Searched refs:side (Results 1 – 6 of 6) sorted by relevance
420 mbedtls_ecdh_side side) in ecdh_get_params_internal() argument425 if (side == MBEDTLS_ECDH_THEIRS) { in ecdh_get_params_internal()430 if (side != MBEDTLS_ECDH_OURS) { in ecdh_get_params_internal()447 mbedtls_ecdh_side side) in mbedtls_ecdh_get_params() argument450 if (side != MBEDTLS_ECDH_OURS && side != MBEDTLS_ECDH_THEIRS) { in mbedtls_ecdh_get_params()470 return ecdh_get_params_internal(ctx, key, side); in mbedtls_ecdh_get_params()476 mbedtls_everest_ecdh_side s = side == MBEDTLS_ECDH_OURS ? in mbedtls_ecdh_get_params()485 key, side); in mbedtls_ecdh_get_params()
2 This git contains source code for the secure side implementation of OP-TEE
1099 * crypto: fix RSA key leakage after side channel attack1904 * Add cryptographic abstraction layer in on secure side to ease the use of
345 mbedtls_ecdh_side side);
68 physical side channels as well. Remote and physical timing attacks are covered75 #### Local non-timing side channels83 side channel attacks. If local non-timing attacks are present in a use case or
60 * Fix a timing side channel in the implementation of PKCS#7 padding553 * When negotiating TLS version on server side, do not fall back to the654 * Fix a timing side channel in private key RSA operations. This side channel704 the capabilities of the PSA side for either key.740 * Add support for server-side TLS version negotiation. If both TLS 1.2 and1068 * Fix a potential heap buffer overread in TLS 1.3 client-side when1071 Arm, so that these systems are no longer vulnerable to timing side-channel1077 timing side-channel attacks. There is now an intrinsics-based AES-NI1088 calculation on the client side. It prevents a server with more accurate1480 * Add support for client-side TLS version negotiation. If both TLS 1.2 and[all …]