Searched refs:side (Results 1 – 6 of 6) sorted by relevance
420 mbedtls_ecdh_side side) in ecdh_get_params_internal() argument425 if (side == MBEDTLS_ECDH_THEIRS) { in ecdh_get_params_internal()430 if (side != MBEDTLS_ECDH_OURS) { in ecdh_get_params_internal()447 mbedtls_ecdh_side side) in mbedtls_ecdh_get_params() argument450 if (side != MBEDTLS_ECDH_OURS && side != MBEDTLS_ECDH_THEIRS) { in mbedtls_ecdh_get_params()470 return ecdh_get_params_internal(ctx, key, side); in mbedtls_ecdh_get_params()476 mbedtls_everest_ecdh_side s = side == MBEDTLS_ECDH_OURS ? in mbedtls_ecdh_get_params()485 key, side); in mbedtls_ecdh_get_params()
2 This git contains source code for the secure side implementation of OP-TEE
1129 * crypto: fix RSA key leakage after side channel attack1934 * Add cryptographic abstraction layer in on secure side to ease the use of
345 mbedtls_ecdh_side side);
68 physical side channels as well. Remote and physical timing attacks are covered75 #### Local non-timing side channels83 side channel attacks. If local non-timing attacks are present in a use case or
17 * Fix a timing side channel in CBC-PKCS7 decryption that could21 * Fix a local timing side-channel in modular inversion and GCD that was26 used, by the non-secure side abusing timer interrupts (M-Step), and103 * Fix a timing side channel in the implementation of PKCS#7 padding596 * When negotiating TLS version on server side, do not fall back to the697 * Fix a timing side channel in private key RSA operations. This side channel747 the capabilities of the PSA side for either key.783 * Add support for server-side TLS version negotiation. If both TLS 1.2 and1111 * Fix a potential heap buffer overread in TLS 1.3 client-side when1114 Arm, so that these systems are no longer vulnerable to timing side-channel[all …]