Lines Matching refs:private
24 private key. This can be exploited on some Arm-v9 CPUs by an unprivileged
512 gaps made by making its fields private: mbedtls_ecp_set_public_key(),
543 * Add new accessor to expose the private group id member of
557 * Add new accessors to expose the private session-id,
665 * Use heap memory to allocate DER encoded public/private key.
666 This reduces stack usage significantly for writing a public/private
697 * Fix a timing side channel in private key RSA operations. This side channel
789 public and private keys in RFC 8410 format using the existing PK APIs.
992 * Use heap memory to allocate DER encoded RSA private key.
1281 * Add support for opaque keys as the private keys associated to certificates
1286 (LMS_SHA256_M32_H10), meaning that each private key can be used to sign
1334 a secure enclave) could recover an RSA private key after observing the
1335 victim performing a single private-key operation if the window size used
1351 * Use double quotes to include private header file psa_crypto_cipher.h.
1488 * Add function mbedtls_timing_get_final_delay() to access the private
1539 Opaque keys can now be used everywhere a private key is expected in the
1852 mbedtls_ssl_config.respect_cli_pref as private. This was an
1878 most of the interface of this module is private and may change at any
1962 decryption functions now always use the private key and verification and
2035 "Most structure fields are now private".
2074 provides a more flexible private key management.
2109 * The RSA module no longer supports private-key operations with the public
2187 private keys and of blinding values for DHM and elliptic curves (ECP)
2192 signature, allowing the recovery of the private key after observing a
2197 a secure enclave) could recover an RSA private key after observing the
2198 victim performing a single private-key operation. Found and reported by
2203 observing the victim performing the corresponding private-key operation.
2231 * Fix an incorrect error code when parsing a PKCS#8 private key.
2417 value the function might fail to write a private RSA keys of the largest
2430 * Fix an incorrect error code if an RSA private operation glitched.
2645 * The new function mbedtls_ecp_write_key() exports private ECC keys back to
2683 * Fix side channel in RSA private key operations and static (finite-field)
2687 potentially fully recover the private key.
2773 reveal an RSA private key used in a secure enclave. Noticed by Sangho Lee,
2779 private key that didn't include the uncompressed public key), as well as
2783 attacking a secure enclave) could fully recover the ECC private key.
2883 an ECDSA private key. Found and reported by Alejandro Cabrera Aldaya,
2927 * To avoid a side channel vulnerability when parsing an RSA private key,
2955 RSA keys that would later be rejected by functions expecting private
2992 recover the private key. Reported by Jeremy Dubeuf.
3072 * When writing a private EC key, use a constant size for the private
3080 countermeasure and leaked information about the private key through side
3230 * Fix private key DER output in the key_app_writer example. File contents
3303 latter case, this could expose at most 5 bits of the private key.
3773 * In TLS servers, support offloading private key operations to an external
3960 * Verify results of RSA private key operations to defend
3971 algorithms family when encrypting private keys using PKCS#5 v2.0.
4010 * Fix a 1-byte heap buffer overflow (read-only) during private key parsing.
4054 * Set PEM buffer to zero before freeing it, to avoid decoded private keys
4057 leaking 1 bit of the private key. Reported by prashantkspatil.
4062 * Wipe stack buffer temporarily holding EC private exponent
4102 needs of the implementation automatically. This allows to setup private RSA
4148 accepted. Generating these signatures required the private key.
4172 * Add a check for invalid private parameters in mbedtls_ecdsa_sign().
4355 * Wipe stack buffers in RSA private key operations
4358 * Add exponent blinding to RSA private operations as a countermeasure
4917 Semi-API changes (technically public, morally private)
5027 * Fix bug in pk_parse_key() that caused some valid private EC keys to be
5089 * Add function pk_check_pair() to test if public and private keys match.
5130 * Blind RSA private operations even when POLARSSL_RSA_NO_CRT is defined.
5627 * Blind RSA private operations even when POLARSSL_RSA_NO_CRT is defined.
5754 * Parsing of PKCS#8 encrypted private key files
5763 PKCS#8 private key formats
5922 * Generalized external private key implementation handling (like PKCS#11)
5935 * Handle encryption with private key and decryption with public key as per
6007 * Handle encryption with private key and decryption with public key as per
6062 encryption and private key for decryption. (Closes ticket #34)
6176 * Parsing PEM private keys encrypted with DES and AES