Searched refs:side (Results 1 – 18 of 18) sorted by relevance
/mbedtls-development/library/ |
A D | ecdh.c | 449 mbedtls_ecdh_side side ) in ecdh_get_params_internal() argument 454 if( side == MBEDTLS_ECDH_THEIRS ) in ecdh_get_params_internal() 458 if( side != MBEDTLS_ECDH_OURS ) in ecdh_get_params_internal() 473 mbedtls_ecdh_side side ) in mbedtls_ecdh_get_params() argument 478 ECDH_VALIDATE_RET( side == MBEDTLS_ECDH_OURS || in mbedtls_ecdh_get_params() 479 side == MBEDTLS_ECDH_THEIRS ); in mbedtls_ecdh_get_params() 498 return( ecdh_get_params_internal( ctx, key, side ) ); in mbedtls_ecdh_get_params() 505 mbedtls_everest_ecdh_side s = side == MBEDTLS_ECDH_OURS ? in mbedtls_ecdh_get_params() 514 key, side ) ); in mbedtls_ecdh_get_params()
|
/mbedtls-development/3rdparty/everest/library/ |
A D | everest.c | 72 mbedtls_everest_ecdh_side side ) in mbedtls_everest_get_params() argument 75 mbedtls_x25519_ecdh_side s = side == MBEDTLS_EVEREST_ECDH_OURS ? in mbedtls_everest_get_params()
|
A D | x25519.c | 105 mbedtls_x25519_ecdh_side side ) in mbedtls_x25519_get_params() argument 109 switch( side ) { in mbedtls_x25519_get_params()
|
/mbedtls-development/docs/ |
A D | use-psa-crypto.md | 59 this is supported on both sides, it's currently only tested client-side); 112 is enabled, no change required on the application side. 129 Scope: Client-side, for ECDHE-RSA and ECDHE-ECDSA key exchanges, the 132 Limitations: client-side only, ECDHE-PSK not covered 181 - ECDHE-RSA: RSA operations are not covered and, server-side, the ECDHE 183 - ECDHE-ECDSA: server-side, the ECDHE operation isn't covered. (ECDSA
|
A D | 3.0-migration-guide.md | 477 side-channel attacks.
|
/mbedtls-development/3rdparty/everest/include/everest/ |
A D | x25519.h | 121 mbedtls_x25519_ecdh_side side );
|
A D | everest.h | 157 mbedtls_everest_ecdh_side side );
|
/mbedtls-development/tests/ |
A D | Descriptions.txt | 16 For each ciphersuite/version/side/authmode it performs a full handshake
|
/mbedtls-development/include/mbedtls/ |
A D | ecdh.h | 349 mbedtls_ecdh_side side );
|
/mbedtls-development/include/psa/ |
A D | crypto_extra.h | 1525 psa_pake_side_t side);
|
/mbedtls-development/ |
A D | ChangeLog | 378 the affected side to wrongly reject valid messages. Fixes #4118. 895 * Fix side channel in mbedtls_ecp_check_pub_priv() and 1189 side of the key exchange had a similar bug. 1614 implemented client-side, for ECDHE-ECDSA ciphersuites in TLS 1.2, 1679 * Close a test gap in (D)TLS between the client side and the server side: 1681 in the same way as on the server side. 2477 against side-channel attacks like the cache attack described in 3324 * Add server-side enforcement of sent renegotiation requests 3602 * Server-side initiated renegotiations send HelloRequest 4025 * Added ServerName extension parsing (SNI) at server side [all …]
|
/mbedtls-development/tests/suites/ |
A D | test_suite_dhm.function | 140 /* The domain parameters must be the same on both side. */
|
A D | test_suite_ecp.function | 105 * but for the sake of simplicity only does half of each side. It's
|
A D | test_suite_ssl.function | 1701 /* Client side */ 1747 /* Server side */ 2433 * of at least one byte on either side. */
|
/mbedtls-development/programs/ |
A D | README.md | 89 In addition to providing options for testing client-side features, the `ssl_client2` program has op…
|
/mbedtls-development/docs/architecture/ |
A D | tls13-experimental.md | 76 - The TLS 1.3 MVP implements only the client side of the protocol.
|
/mbedtls-development/docs/architecture/testing/ |
A D | invasive-testing.md | 69 …` function that does nothing (not a macro, to avoid accidentally skipping side effects in its para…
|
/mbedtls-development/doxygen/ |
A D | mbedtls.doxyfile | 1150 # If the tag value is set to YES, a side panel will be generated 1195 # (see http://www.mathjax.org) which uses client side Javascript for the
|
Completed in 29 milliseconds