/openthread-3.7.0/third_party/mbedtls/repo/library/ |
D | ecdh.c | 420 mbedtls_ecdh_side side) in ecdh_get_params_internal() argument 425 if (side == MBEDTLS_ECDH_THEIRS) { in ecdh_get_params_internal() 430 if (side != MBEDTLS_ECDH_OURS) { in ecdh_get_params_internal() 447 mbedtls_ecdh_side side) in mbedtls_ecdh_get_params() argument 450 if (side != MBEDTLS_ECDH_OURS && side != MBEDTLS_ECDH_THEIRS) { in mbedtls_ecdh_get_params() 470 return ecdh_get_params_internal(ctx, key, side); in mbedtls_ecdh_get_params() 476 mbedtls_everest_ecdh_side s = side == MBEDTLS_ECDH_OURS ? in mbedtls_ecdh_get_params() 485 key, side); in mbedtls_ecdh_get_params()
|
/openthread-3.7.0/third_party/mbedtls/repo/3rdparty/everest/library/ |
D | everest.c | 67 mbedtls_everest_ecdh_side side ) in mbedtls_everest_get_params() argument 70 mbedtls_x25519_ecdh_side s = side == MBEDTLS_EVEREST_ECDH_OURS ? in mbedtls_everest_get_params()
|
D | x25519.c | 105 mbedtls_x25519_ecdh_side side ) in mbedtls_x25519_get_params() argument 109 switch( side ) { in mbedtls_x25519_get_params()
|
/openthread-3.7.0/third_party/mbedtls/repo/3rdparty/everest/include/everest/ |
D | x25519.h | 121 mbedtls_x25519_ecdh_side side );
|
D | everest.h | 157 mbedtls_everest_ecdh_side side );
|
/openthread-3.7.0/third_party/mbedtls/repo/tests/ |
D | Descriptions.txt | 16 For each ciphersuite/version/side/authmode it performs a full handshake
|
/openthread-3.7.0/third_party/mbedtls/repo/ |
D | SECURITY.md | 68 physical side channels as well. Remote and physical timing attacks are covered 75 #### Local non-timing side channels 83 side channel attacks. If local non-timing attacks are present in a use case or
|
D | ChangeLog | 165 * When negotiating TLS version on server side, do not fall back to the 266 * Fix a timing side channel in private key RSA operations. This side channel 316 the capabilities of the PSA side for either key. 352 * Add support for server-side TLS version negotiation. If both TLS 1.2 and 680 * Fix a potential heap buffer overread in TLS 1.3 client-side when 683 Arm, so that these systems are no longer vulnerable to timing side-channel 689 timing side-channel attacks. There is now an intrinsics-based AES-NI 700 calculation on the client side. It prevents a server with more accurate 1092 * Add support for client-side TLS version negotiation. If both TLS 1.2 and 1118 and hmac_demo.c, which use PSA and the md/cipher interfaces side [all …]
|
/openthread-3.7.0/third_party/mbedtls/repo/include/mbedtls/ |
D | ecdh.h | 345 mbedtls_ecdh_side side);
|
/openthread-3.7.0/third_party/mbedtls/repo/docs/architecture/ |
D | tls13-support.md | 15 - Mbed TLS implements both the client and the server side of the TLS 1.3 81 - TLS 1.2 and TLS 1.3 with version negotiation on client and server side. 354 client side, the states related to certificate parsing and validation are 361 client side is a example of that. 381 will be, an example of that on client side being if we are going to receive a 432 outbound message on server side as well.
|
D | psa-shared-memory.md | 111 …GlobalPlatform TEE Trusted Application (application running on the secure side of TrustZone on Cor… 198 …TLS, a [known issue](https://github.com/Mbed-TLS/mbedtls/issues/3266)). A side benefit of doing th…
|
/openthread-3.7.0/third_party/mbedtls/repo/docs/architecture/psa-migration/ |
D | psa-limitations.md | 71 3. Variant of the precedent: only drop client-side support. Server-side is 77 when moving to PSA. Server-side would work as above; unfortunately 78 client-side the only option is to offer named groups and break the handshake
|
D | testing.md | 54 (We should have the same server-side.)
|
D | psa-legacy-bridges.md | 141 …On the legacy side, this is an `mbedtls_pk_type_t` value and more. For ECDSA, the choice between r… 143 …On the PSA side, this is a `psa_key_type_t` value and an algorithm which is normally encoded as po…
|
D | md-cipher-dispatch.md | 267 … the keystore, and plausibly a cipher accelerator might want entropy (for side channel countermeas…
|
/openthread-3.7.0/third_party/mbedtls/repo/tests/suites/ |
D | test_suite_dhm.function | 145 /* The domain parameters must be the same on both side. */
|
D | test_suite_ssl.function | 435 * of at least one byte on either side. */ 3304 /* Client side, force SECP256R1 to make one key bitflip fail 3313 /* Server side */ 4680 * initiate the handshake on server side before doing all the calls to 4729 * Now, check data on server side. It is not done in the previous loop as 4890 * can be sent from client side. Then send in a loop as much early data as 4924 * expansion) of early data on server side and the number of early data
|
D | test_suite_ecp.function | 160 * but for the sake of simplicity only does half of each side. It's
|
/openthread-3.7.0/third_party/mbedtls/repo/docs/ |
D | use-psa-crypto.md | 139 is enabled, no change required on the application side.
|
D | driver-only-builds.md | 128 `MBEDTLS_DETERMINISTIC_ECDSA` on the legacy side and 431 - AES is supported on the PSA side together with ECB mode, i.e.
|
D | psa-transition.md | 258 The PSA API does not have an equivalent to the timing-side-channel-resistance utility functions in … 554 …ed value. Note that this comparison should be in constant time to avoid a side channel vulnerabili… 562 …ed value. Note that this comparison should be in constant time to avoid a side channel vulnerabili… 1151 …SA version of this workflow can also be used with other protocols, on the side of the party that s… 1176 …SA version of this workflow can also be used with other protocols, on the side of the party that r… 1201 * With either side, accessing the group: call [`psa_get_key_attributes`](https://mbed-tls.readthedo…
|
D | 3.0-migration-guide.md | 505 side-channel attacks.
|
/openthread-3.7.0/third_party/mbedtls/repo/programs/ |
D | README.md | 89 In addition to providing options for testing client-side features, the `ssl_client2` program has op…
|
/openthread-3.7.0/third_party/mbedtls/repo/docs/architecture/psa-thread-safety/ |
D | psa-thread-safety.md | 121 …ent-calling-conventions)), operations in progress can have memory related side effects. It is poss… 247 …`psa_get_and_lock_key_slot`. All other steps have no non resource-related side effects (except for…
|
/openthread-3.7.0/third_party/mbedtls/repo/docs/architecture/testing/ |
D | invasive-testing.md | 69 …` function that does nothing (not a macro, to avoid accidentally skipping side effects in its para…
|