mbedtls/repo/programs/ |
| D | README.md | 26 … PEM or DER public/private key file and uses the key to encrypt/decrypt a short string through the… 28 …rify.c): loads a PEM or DER private/public key file and uses the key to sign/verify a short string. 34 …rypt.c): loads an RSA public/private key and uses it to encrypt/decrypt a short string through the… 38 …a_verify.c): loads an RSA private/public key and uses it to sign/verify a short string with the RS… 40 …rify_pss.c): loads an RSA private/public key and uses it to sign/verify a short string with the RS… 69 * [`ssl/mini_client.c`](ssl/mini_client.c): a minimalistic SSL client, which sends a short string a…
|
| /openthread-latest/third_party/mbedtls/repo/ |
| D | .pylintrc | 6 # We're ok with short funtion argument names. 32 # We're ok with short local or global variable names.
|
| D | CONTRIBUTING.md | 28 1. For quick merging, the contribution should be short, and concentrated on a single feature or top…
|
| /openthread-latest/tests/unit/ |
| D | README.md | 48 This will only build the test and take a short time.
|
| /openthread-latest/tests/toranj/ |
| D | start.sh | 201 run cli/test-033-alt-short-addr-role-transition.py
|
| /openthread-latest/src/core/diags/ |
| D | README.md | 266 - destaddress: The destination mac address. It can be a short, extended or none. Use '-' to specify…
|
| /openthread-latest/third_party/mbedtls/repo/docs/architecture/ |
| D | alternative-implementations.md | 34 …ustom implementations are called “alternative implementations”, or “ALT implementations” for short.
|
| /openthread-latest/third_party/mbedtls/repo/docs/architecture/testing/ |
| D | driver-interface-test-strategy.md | 19 The dynamic secure element driver interface (SE interface for short) is defined by [`psa/crypto_se_…
|
| /openthread-latest/third_party/mbedtls/repo/docs/architecture/psa-migration/ |
| D | psa-limitations.md | 144 doesn't fit because the key is too short, then the maximum length that fits is
|