Home
last modified time | relevance | path

Searched refs:side (Results 1 – 5 of 5) sorted by relevance

/optee_os-3.20.0/lib/libmbedtls/mbedtls/library/
A Decdh.c447 mbedtls_ecdh_side side ) in ecdh_get_params_internal() argument
452 if( side == MBEDTLS_ECDH_THEIRS ) in ecdh_get_params_internal()
456 if( side != MBEDTLS_ECDH_OURS ) in ecdh_get_params_internal()
471 mbedtls_ecdh_side side ) in mbedtls_ecdh_get_params() argument
476 ECDH_VALIDATE_RET( side == MBEDTLS_ECDH_OURS || in mbedtls_ecdh_get_params()
477 side == MBEDTLS_ECDH_THEIRS ); in mbedtls_ecdh_get_params()
496 return( ecdh_get_params_internal( ctx, key, side ) ); in mbedtls_ecdh_get_params()
503 mbedtls_everest_ecdh_side s = side == MBEDTLS_ECDH_OURS ? in mbedtls_ecdh_get_params()
512 key, side ) ); in mbedtls_ecdh_get_params()
/optee_os-3.20.0/
A DREADME.md2 This git contains source code for the secure side implementation of OP-TEE
A DCHANGELOG.md769 * crypto: fix RSA key leakage after side channel attack
1574 * Add cryptographic abstraction layer in on secure side to ease the use of
/optee_os-3.20.0/lib/libmbedtls/mbedtls/include/mbedtls/
A Decdh.h336 mbedtls_ecdh_side side );
/optee_os-3.20.0/lib/libmbedtls/mbedtls/
A DChangeLog21 * Fix a potential heap buffer overread in TLS 1.2 server-side when
335 the affected side to wrongly reject valid messages. Fixes #4118.
845 * Fix side channel in mbedtls_ecp_check_pub_priv() and
1139 side of the key exchange had a similar bug.
1629 * Close a test gap in (D)TLS between the client side and the server side:
1631 in the same way as on the server side.
2427 against side-channel attacks like the cache attack described in
3274 * Add server-side enforcement of sent renegotiation requests
3552 * Server-side initiated renegotiations send HelloRequest
3975 * Added ServerName extension parsing (SNI) at server side
[all …]

Completed in 20 milliseconds