Searched refs:side (Results 1 – 5 of 5) sorted by relevance
447 mbedtls_ecdh_side side ) in ecdh_get_params_internal() argument452 if( side == MBEDTLS_ECDH_THEIRS ) in ecdh_get_params_internal()456 if( side != MBEDTLS_ECDH_OURS ) in ecdh_get_params_internal()471 mbedtls_ecdh_side side ) in mbedtls_ecdh_get_params() argument476 ECDH_VALIDATE_RET( side == MBEDTLS_ECDH_OURS || in mbedtls_ecdh_get_params()477 side == MBEDTLS_ECDH_THEIRS ); in mbedtls_ecdh_get_params()496 return( ecdh_get_params_internal( ctx, key, side ) ); in mbedtls_ecdh_get_params()503 mbedtls_everest_ecdh_side s = side == MBEDTLS_ECDH_OURS ? in mbedtls_ecdh_get_params()512 key, side ) ); in mbedtls_ecdh_get_params()
2 This git contains source code for the secure side implementation of OP-TEE
769 * crypto: fix RSA key leakage after side channel attack1574 * Add cryptographic abstraction layer in on secure side to ease the use of
336 mbedtls_ecdh_side side );
21 * Fix a potential heap buffer overread in TLS 1.2 server-side when335 the affected side to wrongly reject valid messages. Fixes #4118.845 * Fix side channel in mbedtls_ecp_check_pub_priv() and1139 side of the key exchange had a similar bug.1629 * Close a test gap in (D)TLS between the client side and the server side:1631 in the same way as on the server side.2427 against side-channel attacks like the cache attack described in3274 * Add server-side enforcement of sent renegotiation requests3552 * Server-side initiated renegotiations send HelloRequest3975 * Added ServerName extension parsing (SNI) at server side[all …]
Completed in 20 milliseconds