Home
last modified time | relevance | path

Searched full:strategy (Results 1 – 25 of 33) sorted by relevance

12

/openthread-latest/third_party/mbedtls/repo/docs/architecture/psa-migration/
Dstrategy.md1 This document explains the strategy that was used so far in starting the
127 current strategy is to keep using those identifiers in most of the code, in
146 This strategy is currently (early 2023) used for all operations in the PK
152 This strategy is not very well suited to the Cipher layer, as the PSA
155 This strategy will probably be used for some time for the PK layer, while we
173 This strategy is currently (early 2023) used for the MD layer and the Cipher
190 This strategy is not useful when no context is used, for example with the
193 There are two variants of this strategy: one where using the new setup
198 This strategy, with support for key isolation, is currently (early 2022) used for
203 This strategy, without key isolation, was also previously used (until 3.1
[all …]
Dtesting.md1 Testing strategy for `MBEDTLS_USE_PSA_CRYPTO`
4 This document records the testing strategy used so far in implementing
Dmd-cipher-dispatch.md1 PSA migration strategy for hashes and ciphers
6 This document discusses a migration strategy for code that is not subject to `MBEDTLS_USE_PSA_CRYPT…
8 ### Relationship with the main strategy document
10strategy document](strategy.html) and is intended as a refinement. However, at this stage, there m…
12 A difference between the original strategy and the current one is that in this work, we are not tre…
Doutcome-analysis.sh6 # It can be used to check the first testing criterion mentioned in strategy.md,
Dpsa-limitations.md4 is, goals G1 and G2 in [strategy.md](strategy.md) in the same directory).
/openthread-latest/third_party/mbedtls/repo/docs/architecture/
Dpsa-storage-resilience.md140 …ch complicates state management in the core. Given the likely complexity, we exclude this strategy.
156 * [Always follow the state of the secure element](#exploring-the-follow-the-secure-element-strategy
157 …tion processing: [always destroy the key](#exploring-the-always-destroy-strategy), i.e. abort all …
158 …rrupted. These do not seem like decisive advantages, so we will not consider this strategy further.
159 … of the secure element for key destruction. I can't think of a good reason to choose this strategy.
161 …o that it can find a free slot when creating a key. But with a recovery strategy that doesn't invo…
163 #### Exploring the follow-the-secure-element strategy
192 #### Exploring the always-destroy strategy
217 #### Always-destroy strategy with a simpler transaction file
219 We can modify the [always-destroy strategy](#exploring-the-always-destroy-strategy) to make the tra…
[all …]
Dpsa-shared-memory.md212 This section explains how Mbed TLS implements the shared memory protection strategy summarized belo…
214 ### Shared memory protection strategy
289 …ared memory and ensure that they each copy memory. This is the simplest strategy to implement but …
363 …rage and time saved on new tests will be a benefit. If not, writing new tests is the best strategy.
504 Module | Input protection strategy | Output protection strategy | Notes
622 …gn exploration of copying validation](#validation-of-copying), the best strategy for validation of…
/openthread-latest/third_party/mbedtls/repo/docs/architecture/testing/
Dpsa-storage-format-testing.md1 # Mbed TLS PSA keystore format stability testing strategy
7 The goal of this document is to define a test strategy for the key store that not only validates th…
52 …d storage interface on top of C stdio. This document addresses the test strategy for [PSA ITS over…
Dinvasive-testing.md1 # Mbed TLS invasive testing strategy
9 This is a test strategy document, not a test plan. A description of exactly what is tested is out o…
324 See the [secure element driver interface test strategy](driver-interface-test-strategy.html) for mo…
Ddriver-interface-test-strategy.md1 # Mbed TLS driver interface test strategy
3 This document describes the test strategy for the driver interfaces in Mbed TLS. Mbed TLS has inter…
/openthread-latest/.github/workflows/
Dbuild.yml142 strategy:
218 strategy:
275 strategy:
308 strategy:
362 strategy:
Dtoranj.yml51 strategy:
88 strategy:
Dcodeql.yml49 strategy:
Dotci.yml51 strategy:
Dposix.yml183 strategy:
234 strategy:
Ddocker.yml51 strategy:
Dotns.yml143 strategy:
Dotbr.yml115 strategy:
/openthread-latest/src/cli/
DREADME_TCP.md180 - mode: this specifies the buffering strategy and whether to use TLS. The possible values are "link…
183 …"circular", specify that TLS should not be used and specify a buffering strategy to use with TCP; …
/openthread-latest/.github/
Ddependabot.yml38 rebase-strategy: "disabled"
/openthread-latest/third_party/mbedtls/repo/library/
Dmps_error.h75 * must not change it's 'strategy' after pausing and reactivating a reader. */
/openthread-latest/third_party/mbedtls/repo/docs/architecture/psa-thread-safety/
Dpsa-thread-safety.md12 …- Key destruction strategy abiding by [Key destruction guarantees](#key-destruction-guarantees), w…
25 * The [Current strategy](#current-strategy) section describes how thread-safety of key management a…
131 ## Current strategy
229 The locking strategy here is explained in `library/psa_crypto.c`. The destroying thread (the thread…
/openthread-latest/third_party/mbedtls/repo/include/mbedtls/
Dnet_sockets.h268 * requires a different strategy.
Dcamellia.h229 * With this strategy, you must not encrypt more than 2**128
Daria.h270 * With this strategy, you must not encrypt more than 2**128

12